ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Security Summit: New York City

August 14-15, 2018 - New York Marriott Marquis

Registration is now closed

WELCOME / Letter from the Editor

Tom Field

Tom Field

SVP, Editorial, ISMG

From GDPR to the Facebook/Cambridge Analytica privacy furor, it’s already been a busy year for security and fraud leaders – and 2018 isn’t even half over.

Want to arm yourself with strategies and solutions to tackle the rest of the year? Then register now for ISMG’s Flagship Security Summit.

This conference brings together thought-leaders, industry professionals and solutions vendors to focus intensely on the security and fraud topics that matter most – IoT, Blockchain, cybercrime, machine learning, payments security, identity fraud, the insider threat and behavioral analytics to name a few – all with a single goal: Education.

Sign up now and join the discussion.

Details

New York Marriott Marquis

August 14th & 15th, 2018

$895

Registration for this event is now closed.

Registering For a Group?
Call + 1 (609)-356-1499

  • Event Gallery

Gen. Gregory Touhill, Ret

First [Federal] CISO

Steve Katz

Former CISO, Merrill Lynch and Citi

Diana Kelley

Cybersecurity Field CTO, Microsoft

Gregory Wilshusen

Director, Information Security Issues, U.S. GAO

Keith Carlson

General Manager, Payments and Fraud Prevention, Amazon Web Services

Brett Johnson

Former Most Wanted and "The Original Internet Godfather"

Ed Amoroso

Founder and CEO, TAG Cyber; former Senior Vice President and CISO, AT&T

Avivah Litan

VP and Distinguished Analyst, Gartner Research

SPEAKERS / Featured Speakers

Avivah Litan

VP and Distinguished Analyst, Gartner Research

General Gregory Touhill, Retired

First US CISO & President, Appgate Federal

Gregory Wilshusen

Director, Information Security Issues, U.S. Government Accountability Office

Diana Kelley

Cybersecurity Field CTO, Microsoft

Brett Johnson

Former Most Wanted and "The Original Internet Godfather"

Stephen R. Katz

Former CISO, Merrill Lynch and Citi

Jim Routh

Chief Information Security Officer, Aetna

Tom Field

Senior Vice President, Editorial, ISMG

Ed Amoroso

Founder and CEO, TAG Cyber; former Senior Vice President and CISO, AT&T

Keith Carlson

General Manager, Payments and Fraud Prevention, Amazon Web Services

Kenneth (KC) Carnes

CISO, New York Power Authority

Nick Holland

Director, Banking and Payments, ISMG

Ryan Schmiedl

General Manager, Fraud and Financial Crimes Prevention, Amazon Web Services

John Checco

Resident CISO, Proofpoint former SVP, Global Information Security Innovation Group, Bank of America

Dora Gomez

President NYCFE, InfraGard Board Member, FinCrime Consultant., Ernst & Young

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe

Randy Trzeciak

Director, CERT Insider Threat Center, CMU

Tonguc Yaman

CIO, SOMOS

Jennifer Bayuk

CEO, Decision Framework Systems

Christopher McMahon

Special Agent, New York Field Office, US Secret Service

Randy Sabett

Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP

Peter Beardmore

Director of Digital Risk Management Solutions, RSA

Gerald Beuchelt

CISO, LogMeIn, LastPass Enterprise

Mark Bower

General Manager and CRO, Egress Technologies

Sam Curry

Chief Security Officer, Cybereason

Brian Hussey

VP of Cyber Threat Detection & Response, Trustwave

Matthew Joseff

Minister of Reality, Senior Security Specialist, Splunk

Will LaSala

Sr. Director Global Security Solutions, OneSpan

Jeff Michael

Senior Solutions Architect, Lastline

Avi Rembaum

Vice President of Security Solutions, Check Point Software Technologies

Shira Rubinoff

President, SecureMySocial

J. Paul Haynes

President & COO, eSentire

Joseph Feiman

Chief Strategy Officer, WhiteHat Security

Matt Konwiser

Technical Sales Manager - Financial Markets North America, IBM

Sean McCloskey

Branch Chief DHS Cyber Security Advisor Program, US Dept. of Homeland Security

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Schedule / Session Date & Times



  • Tuesday, August 14th

  • Wednesday, August 15th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:00 am -
8:45 am
8:00 am - 8:45 am

