• Live Chat
ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Fraud & Breach Prevention Summit – San Francisco 2016

March 23, 2016 - Hilton Financial District

Register Now

SUMMARY / Fraud & Breach Prevention

The data stolen during a breach is used for many purposes, but especially for fraud. Security and fraud teams are working ever more closely together, both pre- and post-breach, to ensure that they are in the best possible position to defend, detect and respond. In this dual track day, intended for senior InfoSec and fraud professionals, we’ll focus on the latest fraud techniques and technologies, as well as a holistic, strategic approach to looking at the data breach problem that affects all industries. Feel free to switch between sessions in each track and network with your peers as well as our speakers and sponsors throughout the day.

Attendees also gain onDemand access to all summit recordings and our curriculum of 400+ webinars after the Summit.

Details

Hilton Financial District

750 Kearny Street
San Francisco, California, USA, 94108
March 22nd, 2016 – 12:00pm
March 23rd, 2016 – 08:00am
View Sessions
  • Event Gallery

Ruud Grotens

Principal Consultant, Financial Crime Risk Management

Mike Dodson

Sr. Director Global Solution Engineering, Venafi

Alan Phillips

Senior Corporate Engineer, Sophos

Tracy Kitten

Director of Global Events Content; Executive Editor, BankInfoSecurity, ISMG

Randy Sabett

Vice Chair, Privacy & Data Protection Practice Group, Cooley LLP

Gerrit Lansing

Chief Architect, CyberArk

Webinars / View This Summit's Sessions Online

Et Tu, Brute? - Your Government Can Take You Down Too

After any significant breach, many parties, ranging from customers, clients, business partners and government agencies, will demand clarity as to how and what data was stolen. The FTC, for example, will be acting to ensure that any given organization is not negligent or reckless with private information, but upon what information do they act? …

Mike Daugherty, President and CEO, LabMD

The Future of Malware

Malware continues to be an extremely effective tool in the cybercrime arsenal. In this session, we'll discuss how and why - and we'll also examine the connection between fraud and malicious code. We'll investigate how malware is designed to enrich cybercrime gangs and how to prevent intrusions, including: How cybercrime economies work and why th…

Elvis Chan, Supervisory Special Agent, San Francisco Division, FBI---Malcolm Harkins, Global CISO, Cylance---Mathew J. Schwartz, Executive Editor, DataBreachToday & Europe

Panel: Data Breach Outlook: Tracking the Next, Seemingly Inevitable Attack

It's a boom time for cybercrime and cyber-espionage, aided by at least two factors. First, many organizations' websites and databases sport well-known technical weaknesses, while employees remain all to susceptible to low-cost social-engineering attacks. Second, attackers can pummel these technical and human targets using an array of free or low-co…

Christopher Pierson, Chief Security Officer and General Counsel, Viewpost---Dominique Shelton, Partner, Alston & Bird LLP---Malcolm Harkins, Global CISO, Cylance---Matthew Rosenquist, Cyber Security Strategist, Intel Corporation

Et Tu, Brute? - Your Government Can Take You Down Too

After any significant breach, many parties, ranging from customers, clients, business partners and government agencies, will demand clarity as to how and what data was stolen. The FTC, for example, will be acting to ensure that any given organization is not negligent or reckless with private information, but upon what information do they act? …

Joseph Burton, Managing Partner, Duane Morris LLP---Mathew J. Schwartz, Executive Editor, DataBreachToday & Europe---Mike Daugherty, President and CEO, LabMD

Card-Not-Present: Fraud on the Move, Back to the Future

As fraudsters switch focus back to card-not-present (CNP) schemes, research from the Aite Group indicates that it will soon outpace card-present fraud in the U.S. by 3:1. Globally, payments provider ACI Worldwide saw a 30-percent increase in CNP fraud in the first half of 2015. In fact, ACI says that approximately 1.2 percent of all CNP transaction…

Randy Vanderhoof, Director, US Payments Forum

Enterprise Cloud Scenarios: How Intelligent Key Management Mitigates Risk in the Cloud

With today's connected enterprise and broad use of mobile devices, organizations are looking to keep their staff productive from wherever they are, while keeping data secure - hence the rise of intelligent key management. Increasingly, organizations are adopting Enterprise File Sync and Share (EFSS) and are using client side encryption to add an ad…

