ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit: Africa

October 13-14, 2021

Register Now

WELCOME / Summit Overview

ISMG’s Global Summit Series will take place across multiple continents, focusing on global security topics such as fraud and breach prevention, zero trust security, connected devices and on many key industry verticals such as finance, government, retail, energy and healthcare.

All content will be driven by our global editorial team from publications such as DataBreachtoday, BankInfoSecurity, GovInfoSecurity and HealthcareInfoSecurity, as well as our newest sites dedicated to Payments Security, Device Security and Fraud. These events will provide the opportunity to learn from industry influencers, earn CPE credits, meet with leading technology providers and be a part of the ISMG community of over 900,000 subscribers.

Register

Details

Free Registration

13 & 14 October 2021

Registering For a Group?
Call + 1 (609)-356-1499

   Members of the ISMG Community

  • Event Gallery

Jeremy King

International Director, PCI Security Standards Council

Christopher Greany

Group Chief Security Office, Barclay’s

Eugene Liderman

Director of Mobile Security Strategy, Google

Polly Ralph

Barrister and Solicitor, UK Data Protection Strategy, Legal and Compliance Services, PwC

Rohit Ghai

President, RSA

Tom Field

SVP - Editorial, ISMG

Michael Chertoff

Executive Chairman, The Chertoff Group

Art Coviello

former CEO, RSA Security; Venture Partner, Rally Ventures

Past Speakers / Featured EMEA Speakers

Jeremy King

International Director, PCI Security Standards Council

Jelena Zelenovic Matone

Senior Unit Head, Op. Risk & CISO, European Investment Bank

John Salmon

Partner, Hogan Lovells International LLP

Homayun Yaqub

Senior Director of Strategy, Forcepoint

Mariana Pereira

Director of Email Security Products, Darktrace

Michael Mauch

Product Manager, Network Security Architecture - Symantec Enterprise Division, Broadcom

John Marsden

Head of Fraud Prevention and Authentication - EMEA, TransUnion

Jonathan Armstrong

Partner, Cordery

Quentyn Taylor

Director, Information Security, Canon EMEA

Charles Keane

Security Specialist, User Entity and Behavior Analytics Group, Forcepoint

Christopher Martin

Security Specialist, Chronicle, Google Cloud

Patrick Grillo

Senior Director, Solutions Marketing, Fortinet

Martyn Crew

Director of Solutions Marketing, Gigamon

Victoria Baines

Visiting Fellow, Oxford University

Ian Porteous

Regional Director, Security Engineering, Check Point Software Technologies

Tom Smith

Solutions Architect, Veracode

Giorgio Gheri

CTSO, Qualys

Barry McMahon

Sr. Intl Product Marketing Manager (IAM), LastPass by LogMeIn

Robert Golladay

Strategic Accounts Director, Illusive Networks

Matthias Maier

Product Marketing Director, Splunk

Past Agenda / All times in BST (GMT+1)



  • Wednesday, October 13th

  • Thursday, October 14th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:00 am
8:30 am - 9:00 am

Registration & Exhibit Browsing

9:00 am -
10:00 am
9:00 am - 10:00 am

Cybersecurity 2021: Threats, Technologies and Leadership

Speaker:
Jelena Zelenovic Matone, Senior Unit Head, Op. Risk & CISO, European Investment Bank

Emerging from the COVID-19 quarantine, enterprises cybersecurity leaders suddenly find themselves tasked with securing a new hybrid workforce and defending their largest-ever attack surface. Identity is the new perimeter, and cloud is the new environment. What are the threats to watch and technologies to embrace? Join Jelena Zelenovic Matone, CISO, European Investment Bank, as she discusses:
  • The new threat landscape
  • Identity, cloud, endpoint security and other key priorities for 2021
  • Leadership demands for the new hybrid workforce
10:00 am -
10:15 am
10:00 am - 10:15 am Cybersecurity

Faking It: Combatting Impersonation with Cyber AI

Speaker:
Mariana Pereira, Director of Email Security Products, Darktrace

10:00 am - 10:15 am Cybersecurity

DevSecOps - 5 Principles of Securing DevOps

Speaker:
Tom Smith, Solutions Architect, Veracode

Like operations, security's goals of minimising enterprise risk sometimes seem to be at odds with development's mandate for change. In reality, there is a middle path that can allow development to deliver more secure code at DevOps speed, but it requires security to adapt to the principles that have proven successful for DevOps. Join this session and you will come away with an understanding of:

  • Automating Security into your DevOps process
  • Integrating to "Fail Quickly"
  • Limiting False Alarms
  • Building Security Champions
  • Keeping Operational Visibility
10:00 am - 10:15 am Financial Services

Digital Trust: We're Prepared, Are You?