Registration, Breakfast & Exhibit Browsing

8:45 am -
9:00 am
8:45 am - 9:00 am

Opening Remarks

9:00 am -
9:45 am
9:00 am - 9:45 am

Cybercrime Exposed: Insights from a Former US Most Wanted Cybercriminal

Speaker:
Brett Johnson, Former Most Wanted and "The Original Internet Godfather"

Brett Johnson, referred to by the United States Secret Service as "The Original Internet Godfather" has been a central figure in the cybercrime world for almost 20 years. He founded and was the leader of Counterfeitlibrary.com and Shadowcrew.com. Working alongside the top cyber criminals of our time, he helped design, implement, and refine modern Identity Theft, ATO fraud, Card Not Present fraud, IRS Tax Fraud and countless other social engineering attacks, breaches and hacking operations.

Join Johnson as he discusses:

  • His involvement in online crime;
  • The current state of cybercrime, the crooks and the crimes they commit;
  • How to avoid being a cybercrime victim.
9:50 am -
10:30 am
9:50 am - 10:30 am

The CISO's Role in 2019

Speaker:
Stephen R. Katz, Former CISO, Merrill Lynch and Citi

Given current, turbulent conversations around physical and cybersecurity, it's hard to get an exact pulse on the state of the industry and where to start shoring up corporate processes to protect information. But with business and personal safety on the line, it's become increasingly important to be able to identify and combat security vulnerabilities and breaches. Join Stephen Katz - the world's first CISO - as he shares his unique historic perspective, pitfalls to avoid and discusses:

  • What CISOs need to be prepared for in the year ahead
  • How to think about security breaches today
  • How to help keep your company and employees secure
10:30 am -
10:50 am
10:30 am - 10:50 am

Exhibiting & Networking Break

10:50 am -
11:30 am
10:50 am - 11:30 am

Know Your Attacker: Lessons Learned from Cybercrime Investigations

Speakers:
Christopher McMahon, Special Agent, New York Field Office, US Secret Service
Randy Sabett, Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP

"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation states, cybercrime gangs or lone actors. Join this panel of law enforcement officials and internal investigators for their insights on:

  • Today's most prevalent cybercrime schemes - and why they are successful
  • Traits of the threat actors most commonly perpetrating these schemes
  • Lessons learned from actual crime investigations - and how you can put these to work to improve your own defenses.
11:35 am -
12:05 pm
11:35 am - 12:05 pm Track A

Digital Trust - Going Beyond Identity, Fraud, and the SOC

Speaker:
Matt Konwiser, Technical Sales Manager - Financial Markets North America, IBM

How can you establish trust over digital channels so you can seamlessly welcome in both new and existing users? The answer lies in how you assess the risk of digital identities. To help transparently identify true users in the digital channel, organizations will need strong digital identity risk assessment capabilities that examine each user's digital patterns and can detect potential bad actors more accurately. In this session, you will learn how IBM solutions can help you to quickly and transparently establish a trusted, frictionless digital relationship for your customers, employees, and business partners.

11:35 am - 12:05 pm Track B

What is Managed Detection and Response and how does it work?

Speaker:
J. Paul Haynes, President & COO, eSentire

The likelihood of a cyber-attack that bypasses all of your security controls is high and often not detected until it's already over. To solve this problem service providers have created a radically new model of cyber security services called Managed Detection and Response or MDR. The focus of MDR is to detect the attack early in its lifecycle and respond by containing it so it cannot complete. How it is done will be the focus of this talk. Topics covered include:

  • Technology components needed to support threat hunting and response teams
  • Operational requirements to deliver 24x7 MDR
  • Where Machine Learning and AI can augment human threat hunters
  • Case study of where the MDR approach detected and contained a Nation State attack
  • What does the next generation MDR look like?
11:35 am - 12:05 pm Track C

Why Password Management Should be Foundational in Your Security Stack

Speaker:
Gerald Beuchelt, CISO, LogMeIn

Businesses remain plagued with weak, reused, old, and potentially-compromised credentials, and every password is a potential entryway to the business that needs to be properly protected and managed. While technology can help address these issues, it is critical to address people and processes first to improve the overall password regime. For business and IT leaders, the ability to help securely control, store and manage employees' passwords can mitigate unnecessary risks due to poor password hygiene or the threat of malicious, complacent, and inadvertent insiders.