Mark Hickman, COO, WinMagic

The DDoS Shakedown: Extortion is Alive and Well

DDoS as an extortion tactic continues to reinvent itself, and has replaced hacktavism as the leading driver of DDoS attacks during 2015. Whether shifting its target demographics from Bitcoin exchanges or more traditionally known financial services institutions, using DDoS tactics has never been easier, cheaper or more effective. In this session,…

JP Blaho, Market Insights Leader, Arbor Networks

Role Based Behavior Analytics - Patterns and Anomalies in User Behavior as Indicators of Attack

Following two years of headline breaches at the likes of Target, JPMorgan Chase, Sony, Anthem and OPM, many industries are increasing regulations on cybersecurity. One of the more important requirements is detecting anomalous behavior within your company's network. So how can your security team distinguish between legitimate user behavior and an un…

Sean Cassidy, Lead Engineer, Praesidio---Thomas Hill, CIO, Live Oak Bank

Federal Reserve Initiative: Faster Payments from End-to-End

Around the world, rapidly evolving technology, end-user expectations and system complexity are forcing payments stakeholders to reassess their strategies. Recognizing these shifts, the Federal Reserve released Strategies for Improving the U.S. Payment System, an ambitious, multi-year plan that focuses on improving the speed, efficiency, and securit…

Jon Jeswald, VP - Payment Strategy Executive, Federal Reserve Bank

The Growing Threat of SSL Traffic

The adoption of encrypted Internet traffic has exploded in recent years due to security and privacy concerns. Today, it is estimated that more than 65% of Internet traffic will be encrypted by the end of 2016. This increase in encrypted traffic has created a more secure exchange of data"but it has also created a space in which criminals can linger …

Paul Nicholson, Director of Product Marketing, A10 Networks

The ABA Survey: Changing the Face of Fraud

The 2015 ABA Deposit Account Fraud Survey is the eleventh biennial industry study conducted by the American Bankers Association on the topic of deposit account fraud. For over two decades, this ABA survey series has collected detailed DDA fraud information across traditional and emerging banking channels. With payments innovations picking up speed …

Jane Yao, SVP - Benchmarking & Survey Research, Office of the Chief Economist, American Bankers Association

We Lost the Battle Against Intrusions: Are We Left to Raise Our Hands in Defeat?

Enterprises are pouring billions of dollars into preventing threat actors from infiltrating the organization. Yet, the rising level of breaches shows that dedicated threat actors will penetrate the organization. Perhaps then the problem is not a technological one, but is rather one of strategy in dealing with cyber-threats? In this session, we'l…

Bob Vail, ---Roy Katmor, CEO, enSilo

New Account Fraud: Still a Model of Success

Account origination fraud remains one of the fastest growing threats today for organizations ranging from banks to government entities. According to statistics from the Javelin Strategy & Research firm, this type of fraud has risen from $2 billion total loss in 2014 to $3 billion in 2015, while the number of victims has more than doubled during tha…

Al Pascual, SVP, Research Director Head of Fraud & Security, Javelin Strategy and Research

Using Data Breach Analytics to Reduce Risk

When an organization suffers a data breach, how can it quantify the total of all the associated costs? The scope of costs goes way beyond a fixed dollar value per stolen record and extends to include legal fees, third-party forensic services, loss of reputation and defense improvement, as well as state and federal penalties. In this session, we wil…

Billy Austin, VP of Security, LogicNow

Avoid Theft of Your Privileged Credentials

The need to secure your Microsoft Active Directory Services and relevant privileged credentials is a top business priority, given the degree of credential hijacking currently taking place. In 2015, over 75 percent of all compromised records from data breaches was traced directly to the loss or theft of a privileged credential. And too often,…

Doug Gourlay, Executive Vice President, Skyport Systems

EMV Rolled Out and Liability Shifted: Restaurant Fraud Emerged from the Shadows

The rollout of EMV technology has changed the face of fraud for restaurants, retailers and merchants. While card-present fraud will likely decrease as the rollout continues, it will remain a major problem, especially for restaurants and food retailers, despite the new chip technology. In this session, we'll examine the continuing problem of point-o…

David Matthews, General Counsel, National Restaurant Association

The True Cost of Data Breaches - Not Just a Dollar per Record

When an organization suffers a data breach, a number of challenges, impacts, and business decisions contribute to the total of all the associated costs. The scope extends beyond a fixed dollar-per-stolen-record calculation, as it invariably includes expenditures for new security measures, legal fees, third-party forensic services, changes to busine…