Speaker:
John Marsden, Head of Fraud Prevention and Authentication - EMEA, TransUnion

10:15 am -
10:45 am
10:15 am - 10:45 am Cybersecurity

Remediation Workflow: Decreasing Time and Workload

Speaker:
Giorgio Gheri, CTSO, Qualys

All Industries need to continuously ensure the security of their IT environment. Security is a must, but it is painful, expensive, and there is no glory! Blighted with challenges the real question is: what are the critical points that require the biggest effort, and how to make them smoother and possibly automatic. Our session will explore:

  • Data Enrichment
  • Context- and Risk-driven Prioritisation
  • Effective Remediation Workflow

We will then conclude with the only real concern: when you remediated, did you really remediate?

10:15 am - 10:45 am Cybersecurity

Remote Work and IAM - A Unique Opportunity for Security Leaders

Speaker:
Barry McMahon, Sr. Intl Product Marketing Manager (IAM), LastPass by LogMeIn

In a recently published European wide report sponsored by LastPass, the research findings are clear: business leaders want security to demonstrate greater value-add in areas such as operational excellence, user experience and compliance. Yet, with 60% projects kicked off without security involved, it's almost impossible for security leaders to stop being perceived as blockers.

In this session, Barry will share key insights and guidance on how security leaders can leverage Identity and Access Management (IAM) to turn the challenges they face from within their own teams, and from across the business, into opportunities to deliver on key business priorities that will enable the business to grow and operate securely.

There is also guidance on how to best to position the benefits of IAM by speaking the language of the board

10:15 am - 10:45 am Financial Services

SASE Approach to Securing a Remote Financial Services Workforce

Speaker:
Michael Mauch, Product Manager, Network Security Architecture - Symantec Enterprise Division, Broadcom

Securing a remote workforce has never been more essential for today's Financial Institutions. Workers must remain productive wherever they are, but a poorly implemented solution will only add complexity and cost, eliminating many of the benefits of moving to the cloud.

As more users need remote and mobile access to websites and cloud applications, digital transformation was intended to remove the cost and complexity of the traditional perimeter defense. However many are finding that's not the case, while the lost insight and control have made matters worse. To solve this issue, security professionals are rapidly coalescing around a Secure Access Service Edge (SASE) approach to deliver smooth, low-latency connectivity that pleases users and those that need to protect them alike.

This presentation will clarify the importance of SASE and Integrated Cyber Defense in protecting customer data, preventing attacks and optimising security operations in Financial Services.

10:45 am -
11:15 am
10:45 am - 11:15 am

Expert Panel: Envisioning - and Securing - 2021

Speakers:
Ian Porteous, Regional Director, Security Engineering, Check Point Software Technologies
John Salmon, Partner, Hogan Lovells International LLP
Quentyn Taylor, Director, Information Security, Canon EMEA
Victoria Baines, Visiting Fellow, Oxford University

The attack surface will be larger than ever, the workforce more distributed than we've known, and our cybersecurity will be contingent upon how we approach identity, cloud, email and endpoint devices.

This is the unfolding scenario for 2021, and this panel brings together a diverse group of experts to discuss:

  • The evolving threat landscape;
  • New business challenges and regulatory demands;
  • Emerging technology solutions;
  • X-factors that could disrupt everything.
11:15 am -
11:30 am
11:15 am - 11:30 am

Expo Hall & Networking Break

11:30 am -
12:00 am
11:30 am - 12:00 am Cybersecurity

Enabling a Secure Remote Workforce

Speaker:
Patrick Grillo, Senior Director, Solutions Marketing, Fortinet

Providing secure remote access to employees has been a long-standing part of any IT strategy, but with the recent need for more employees to work remotely, organizations have found their existing capabilities overwhelmed. While supporting this type of workforce with little to no notice was critical to ensure business continuity, guaranteeing the security of both the remote employee and the organization is equally crucial. Organizations should also be prepared that a large remote workforce becomes the norm rather than a response to an unexpected disruption.

This session will examine how organizations should prepare themselves to securely support the rising number of remote users with potentially differing capabilities.

