ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Fraud & Breach Prevention Summit: San Francisco

July 10-11, 2018 - Parc 55 San Francisco

View Sessions

Welcome / Letter from the Editor

Tom Field

Tom Field

SVP, Editorial, ISMG

From Meltdown and Spectre to GDPR to the Facebook/Cambridge Analytica privacy furor, it’s already been a busy year for security and fraud leaders – and 2018 is barely half over.

Want to arm yourself with strategies and solutions to tackle the rest of the year? Then register now for ISMG’s 5th annual San Francisco Fraud and Breach Prevention Summit.

This two-day conference brings together thought-leaders, industry professionals and solutions vendors to focus intensely on the security and fraud topics that matter most – IoT, Blockchain, cybercrime, machine learning, payments security, identity fraud, the insider threat and behavioral analytics to name a few – all with a single goal: Education.

We strive to bring unique speakers and insight. Case in point: Brett Johnson, a former FBI most-wanted criminal who was once called “the original Internet godfather.” What can you learn from this former career criminal? How not to be someone else’s cybercrime victim.

Johnson is but one of the engaging speakers who will make this Summit unique.

Sign up now and join the discussion.

Details

Parc 55 San Francisco

July 10th & 11th, 2018

$895

View Sessions

Registering For a Group?
Call + 1 (609)-356-1499

  • Event Gallery

David Houlding

Principal Healthcare Program Manager, Microsoft

Michael Zweiback

Partner and Co-Founder, Zweiback, Fiset & Coleman LLP

Randy Trzeciak

Insider Threat Research Team Technical Lead, CERT

Brett Johnson

Former Most Wanted and "The Original Internet Godfather"

M.K. Palmore

VP, Field CSO, Palo Alto Networks, fmr FBI Agent, San Francisco Cyber Division

Tom Field

SVP - Editorial, ISMG

Denyette DePierro

VP & Senior Counsel - Center for Payments & Cybersecurity, American Bankers Association

David Pollino

Chief Cybersecurity Officer, Bank of the West

SPEAKERS / Featured Speakers For Our San Francisco Summit

Elvis Chan

Supervisory Special Agent, San Francisco Division, FBI

Al Pascual

SVP, Research Director Head of Fraud & Security, Javelin Strategy and Research

Michael Zweiback

Partner and Co-Founder, Zweiback Fiset & Coleman LLP

Brett Johnson

Former Most Wanted and "The Original Internet Godfather"

Anton Chuvakin

Research Vice President, Gartner GTP Security and Risk Management Strategies

Denyette DePierro

VP & Senior Counsel - Center for Payments & Cybersecurity, American Bankers Association

David Houlding

Principal Healthcare Program Manager, Microsoft

Malcolm (M.K.) Palmore

VP, Field CSO, Palo Alto Networks

Randy Trzeciak

Director, CERT Insider Threat Center, CMU

Joel de la Garza

Operating Partner, Andreessen Horowitz

Kori Kelley Meehan

Senior Privacy Counsel, Google

David Pollino

Chief Cybersecurity Officer, Bank of the West (BNP Paribas)

Sam Elliott

Director of Security Product Management, Bomgar

Christopher Kruegel

Co-founder and Chief Product Officer, Lastline

Shaked Vax

Trusteer Products Strategist, IBM Security

Jake Snow

Technology and Civil Liberties Attorney, ACLU of Northern California

Rafae Bhatti

Head of Security and Privacy, Health Tap

Michelle Dennedy

Chief Privacy Officer, Cisco

Jean Marie Pechette

Shareholder, Polsinelli

Robert Waitman

Director, Data Valuation, Cisco

Alberto Yepez

Co-Founder and Managing Director, ForgePoint Capital

Kate Black

Global Privacy Officer & Senior Counsel, 23andMe

Myrna Soto

Chief Security Strategist and Trust Officer, Forcepoint

Ronald Watters

Cybersecurity Advisor Region X, Cybersecurity and Communication Division, Department of Homeland Security

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Schedule / Session Date & Times



  • Tuesday, July 10th

  • Wednesday, July 11th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:00 am -
8:45 am
8:00 am - 8:45 am

Registration, Breakfast & Exhibit Browsing

8:45 am -
9:00 am
8:45 am - 9:00 am

Opening Remarks

9:00 am -
9:50 am
9:00 am - 9:50 am

Cybercrime Exposed: Insights from a Former US Most Wanted Cybercriminal

Speaker:
Brett Johnson, Former Most Wanted and "The Original Internet Godfather"

Brett Johnson, referred to by the United States Secret Service as "The Original Internet Godfather" has been a central figure in the cybercrime world for almost 20 years. He founded and was the leader of Counterfeitlibrary.com and Shadowcrew.com. Working alongside the top cyber criminals of our time, he helped design, implement, and refine modern Identity Theft, ATO fraud, Card Not Present fraud, IRS Tax Fraud and countless other social engineering attacks, breaches and hacking operations.