In this session, Gerald will discuss:

  • Why a well-implemented Enterprise Password Management solution should be foundational;
  • Best practices for how to implement more effective policies and training;
  • An early look into soon-to-be released data that will help businesses quantify their own individual level of risk.
12:10 pm -
12:40 pm
12:10 pm - 12:40 pm Track A

You Got The Security Budget, Now What? How Many of Your Peers Are Spending

Speaker:
Arbor Networks,

Getting Cyber Security initiatives funded is difficult, now that you have the money how would you spend it to get the most value for all your efforts. Please join Arbor Networks as they discuss what others in the industry are doing by region and type of security defenses. They will review findings in the AT&T reports, Thales and others to help you get a picture of how your industry peers and others are spending the money while also providing input from his own discussions with security executives.

12:10 pm - 12:40 pm Track B

Are you Fighting the Cyber-War of 2018 with 2008 Knowledge?

Speaker:
Jeff Michael, Senior Solutions Architect, Lastline

Why do the bad guys always have the best stuff? In most organizations their overworked security analyst, if they have one, are trailing the bad guys in technology and knowledge. This gap leads to a snowball effect of increased risk and frustration.

Join this session, as we discuss:

  • Where do you stand versus the bad guys?
  • Do you understand what risk really is?
  • How to utilize your strengths to combat the criminals.
12:10 pm - 12:40 pm Track C

How to Contain Insider Threats Through User-Centric Machine Learning and AI

Speaker:
Mark Bower, General Manager and CRO, Egress Technologies

Despite increasing investment in cyber security tools, there has been a significant increase in in data breaches, compliance violations and their related costs, specifically those relating to insider threats: accidental loss, misdirected content, and the malicious insider. These types of incidents contribute up to 80% of all breached records and are often the result of human error when handling sensitive data - mistakes that traditional tools are unable to identify and address - until now.

The session will explore the role of user-centric AI and Machine Learning to enable secure data sharing and collaboration across complex enterprise organizations while proactively detecting and preventing unintentional and malicious insider threats.

12:40 pm -
1:30 pm
12:40 pm - 1:30 pm

Lunch

1:30 pm -
2:15 pm
1:30 pm - 2:15 pm

Compromise in the Cloud; How to Prevent, Detect and Remediate

Speakers:
Keith Carlson, General Manager, Payments and Fraud Prevention, Amazon Web Services
Ryan Schmiedl, General Manager, Fraud and Financial Crimes Prevention, Amazon Web Services

Protecting customers and company resources in the cloud is a constant struggle and balancing act. Fraudsters are aided by new techniques and technologies while unknowing customers support their efforts. In this session, fraud prevention experts from Amazon Web Services will outline the compromise problem and discuss strategies to address, specifically covering the following topics:

  • The key problems and constraints you need to consider as you are tackling this problem;
  • Approaches and techniques to prevent, detect and remediate this fraud exploit;
  • Key monitoring and measurements necessary to ensure fraud prevention strategies are performing and legit customer impact is minimized.
2:20 pm -
2:50 pm
2:20 pm - 2:50 pm Track A

AI and Machine Learning: More Than Buzzwords?

Speaker:
Sam Curry, Chief Security Officer, Cybereason

Artificial Intelligence, Machine Learning and Data Science are among the many disciplines abused by cybersecurity marketing and snake oil salesman alike. But how do you separate snake oil from reality? Where do you turn for practical insight on emerging technologies that truly can improve your cybersecurity defensive posture? Join Sam Curry for an engaging discussion on what's hype vs. what's reality.

2:20 pm - 2:50 pm Track B

Stepping up to GEN V of Cyber Security

Speaker:
Avi Rembaum, Vice President of Security Solutions, Check Point Software Technologies

We are facing an inflection point in the world of cyber-attacks. Mega-attacks have spread fast to almost every country and every industry possible - from banking, transportation to healthcare to production lines. Regardless of all our current investments in cyber security, the majority of enterprises have experienced a significant cyber security threat in past 3 years. Are we adopting the right security strategy? Are we using the appropriate generation of technologies to cope with these Mega-attacks?

In order to address this generation gap, we need to aggressively advance security programs and embrace a fifth generation strategy today.