11:30 am - 12:00 am Cybersecurity

Securing Financial Services in the Age of Digital Transformation

Speaker:
Martyn Crew, Director of Solutions Marketing, Gigamon

The old cliché "you can't protect against what you can't see" holds as true for cybersecurity as for physical security. Financial Services organizations have been at the forefront of digital transformation and have realized that, without the right planning and tools, security can become a casualty in this process.

View this webinar and join the discussion involving these issues and ways that Financial Services organizations can protect themselves and their customers in the digital transformation process.

11:30 am - 12:00 am Financial Services

Security and Conduct Risk in Evolving Work Environments

Speakers:
Charles Keane, Security Specialist, User Entity and Behavior Analytics Group, Forcepoint
Homayun Yaqub, Senior Director of Strategy, Forcepoint

The challenges of a rapidly growing mobile workforce coupled with the ever-rising demand to increase productivity have highlighted the need for greater precision in evaluating risk exposure and improving an organization's security posture. Despite these significant variables, a financial institution's most valuable resources remain constant - its people and the highly sensitive data they interact with.

In this session, Forcepoint's Homayun Yaqub & Charles Keane will be exploring "Security and Conduct Risk in Evolving Work Environments". Attendees will discover:

  • Why traditional monitoring and surveillance approaches are incomplete
  • How to improve organizational efficacy by better aligning compliance and security objectives
  • The benefits of a people and data centric security strategy to more effectively reduce risk exposure.
12:00 pm -
12:15 pm
12:00 pm - 12:15 pm Cybersecurity

Stop Attacker Movement from Anywhere to Anywhere with Inescapable Deceptions

Speaker:
Robert Golladay, Strategic Accounts Director, Illusive Networks

An attacker's most efficient approach to a pay day is to land on a host and then 'live off the land' using the residue of errant credentials and connections left behind from the course of daily operations-cached domain admin credentials, disconnected RDP sessions, local admin accounts using the same password, and more. Once an attacker grabs domain credentials, the odds are against you successfully detecting lateral (or vertical to cloud) movement when their activity appears 'normal' to most security tools and established baselines. Given the turbulent state IT security driven by massive employee shifts to WFH status, existing tools are all the more challenged to discern real threats from false positive anomalies. To flip the odds in your favor, we will share how distributed, endpoint-based deception technology is helping deliver incontrovertible detection of attacks in motion, be it external threat actors or malicious insiders. Rather than resource intensive 'probabilistic' alerts that end up as false alarms, deception technology has emerged as a 'deterministic' solution for early attack detection, allowing organizations to build new forms of automated threat response armed with precise, source based forensics.
12:00 pm - 12:15 pm Cybersecurity

Combatting Critical Threats in Financial Services

Speaker:
Christopher Martin, Security Specialist, Chronicle, Google Cloud

Big data once meant terabytes; today, your business thinks in petabytes or more. Learn how to combat critical threats in the Financial Services industry and in your own network by correlating your massive amounts of telemetry data with threats in the wild at the speed of a Google search. Power your incident investigation and threat hunting with relational metadata and retroactive and proactive hunting capabilities in the world's largest malware library.
12:15 pm -
12:30 pm
12:15 pm - 12:30 pm

Expo Hall & Networking

12:30 pm -
1:00 pm
12:30 pm - 1:00 pm Cybersecurity

Risk & Returns: A Legal View of Security and Compliance in the 'New Abnormal'

Speaker:
Jonathan Armstrong, Partner, Cordery

In this session, Cordery law firm partner Jonathan Armstrong will review some of the legal and compliance issues for European enterprises in the post-pandemic era, including:

  • GDPR enforcement
  • The unique risks associated with returning to the office
  • Increased security and litigation risks related to device and data security.
12:30 pm - 1:00 pm Cybersecurity

Security Secrets: Why Leading SOC Teams Have Cloud-y Vision

Speaker:
Matthias Maier, Product Marketing Director, Splunk

Security teams need to plan and prepare for a consistent security and compliance posture across a larger, more fluid ecosystem in the cloud. To cover the additional attack surface, it's important to know all the nooks and crannies, and what operates within them. One of these operators are the App Dev teams that increasingly move toward DevOps. Code is being built and released at a level of speed and complexity that leads to high interdependencies - causing unpredictability and risk. Now more than ever, a strategy needs to balance Security Operations' costs with the growing list of responsibilities that come as part of the package with cloud. Don't be left behind, join this session to learn the secrets of leading security teams, including:

  • What the future of security operations centres (SOCs) and job roles will look like
  • How the SOC Team needs to be strategically embedded in DevOps
  • How to ensure and monitor compliance with an organization's security policy across multi-cloud services
  • How DevOps' principles can be practiced in the SOC operating model
  • What it looks like to plan and establish a SOC in the cloud
  • Starting your plan and how to communicate it to managemen
1:00 pm -
1:30 pm
1:00 pm - 1:30 pm

Securing Data: Lessons from the Payment Card Frontlines

Speaker:
Jeremy King, International Director, PCI Security Standards Council

In an increasingly digital world, where players from virtually all sectors are racing to innovate, the risk of data theft is very real. The payment card industry has defined standards for protecting cardholder account data. But what about other data types? And what can be learned from payment card industry standards? As recent, high-profile breaches have shown, personal data is increasingly being targeted by cyberattackers and must be protected. Even email addresses, if left unprotected, can be valuable resources for attackers interested in waging socially engineered attacks against customers and consumers.

So what lessons can be learned from the data security practices that the payment card industry has introduced over the years? This session reviews the various solutions used to secure cardholder data and describes why ongoing work to devalue data, regardless of the data type, has become increasingly critical.

1:30 pm -
2:00 pm
1:30 pm - 2:00 pm

Expo Hall & Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
12:00 pm -
12:30 pm
12:00 pm - 12:30 pm

Registration & Exhibit Browsing

12:30 pm -
1:00 pm
12:30 pm - 1:00 pm

Cybersecurity 2021: Threats, Technologies and Leadership

Speaker:
Jelena Zelenovic Matone, Senior Unit Head, Op. Risk & CISO, European Investment Bank

Emerging from the COVID-19 quarantine, enterprises cybersecurity leaders suddenly find themselves tasked with securing a new hybrid workforce and defending their largest-ever attack surface. Identity is the new perimeter, and cloud is the new environment. What are the threats to watch and technologies to embrace? Join Jelena Zelenovic Matone, CISO, European Investment Bank, as she discusses:
  • The new threat landscape
  • Identity, cloud, endpoint security and other key priorities for 2021
  • Leadership demands for the new hybrid workforce
1:00 pm -
1:15 pm
1:00 pm - 1:15 pm Cybersecurity

Faking It: Combatting Impersonation with Cyber AI

Speaker:
Mariana Pereira, Director of Email Security Products, Darktrace

1:00 pm - 1:15 pm Cybersecurity

DevSecOps - 5 Principles of Securing DevOps

Speaker:
Tom Smith, Solutions Architect, Veracode

Like operations, security's goals of minimising enterprise risk sometimes seem to be at odds with development's mandate for change. In reality, there is a middle path that can allow development to deliver more secure code at DevOps speed, but it requires security to adapt to the principles that have proven successful for DevOps. Join this session and you will come away with an understanding of:

  • Automating Security into your DevOps process
  • Integrating to "Fail Quickly"
  • Limiting False Alarms
  • Building Security Champions
  • Keeping Operational Visibility
1:00 pm - 1:15 pm Financial Services

Digital Trust: We're Prepared, Are You?

Speaker:
John Marsden, Head of Fraud Prevention and Authentication - EMEA, TransUnion

1:15 pm -
1:45 pm
1:15 pm - 1:45 pm Cybersecurity

Remediation Workflow: Decreasing Time and Workload

Speaker:
Giorgio Gheri, CTSO, Qualys

All Industries need to continuously ensure the security of their IT environment. Security is a must, but it is painful, expensive, and there is no glory! Blighted with challenges the real question is: what are the critical points that require the biggest effort, and how to make them smoother and possibly automatic. Our session will explore:

  • Data Enrichment
  • Context- and Risk-driven Prioritisation
  • Effective Remediation Workflow

We will then conclude with the only real concern: when you remediated, did you really remediate?

1:15 pm - 1:45 pm Cybersecurity

Remote Work and IAM - A Unique Opportunity for Security Leaders

Speaker:
Barry McMahon, Sr. Intl Product Marketing Manager (IAM), LastPass by LogMeIn

In a recently published European wide report sponsored by LastPass, the research findings are clear: business leaders want security to demonstrate greater value-add in areas such as operational excellence, user experience and compliance. Yet, with 60% projects kicked off without security involved, it's almost impossible for security leaders to stop being perceived as blockers.

In this session, Barry will share key insights and guidance on how security leaders can leverage Identity and Access Management (IAM) to turn the challenges they face from within their own teams, and from across the business, into opportunities to deliver on key business priorities that will enable the business to grow and operate securely.