Join Johnson as he discusses:

  • His involvement in online crime;
  • The current state of cybercrime, the crooks and the crimes they commit;
  • How to avoid being a cybercrime victim.
9:55 am -
10:40 am
9:55 am - 10:40 am

Cybercrime Via Social Media - How Has Your Network Been Infiltrated?

Speakers:
David Pollino, Chief Cybersecurity Officer, Bank of the West (BNP Paribas)
Denyette DePierro, VP & Senior Counsel - Center for Payments & Cybersecurity, American Bankers Association

Social media is frequently used for business. But criminals are also using social media to commit crime. How well do you protect you social media accounts? Are you connected with impostors and miscreants? This presentation will discuss:

  • The threats social media poses to your business and personal life;
  • Best practices to protect yourself.
10:40 am -
11:00 am
10:40 am - 11:00 am

Exhibiting & Networking Break

11:00 am -
11:30 am
11:00 am - 11:30 am

Automated Cyber Defense: Leveraging Identity Management to Get to Acceptable Losses

Speaker:
Sam Elliott, Director of Security Product Management, Bomgar

Today's world of cyber warfare is one of continuous zero-day attacks, targeted phishing scams and malicious insiders. Anyone trying to deal with these threats manually has already lost the game. You can't stop cyberattacks from occurring. But, you can significantly limit the damage when these inevitable attacks strike.

Based on his years of extensive real-world experience, Sam Elliott will cover how to redesign and automate your organization's identity management (especially privileged identities and access) to achieve acceptable losses, even while under constant cyberattack. Among the takeaways:

  • You can't eliminate breaches, but you can contain their impact to acceptable loss.
  • By protecting both privileged identities and access pathways you can mitigate the damage done by attackers.
  • Using security automation will allow you to protect yourself against threats while increasing business productivity and performance.
11:35 am -
12:05 pm
11:35 am - 12:05 pm

Know Your (Digital) Customer in the Identity Theft Era

Speaker:
Shaked Vax, Trusteer Products Strategist, IBM Security

As businesses evolve to support a complete digital experience, a challenge has emerged to one of the most basic questions of doing business: How can I truly trust I know my customer?

In the world of data breaches and identity theft, legacy programs of identity proofing and authentication do not instill a high level of confidence in the end user's claims to allow establishing digital identity trust. New technologies and approaches are needed to assess the risk of digital identities that examine each user's digital patterns and can detect bad actors more accurately.

This session will:

  • Dive into the details of a framework that establishes digital trust based on capabilities from fraud protection and Identity.
  • Show how it quickly and transparently establishes a trusted, frictionless digital relationship for customers, employees, and business partners.
  • Explore key scenarios of deployment, best practices and top technologies that establish a digital trust stack.
12:05 pm -
1:05 pm
12:05 pm - 1:05 pm

Lunch

1:05 pm -
1:50 pm
1:05 pm - 1:50 pm

Breach Aftermath: The Challenge of More Complete Identity Impersonation

Speaker:
Al Pascual, SVP, Research Director Head of Fraud & Security, Javelin Strategy and Research

In the wake of Equifax and other major breaches, and armed with all of the personally identifiable information that they will ever need and a keen sense of the security controls that modern organizations use, sophisticated fraudsters are finding success as never before. At the center of it all is a new fraud trend: the practice of impersonating legitimate customers at multiple organizations to further a single fraud scheme. Worse still is that traditional security and fraud tools can't see it and some even help enable it. Attend this session for:

  • Javelin's newest fraud research findings
  • How identity impersonation is manifesting, the implications for different organizations such as financial institutions, merchants, and mobile network operators
  • What can ultimately be done when a fraudster's version of a consumer is more convincing than the victim's
1:55 pm -
2:25 pm
1:55 pm - 2:25 pm

Achieving True Breach Defense

Speaker:
Christopher Kruegel, Co-founder and Chief Product Officer, Lastline

Cybersecurity is a strategic business issue for most enterprises, but too many cybersecurity solutions rely more on flash than substance. In this engaging session, Christopher Kruegel - CEO and Co-Founder of Lastline - will cut through the hype to present the elements of true breach defense: Understanding the specific threats, gaining true visibility, tapping into analytics, and utilizing AI to make responsible defensive decisions.