2:20 pm - 2:50 pm Track C

Cybersecurity Risk Management: Putting Principles into Practice

Speaker:
Jennifer Bayuk, CEO, Decision Framework Systems

This talk covers the professional practice of cybersecurity risk management considered from the perspective of enterprise governance and operational risk management. It will encompass cybersecurity risk classification and assessment. Concepts include: cybersecurity risk identification, classification, measurement, remediation, monitoring and reporting. These will be illustrated with examples of assessments, controls, issues, events and metrics.

2:50 pm -
3:10 pm
2:50 pm - 3:10 pm

Exhibit & Networking Break

3:10 pm -
3:40 pm
3:10 pm - 3:40 pm Track A

Digital Risk Management: Overcoming The Cumulative Challenges of Modernization, Malice, and Mandates

Speaker:
Peter Beardmore, Director of Digital Risk Management Solutions, RSA

Digital Risk is the greatest facet of risk most organizations now face, driven by global acceleration of digitization. It's an issue that has risen well-above the security group, and is forcing executives and boards to think beyond the core competency of their organization; because in many cases, they've transformed into a digital business.

Meanwhile, the security functions in most organizations are struggling just to keep up, while they're incapable of answering broader, business-level questions such as "How is this effecting our overall exposure?" or simply "Are we doing enough?"

To manage digital risk, organizations need a unified, structured and phased approach to align all stakeholders. And they need visibility, insight, and response capabilities that stretch across the organization, enabling each function to participate fully in transforming digital risk into reward.

3:10 pm - 3:40 pm Track B

Making Threat Intel Actionable - Using TI to Track & Defeat Cybercriminals

Speaker:
Brian Hussey, VP of Cyber Threat Detection & Response, Trustwave

Trustwave SpiderLabs has uncovered a new type of cyber-attack targeting the financial industry. Come find out how this "hybrid-style" campaign has resulted in over one billion USD in losses. Featuring a case study on a series of investigations, you will see the most recent pivot in the banking threat landscape and get insights for protecting your organization from these dangerous adversaries.

3:10 pm - 3:40 pm Track C

Fight Fraud and Improve Customer Experience

Speaker:
Will LaSala, Sr. Director Global Security Solutions, OneSpan

Traditional Authentication is not a standalone fraud killer. One Time Passwords, Biometrics, Mobile Authentication via PUSH or SMS, these technologies by themselves are being subverted by new attacks. 15 years ago, with FFIEC guidance, One Time Passwords reduced fraud by themselves by over half. Today, new forms of front end user authentication are being adopted by more users than ever, but yet Fraud is still increasing.

Risk Based Authentication is not a standalone fraud killer. Leveraging risk engines to identify fraudulent activity is only as good as the data being given to the engine and the rules applied to the data. In some banks there are risk engines with hundreds of rules, making it a nightmare to manage and impossible to adjust for new attacks. Manually adjusting these rules has to come to an end and users are requiring real-time decisions and real-time protection from fraud and attacks.

Combining the appropriate level of authentication at the right time is key to new authentication needs. Artificial Intelligence and Machine Learning combined with data gathers on multiple end-points for multiple channels increases the overall visibility of fraud happening at a user level. Adding in the ability to challenge and address the attacks and fraud in real-time by asking users to provide the correct level of authentication when a problem is detected is paramount.

This session will look at the past technologies of authentication and risk analysis and offer a new perspective on where these technologies are headed and how to make use of them immediately.

3:45 pm -
4:25 pm
3:45 pm - 4:25 pm

Data Integrity in the "Fake News" Era: How to Ensure that Critical Data is Private, Secure ... and Unaltered

Speaker:
Diana Kelley, Cybersecurity Field CTO, Microsoft

Stolen data is one thing - the consequences are obvious. But what if data is not stolen or leaked, but rather altered? What could be the damage? Diana Kelley of Microsoft discusses the emerging topic of data integrity and how to preserve it.