There is also guidance on how to best to position the benefits of IAM by speaking the language of the board

1:15 pm - 1:45 pm Financial Services

SASE Approach to Securing a Remote Financial Services Workforce

Speaker:
Michael Mauch, Product Manager, Network Security Architecture - Symantec Enterprise Division, Broadcom

Securing a remote workforce has never been more essential for today's Financial Institutions. Workers must remain productive wherever they are, but a poorly implemented solution will only add complexity and cost, eliminating many of the benefits of moving to the cloud.

As more users need remote and mobile access to websites and cloud applications, digital transformation was intended to remove the cost and complexity of the traditional perimeter defense. However many are finding that's not the case, while the lost insight and control have made matters worse. To solve this issue, security professionals are rapidly coalescing around a Secure Access Service Edge (SASE) approach to deliver smooth, low-latency connectivity that pleases users and those that need to protect them alike.

This presentation will clarify the importance of SASE and Integrated Cyber Defense in protecting customer data, preventing attacks and optimising security operations in Financial Services.

1:45 pm -
2:15 pm
1:45 pm - 2:15 pm

Expert Panel: Envisioning - and Securing - 2021

Speakers:
Ian Porteous, Regional Director, Security Engineering, Check Point Software Technologies
John Salmon, Partner, Hogan Lovells International LLP
Quentyn Taylor, Director, Information Security, Canon EMEA
Victoria Baines, Visiting Fellow, Oxford University

The attack surface will be larger than ever, the workforce more distributed than we've known, and our cybersecurity will be contingent upon how we approach identity, cloud, email and endpoint devices.

This is the unfolding scenario for 2021, and this panel brings together a diverse group of experts to discuss:

  • The evolving threat landscape;
  • New business challenges and regulatory demands;
  • Emerging technology solutions;
  • X-factors that could disrupt everything.
2:15 pm -
2:30 pm
2:15 pm - 2:30 pm

Expo Hall & Networking Break

2:30 pm -
3:00 pm
2:30 pm - 3:00 pm Cybersecurity

Enabling a Secure Remote Workforce

Speaker:
Patrick Grillo, Senior Director, Solutions Marketing, Fortinet

Providing secure remote access to employees has been a long-standing part of any IT strategy, but with the recent need for more employees to work remotely, organizations have found their existing capabilities overwhelmed. While supporting this type of workforce with little to no notice was critical to ensure business continuity, guaranteeing the security of both the remote employee and the organization is equally crucial. Organizations should also be prepared that a large remote workforce becomes the norm rather than a response to an unexpected disruption.

This session will examine how organizations should prepare themselves to securely support the rising number of remote users with potentially differing capabilities.

2:30 pm - 3:00 pm Cybersecurity

Securing Financial Services in the Age of Digital Transformation

Speaker:
Martyn Crew, Director of Solutions Marketing, Gigamon

The old cliché "you can't protect against what you can't see" holds as true for cybersecurity as for physical security. Financial Services organizations have been at the forefront of digital transformation and have realized that, without the right planning and tools, security can become a casualty in this process.

View this webinar and join the discussion involving these issues and ways that Financial Services organizations can protect themselves and their customers in the digital transformation process.

2:30 pm - 3:00 pm Financial Services

Security and Conduct Risk in Evolving Work Environments

Speakers:
Charles Keane, Security Specialist, User Entity and Behavior Analytics Group, Forcepoint
Homayun Yaqub, Senior Director of Strategy, Forcepoint

The challenges of a rapidly growing mobile workforce coupled with the ever-rising demand to increase productivity have highlighted the need for greater precision in evaluating risk exposure and improving an organization's security posture. Despite these significant variables, a financial institution's most valuable resources remain constant - its people and the highly sensitive data they interact with.

In this session, Forcepoint's Homayun Yaqub & Charles Keane will be exploring "Security and Conduct Risk in Evolving Work Environments". Attendees will discover:

  • Why traditional monitoring and surveillance approaches are incomplete
  • How to improve organizational efficacy by better aligning compliance and security objectives
  • The benefits of a people and data centric security strategy to more effectively reduce risk exposure.
3:00 pm -
3:15 pm
3:00 pm - 3:15 pm Cybersecurity