2:25 pm -
2:45 pm
2:25 pm - 2:45 pm

Exhibiting & Networking Break

2:45 pm -
3:30 pm
2:45 pm - 3:30 pm

Blockchain as a Tool for Fraud Prevention

Speaker:
David Houlding, Principal Healthcare Program Manager, Microsoft

Financial fraud can be notoriously hard to detect and easy to cover up. But does blockchain technology with its distributed digital ledger now offer a new tool to help organizations reduce risk and prevent fraud? Attend this session to learn:

  • More about blockchain and its uses beyond digital currencies
  • The value of blockchain to reduce financial transaction time, risk and fraud among multiple parties with a trusted, decentralized digital ledger
  • Lessons from organizations that already are using blockchain technology as a tool to prevent fraud
3:35 pm -
4:20 pm
3:35 pm - 4:20 pm

Stand up an Insider Threat Program to Stop Malicious and Accidental Insiders

Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU

When it comes to fraud prevention, many organizations overlook the insider threat - both the malicious actor who intends to commit fraud, as well as the accidental insider who makes a mistake or is taken advantage of by an external entity? The CERT Insider Threat Center at Carnegie Mellon University is one of the world's leading authorities on detecting insider fraud, and in this session the center's director will offer:

  • The latest research on insider fraud
  • The growing role of the accidental insider in fraud schemes
  • How to stand up an insider fraud detection program within your organization
4:25 pm -
5:10 pm
4:25 pm - 5:10 pm

The Business of Security: Where Do Today's Hot Technologies Fit in the Marketplace?

Speaker:
Alberto Yepez, Co-Founder and Managing Director, ForgePoint Capital

Artificial intelligence and machine learning. Cryptocurrencies and the blockchain. Identity protection and the cloud. These are among the hottest technologies in today's even hotter cybersecurity marketplace. But how can a security leader separate market hype from reality and plot an intelligent course forward leveraging these emerging technologies?

Join Alberto Yepez, co-founder and managing director of ForgePoint Capital, for a venture capitalist's perspective on:

  • What to watch in today's kinetic security marketplace
  • Myths and realities of AI/ML, cryptocurrencies, blockchain and other technologies
  • Hot technologies to watch over the next year.
5:10 pm -
5:30 pm
5:10 pm - 5:30 pm

Wrap-up Panel / Look Ahead to Day 2

5:30 pm -
6:30 pm
5:30 pm - 6:30 pm

Cocktails & Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:00 am -
8:45 am
8:00 am - 8:45 am

Registration, Breakfast, & Networking

8:45 am -
9:00 am
8:45 am - 9:00 am

Opening Remarks

9:00 am -
9:50 am
9:00 am - 9:50 am

The CISO's Role in 2019

Speaker:
Joel de la Garza, Operating Partner, Andreessen Horowitz

Given current, turbulent conversations around physical and cybersecurity, it's hard to get an exact pulse on the state of the industry and where to start shoring up corporate processes to protect information. But with business and personal safety on the line, it's become increasingly important to be able to identify and combat security vulnerabilities and breaches. Join Andreessen Horowitz operating partner Joel de la Garza - a longtime CISO for major entities - as he shares best practices, pitfalls to avoid, and discusses:

  • What CISOs need to be prepared for in the year ahead
  • How to think about security breaches today
  • How to help keep your company and employees secure
9:55 am -
10:40 am
9:55 am - 10:40 am

Post-GDPR and CA AB 375: Why Privacy is Good for Security - and the Business

Speakers:
Michelle Dennedy, Chief Privacy Officer, Cisco
Robert Waitman, Director, Data Valuation, Cisco

California's new AB 375 privacy legislation and the EU's General Data Protection Regulation have pushed privacy to the forefront for enterprises worldwide. But beyond compliance, what have we really learned about privacy's true impact on cybersecurity and the business? Well, start here: Even businesses with advanced security defenses are experiencing several weeks of sales delays and hundreds of millions of dollars in lost revenue due to privacy concerns, according to Cisco's 2018 Privacy Maturity Benchmark Study.

Join Cisco Chief Privacy Officer Michelle Dennedy, and Robert Waitman, Director of Data Valuation, for a discussion of:

  • This new study's findings and what they mean;
  • The true business impacts of growing data privacy concerns;
  • Steps businesses can take now to shore up data privacy and protection in their organizations to conform to current and emerging legislation.
10:40 am -
11:00 am
10:40 am - 11:00 am

Exhibiting & Networking Break

11:00 am -
11:45 am
11:00 am - 11:45 am

Information Security Program Development: GRC's Critical Role in Fraud and Breach Response