Join this session, as Kelley discusses:

  • How and where data can be altered - and the potential impacts;
  • Implications across the enterprise, even with stored data;
  • Cybersecurity tools to help ensure data integrity.
4:25 pm -
5:05 pm
4:25 pm - 5:05 pm

Model-Driven Security

Speaker:
Jim Routh, Chief Information Security Officer, Aetna

For years now, leading-edge security thought leaders have called for organizations to shift from a conventional "peacetime" view of cybersecurity to more of a wartime mindset - acknowledging and responding to the aggressive tactics of global adversaries. It is time, then, for enterprises to shift from conventional to unconventional security controls. Join veteran CISO Jim Routh as he discusses:

  • An emerging trend in cybersecurity control evolution
  • The world of unconventional controls
  • Ideas on talent management for Security
5:05 pm -
5:15 pm
5:05 pm - 5:15 pm

Wrap-Up / Look Ahead to Day 2

5:15 pm -
6:15 pm
5:15 pm - 6:15 pm

Cocktails & Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:00 am -
8:45 am
8:00 am - 8:45 am

Registration, Breakfast, & Networking

8:45 am -
9:00 am
8:45 am - 9:00 am

Opening Remarks

9:00 am -
9:50 am
9:00 am - 9:50 am

A Crazy Random Walk Through Cyber Security

Speaker:
Ed Amoroso, Founder and CEO, TAG Cyber; former Senior Vice President and CISO, AT&T

Cyber threats pervade almost every aspect of our lives today. Should we be more concerned? Should we be more aggressive in our pursuit of solutions? Join Dr. Ed Amoroso, former CISO of AT&T and current CEO of TAG Cyber, as he walks us through:

  • How can we prevent election meddling with so many exploitable assets?
  • Is AI the key to catching hackers?
  • Could botnets actually disable the internet?
9:55 am -
10:40 am
9:55 am - 10:40 am

How to Implement the Zero Trust Security Model

Speaker:
General Gregory Touhill, Retired, First US CISO & President, Appgate Federal

Snowden proved you can't trust on the inside. OPM proved you can't trust the outside. Who should you trust when it comes to your data? No one! In this provocative and informative presentation, retired Brigadier General Greg Touhill, the first Chief Information Security Officer of the U.S. government and current president of the Cyxtera Federal Group, will discuss how nation state actors, cyber criminals, and hackers leverage fundamental weaknesses in TCP/IP, tools, and architectures to breach current cyber defenses and what you can do to stop them. He will recommend a common sense approach to harden your people, processes and technology against cyber threats while delivering results that are effective, efficient, and secure.

10:40 am -
11:00 am
10:40 am - 11:00 am

Exhibiting & Networking Break

11:00 am -
11:30 am
11:00 am - 11:30 am

Will We Ever Have Secure Applications?

Speaker:
Joseph Feiman, Chief Strategy Officer, WhiteHat Security

Applications run your businesses, power grids, defenses, personal and business banking, social networks, hospitals, and entertainment. They are your company's crown jewels, and they continue to be the primary target for hackers' attacks. As your business demands that software is developed faster, application security is required to reduce your organization's overall business risk.

Join WhiteHat Security's Chief Strategy Officer, Joseph Feiman, as he illustrates the effectiveness of application security technologies, practices and strategies to help you:

  • Understand statistically-supported degree of your applications risk-exposure
  • Defend your mission-critical applications by evaluating their vulnerability levels
  • Analyze technologies that reduce application development and operational risk
  • Plan for application security market evolution
  • This presentation is a must for executives and security practitioners who want to best understand the current state of software security risk, and who seek better solutions to combat these risks.

11:35 am -
12:05 pm
11:35 am - 12:05 pm Track A

Finding Fraud Using Machine Data

Speaker:
Matthew Joseff, Minister of Reality, Senior Security Specialist, Splunk

Security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in the past year. Learning to onboard new data at the speed of the business will ensure your fraud team can detect and investigate data to quickly find anomalies and reduce loss of money, reputation and organizational efficiencies.In this session you will learn:

  • How to recognize examples of fraudulent activities in your environment;
  • How to more quickly find anomalies of transactions or behaviors of accounts that are fraudulent, acting fraudulently or being taken over;
  • Recommendations and best practices on how to get started detecting fraudulent patterns and activities by using machine data and an analytics-driven security platform.
11:35 am - 12:05 pm Track B

Stand up an Insider Threat Program to Stop Malicious and Accidental Insiders

Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU

When it comes to fraud prevention, many organizations overlook the insider threat - both the malicious actor who intends to commit fraud, as well as the accidental insider who makes a mistake or is taken advantage of by an external entity? The CERT Insider Threat Center at Carnegie Mellon University is one of the world's leading authorities on detecting insider fraud, and in this session the center's director will offer:

  • The latest research on insider fraud
  • The growing role of the accidental insider in fraud schemes
  • How to stand up an insider fraud detection program within your organization
11:35 am - 12:05 pm Track C

Budgeting for Security: Prevention, Detection, Identification, Response or Recovery?