Stop Attacker Movement from Anywhere to Anywhere with Inescapable Deceptions

Speaker:
Robert Golladay, Strategic Accounts Director, Illusive Networks

An attacker's most efficient approach to a pay day is to land on a host and then 'live off the land' using the residue of errant credentials and connections left behind from the course of daily operations-cached domain admin credentials, disconnected RDP sessions, local admin accounts using the same password, and more. Once an attacker grabs domain credentials, the odds are against you successfully detecting lateral (or vertical to cloud) movement when their activity appears 'normal' to most security tools and established baselines. Given the turbulent state IT security driven by massive employee shifts to WFH status, existing tools are all the more challenged to discern real threats from false positive anomalies. To flip the odds in your favor, we will share how distributed, endpoint-based deception technology is helping deliver incontrovertible detection of attacks in motion, be it external threat actors or malicious insiders. Rather than resource intensive 'probabilistic' alerts that end up as false alarms, deception technology has emerged as a 'deterministic' solution for early attack detection, allowing organizations to build new forms of automated threat response armed with precise, source based forensics.
3:00 pm - 3:15 pm Cybersecurity

Combatting Critical Threats in Financial Services

Speaker:
Christopher Martin, Security Specialist, Chronicle, Google Cloud

Big data once meant terabytes; today, your business thinks in petabytes or more. Learn how to combat critical threats in the Financial Services industry and in your own network by correlating your massive amounts of telemetry data with threats in the wild at the speed of a Google search. Power your incident investigation and threat hunting with relational metadata and retroactive and proactive hunting capabilities in the world's largest malware library.
3:15 pm -
3:30 pm
3:15 pm - 3:30 pm

Expo Hall & Networking Break

3:30 pm -
4:00 pm
3:30 pm - 4:00 pm Cybersecurity

Risk & Returns: A Legal View of Security and Compliance in the 'New Abnormal'

Speaker:
Jonathan Armstrong, Partner, Cordery

In this session, Cordery law firm partner Jonathan Armstrong will review some of the legal and compliance issues for European enterprises in the post-pandemic era, including:

  • GDPR enforcement
  • The unique risks associated with returning to the office
  • Increased security and litigation risks related to device and data security.
3:30 pm - 4:00 pm Cybersecurity

Security Secrets: Why Leading SOC Teams Have Cloud-y Vision

Speaker:
Matthias Maier, Product Marketing Director, Splunk

Security teams need to plan and prepare for a consistent security and compliance posture across a larger, more fluid ecosystem in the cloud. To cover the additional attack surface, it's important to know all the nooks and crannies, and what operates within them. One of these operators are the App Dev teams that increasingly move toward DevOps. Code is being built and released at a level of speed and complexity that leads to high interdependencies - causing unpredictability and risk. Now more than ever, a strategy needs to balance Security Operations' costs with the growing list of responsibilities that come as part of the package with cloud. Don't be left behind, join this session to learn the secrets of leading security teams, including:

  • What the future of security operations centres (SOCs) and job roles will look like
  • How the SOC Team needs to be strategically embedded in DevOps
  • How to ensure and monitor compliance with an organization's security policy across multi-cloud services
  • How DevOps' principles can be practiced in the SOC operating model
  • What it looks like to plan and establish a SOC in the cloud
  • Starting your plan and how to communicate it to managemen
4:00 pm -
4:30 pm
4:00 pm - 4:30 pm

Securing Data: Lessons from the Payment Card Frontlines

Speaker:
Jeremy King, International Director, PCI Security Standards Council

In an increasingly digital world, where players from virtually all sectors are racing to innovate, the risk of data theft is very real. The payment card industry has defined standards for protecting cardholder account data. But what about other data types? And what can be learned from payment card industry standards? As recent, high-profile breaches have shown, personal data is increasingly being targeted by cyberattackers and must be protected. Even email addresses, if left unprotected, can be valuable resources for attackers interested in waging socially engineered attacks against customers and consumers.

So what lessons can be learned from the data security practices that the payment card industry has introduced over the years? This session reviews the various solutions used to secure cardholder data and describes why ongoing work to devalue data, regardless of the data type, has become increasingly critical.

4:30 pm -
5:00 pm
4:30 pm - 5:00 pm

Expo Hall & Networking

View Schedule

PAST SPONSORS / Supporting Organizations

Check Point
Chronicle
Darktrace
Forcepoint
Fortinet
Gigamon
Illusive Networks
iovation (TransUnion)
LogMeIn
Qualys
Splunk
Symantec
Veracode

Past Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

VIRTUAL SUMMIT DETAILS / what to expect at our virtual event

View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.

If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.

ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Register Now

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismgcorp.com

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data