Matthew Rosenquist, Cyber Security Strategist, Intel Corporation

Authentication Challenge: The "Dark Side" of SSN Randomization

While the Social Security Administration's 2011 decision to randomize Social Security Number (SSN) issuance made the identifier less susceptible to fraudsters, it also caused a series of unintended consequences for organizations that rely on the number's sequencing as a key part of identity-verification and fraud defense. Nearly three years later, …

Ken Meiser, VP, Identity Solutions, ID Analytics

If Data Has No Value, Its Theft Is Pointless

Consumer and merchant confidence in the payment network requires constant vigilance, investments and cross-industry collaboration. As more consumers shop and pay with connected devices, and commerce increasingly migrates to digital channels, the industry must invest in new standards, technologies and products. One of the best defenses is removing s…

Eduardo Perez, SVP Payment System Risk, Visa Inc.

Blockchain Tech: A New Hyper-Secure Transaction Fabric

Although developed as a core technology underlying the infamous Bitcoin, the blockchain ledger mechanism is proving to have a multitude of potential use cases, from IoT micropayments to capital market trading, retail banking and even voting. The bitcoin blockchain is, in effect, a distributed ledger, shared with hundreds of thousands of automate…

Robert Schwentker, Co-founder and President, Blockchain University

SPONSORS / This Summit's Sponsorships

Arbor Networks
Carbon Black
Check Point
Dell Security
Equifax
Fiserv
NSFocus
Paloalto
Proofpoint
Security Scorecard

SPEAKERS / Featured Speakers Participating At This Event

Malcolm (M.K.) Palmore

VP, Field CSO, Palo Alto Networks

Randy Trzeciak

Director, CERT Insider Threat Center, CMU

Margaret Reid

Senior Vice President of Risk Services, Visa

Bryce Austin

fmr Sr Group Manager and Retail Technology Program Lead at Target during the 2013 breach, TCE Strategy

Rob Zerby

VP and Financial Crimes Manager, Wells Fargo

Elvis Chan

Supervisory Special Agent, San Francisco Division, FBI

Joseph Carson

Chief Security Scientist, Thycotic

David Pollino

Chief Cybersecurity Officer, Bank of the West (BNP Paribas)

Maria Ramirez

Head Deputy, Cyber Crime Division, Los Angeles County District Attorney's Office

Alex Mosher

Vice President of Security Strategy, CA Technologies

Richard Parry

Principal, Parry Advisory; former Risk Management Executive, JPMorgan Chase

Tracy Kitten

Director of Global Events Content and Executive Editor, BankInfoSecurity & CUInfoSecurity

William Ng

Supervisory Special Agent - Cyber Crime, San Francisco Division, FBI

Kevin Flynn

Global Director of Products, Skybox Security

Paul Bowen

Principal Security Technologist, Arbor Networks

Michael Zweiback

Partner and Co-Founder, Zweiback Fiset & Coleman LLP

Kim Zetter

Author, Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

Tom Field

Senior Vice President, Editorial, ISMG

Joseph Burton

Managing Partner, Duane Morris LLP

James Van Dyke

CEO and Founder, Futurion, and former CEO, Javelin Strategy & Research

Brian Engle

Founder and CEO, Riskceptional Strategies

Mayra Koury

VP, Central Operations, Tech Credit Union

Nicole Eagan

CEO, Darktrace

LOCATION / Venue & Address

Hilton Financial District

750 Kearny Street
San Francisco, California, USA, 94108
Tel: +1 415 433 6600

Visit hotel website

Hilton Financial District

750 Kearny Street
San Francisco, California, USA, 94108
Tel: +1 415 433 6600

Watch Sessions Online

For our premium members, we offer online webinars from all of our past events. Become a member now to get access to keynotes and important sessions from previous events.

Become a Member

Interested in Group Membership rates?
Call Glen Van Dusen at +1 (609)-356-1499 or email at gvandusen@ismgcorp.com

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

  • BankInfoSecurity
  • CUInfoSecurity
  • GovInfoSecurity
  • HealthcareInfoSecurity
  • InfoRiskToday
  • CareersInfoSecurity
  • DataBreachToday
Home | Summits | Press Releases | Sponsorship
© 2019 Information Security Media Group, Corp.