Speaker:
Malcolm (M.K.) Palmore, VP, Field CSO, Palo Alto Networks

Information security program development and maintenance continues to reside at the core of good response, incident management and overall information security program capability. In the current landscape, where the cyber threat consists largely of a growing and persistent threat of fraud and the potential for a large-scale cyber intrusion, an oftentimes diminished aspect of program development are the components of Governance, Risk and Compliance and how paying attention to the fundamental aspects of program development will lead to resiliency. The session, through the lens of the leader of one of the FBI's most active cyber investigative teams, will discuss:

  • The importance of information security program development
  • GRC's role in preparing and responding to fraud attempts and persistent attacks by cyber threat actors
11:50 am -
12:35 pm
11:50 am - 12:35 pm

Apps, Wearables and Connected Devices: The Security and Privacy Challenges

Speakers:
Jean Marie Pechette, Shareholder, Polsinelli
Kate Black, Global Privacy Officer & Senior Counsel, 23andMe
Kori Kelley Meehan, Senior Privacy Counsel, Google
Rafae Bhatti, Head of Security and Privacy, Health Tap

The proliferation of apps, wearables, sensors and other connected devices that provide access to real time health and wellness data have the potential to revolutionize the provision of healthcare. In addition, the healthcare industry is increasingly tapping into the power of deep learning to analyze health data sets to improve prediction, diagnoses and delivery of care. These advancements raise interesting questions about the need to balance privacy and security with a desire to improve health outcomes. This panel will address:

  • Unique challenges that arise because of emerging technology
  • Real-world examples of how organizations are tackling these challenges
  • Applicability in other sectors beyond healthcare
12:35 pm -
1:15 pm
12:35 pm - 1:15 pm

Lunch

1:15 pm -
2:00 pm
1:15 pm - 2:00 pm

Homeland Security: Protecting Critical Infrastructure and the Mid-Term Election

Speakers:
Elvis Chan, Supervisory Special Agent, San Francisco Division, FBI
Ronald Watters, Cybersecurity Advisor Region X, Cybersecurity and Communication Division, Department of Homeland Security

What are the keys to successful threat-intelligence sharing between the public and private sectors? And given what we saw in 2016, how do we ensure the security of the 2018 mid-term election? This session explores how the private sector can use the government's experience and apply it, and develop public/private relationships for joint cyber initiatives, including election security. Attend and learn:

  • What public/private initiatives are already underway to protect critical infrastructure
  • The state of election security and the focus for 2018
  • Where private sector entities can help
2:05 pm -
2:50 pm
2:05 pm - 2:50 pm

Facial Recognition and Emerging Technology: Privacy and Security Concerns

Speaker:
Jake Snow, Technology and Civil Liberties Attorney, ACLU of Northern California

In June, Maryland authorities used facial recognition capabilities to comb through 10 million images and identify Jarrod Ramos, the suspect in the Capital Gazette shooting, which left five people dead. One public safety official described the technology as "a valuable tool for fighting crime."

But what are the privacy and security concerns that organizations must weigh before deploying such tools? The ACLU and other organizations have taken a strong stance against facial recognition tools, which they have described as "primed for abuse in the hands of governments."

Attend this session for:

  • An overview of facial recognition technology and its uses in law enforcement
  • The ACLU's detailed objections to these tools
  • A spirited debate between attendees and panelists on the security and privacy concerns
2:55 pm -
3:45 pm
2:55 pm - 3:45 pm

Threat Hunting & Breach Investigations: Lessons Learned

Speakers:
Anton Chuvakin, Research Vice President, Gartner GTP Security and Risk Management Strategies
Elvis Chan, Supervisory Special Agent, San Francisco Division, FBI
Michael Zweiback, Partner and Co-Founder, Zweiback Fiset & Coleman LLP
Myrna Soto, Chief Security Strategist and Trust Officer, Forcepoint

Incident responders and law enforcement officials are in agreement: Reactive tactics are no longer sufficient in the coordinated efforts to detect and respond to cybersecurity incidents. Internal organizations need to embrace proactive threat hunting capabilities, and they must develop working relationships with federal law enforcement agencies before an incident becomes an investigation.

Join this panel for an overview of:

  • What threat hunting is and is not
  • The skills and tools needed for a mature threat hunting capability
  • Lessons learned from recent breaches and investigations
3:45 pm -
4:00 pm
3:45 pm - 4:00 pm

Closing Remarks

View Schedule

SPONSORS / Supporting Organizations

Bomgar
IBM
Lastline

LOCATION / Venue & Address

Parc 55 San Francisco
55 Cyril Magnin St
San Francisco, CA 94102

WATCH SESSIONS ONLINE

For our premium members, we offer online webinars from all of our past events. Become a member now to get access to keynotes and important sessions from previous events.

Become a Member

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismg.io

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data