Speakers:
Dora Gomez, President NYCFE, InfraGard Board Member, FinCrime Consultant.
John Checco, Resident CISO, Proofpoint former SVP, Global Information Security Innovation Group, Bank of America
Kenneth (KC) Carnes, CISO, New York Power Authority
Tonguc Yaman, CIO, SOMOS

Is there a wholesale change in security spending over the past several years, as organizations shift from detection and response to threat hunting and resiliency? If so, then where is this shift heading? Join a panel of security leaders from across sectors, as they discuss:

  • The spending shift
  • How they set priorities
  • Advice on how to leverage limited resources
12:05 pm -
1:05 pm
12:05 pm - 1:05 pm

Lunch

1:05 pm -
1:50 pm
1:05 pm - 1:50 pm

Why Organizations Fail to Implement Proper Security Safeguards & What They Can Do About It

Speaker:
Gregory Wilshusen, Director, Information Security Issues, U.S. Government Accountability Office

The complexity of information technology and the constantly evolving threat landscape makes implementing appropriate controls and processes to secure information assets a major challenge for most enterprises in and out of government. The number of vulnerabilities organizations face is mindboggling: the National Institute of Standards and Technology vulnerability database tops 82,000, and that doesn't count unknown vulnerabilities.

For a dozen years, Gregory Wilshusen and his team of auditors and technical specialists at GAO, the investigative arm of Congress, have issued some 200 reports containing nearly 3,500 recommendations on U.S. federal government IT security, and have identified common problems organizations face and the reasons they often fail in securing information technology. In a Q&A with ISMG's Eric Chabrow, Wilshusen will identify the common areas agencies struggle with to secure their IT and prevent breaches, including access controls, identity and authentication management, continuous monitoring, patch implementation and software testing; explain typical reasons organizations fail to take proper actions to secure their organizations' IT; and recommend solutions organization should take to mitigate this problem.

1:55 pm -
2:40 pm
1:55 pm - 2:40 pm

Homeland Security: Protecting Critical Infrastructure and the Mid-Term Election

Speaker:
Sean McCloskey, Branch Chief DHS Cyber Security Advisor Program, US Dept. of Homeland Security

What are the keys to successful threat-intelligence sharing between the public and private sectors? And given what we saw in 2016, how do we ensure the security of the 2018 mid-term election? This session explores how the private sector can use the government's experience and apply it, and develop public/private relationships for joint cyber initiatives, including election security. Attend and learn:

  • What public/private initiatives are already underway to protect critical infrastructure
  • The state of election security and the focus for 2018
  • Where private sector entities can help
2:45 pm -
3:10 pm
2:45 pm - 3:10 pm

Blockchain and Fraud Prevention: Business and Technical Factors to Make it Scale

Speakers:
Avivah Litan, VP and Distinguished Analyst, Gartner Research
Shira Rubinoff, President, SecureMySocial

Financial fraud can be notoriously hard to detect and easy to cover up. But does blockchain technology with its distributed digital ledger now offer a new tool to help organizations reduce risk and prevent fraud? Which key business and technical factors will help blockchain scale for the large enterprise? Attend this session to learn:

  • More about blockchain and its uses beyond digital currencies
  • The value of blockchain to reduce financial transaction time, risk and fraud among multiple parties with a trusted, decentralized digital ledger
  • Lessons from organizations that already are using blockchain technology as a tool to prevent fraud
3:10 pm -
3:30 pm
3:10 pm - 3:30 pm

Closing Remarks

View Schedule

SPONSORS / Supporting Organizations

Arxan
LastPass
Lastline
Splunk
Cybereason
Trustwave
Arbor Networks
OneSpan
WhiteHat Security
RSA
Check Point
Egress
eSentire
IBM

LOCATION / Venue & Address

New York Marriott Marquis

1535 Broadway
New York, New York 10036

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Registration for this event is now closed

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismg.io

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data