
9:00 am - 9:30 am

Registration & Exhibit Browsing

The ATM, online banking, mobile payments – you can count on a hand the number of seismic changes in how financial services has conducted business over the past century. With the rise of ecommerce and cryptocurrency, 2021 just may give us another revolution.
Enterprises globally have proven the business case for a 100% remote workforce and customer base, and now the traditional banking institution may be forever changed. Add to that the ongoing entry of non-traditional banking competitors, the evolution of real-time payments and the ever-shifting fraud landscape, and you see an industry ripe for revolutionary change.
Be a part of that revolution. Join our virtual summit to gain expert insight from practitioners, researchers and vendors on the forces, services and technologies that are driving the financial services transformation.
Live: Jan 12th @ 9am ET
On Demand: Jan 13th until 5pm
Registering For a Group?
Call + 1 (609)-356-1499
Speaker:
Selim Aissi, SVP & CISO, Ellie Mae
Selim Aissi is a respected, veteran CISO who has deep experience in technology, management and financial services. In this exclusive fireside chat, he opens up on a range of hot topics, including
Speaker:
Donald Smith, Senior Director of Product Management, Oracle
Stability, security, performance and cost are the key parameters organizations consider when choosing an application development platform. Today's microservices and cloud-native approaches bring forth new possibilities but require careful considerations while trying to deliver on customer demands and business needs. In this session, Donald Smith, Senior Director of Product Management for the Java Platform Group at Oracle will cover:
Speaker:
Homayun Yaqub, Senior Director of Strategy, Forcepoint
Speaker:
Gary Sorrentino, Global Deputy CIO & Chairman, CISO Council, Zoom
2021: It's the big global reset. Business offices are likely to reopen, but much of the corporate world still prefers some work-from-home flexibility. Are you ready to secure this hybrid workforce? Do you have the visibility, tools, and skills to protect employees and critical assets, while enabling secure collaboration among your dispersed teams?
Join Zoom Global Deputy CIO Gary Sorrentino for an interactive discussion about:
Speakers:
Avi Shau, CEO and Co-Founder, Orca SecurityThomas Hill, CIO, Live Oak Bank
Public cloud providers like AWS, Azure, and GCP enable financial services firms to deliver new products and capabilities at breakneck speeds, but how do you balance speed to market against compliance mandates and security issues - do you have to choose? This presentation looks at how to meet compliance mandates, gain 100% visibility into security issues, and tips for reducing friction between DevOps and IT security teams.
Three key things the audience will be able to do after attending your session?
Speaker:
Rob Roj, Senior Solutions Architect, Shape Security
Speaker:
Chris Dobrec, Vice President of Product Marketing, Armis
Knowing what you have is the critical starting point for any security footprint, but do you really know about everything in your environment? First and foremost on any CISO's mind, is to understand where all their risks are coming from. And for security personnel in financial services, those risks need to be balanced with worries about fraud as well as focus on protecting key pieces of infrastructure constantly under attack. If you do not understand what is on your network or in your infrastructure:
During this session we'll take a look at the risks associated with the things you may not even know are in your environment and how to find and protect them.
Speakers:
Michael Alouf, Director of FinServ/FinTech Practice, Auth0Pushp Abrol, Senior Solutions Engineer, Auth0
How do Financial Services companies provide a personalized and frictionless digital experience that will allow their customers to feel in control of the information they share?
By leveraging a Customer Identity and Access Management (CIAM) platform, businesses can enable solutions to easily identify and authenticate their users, while offering a simplified process that includes anomaly detection and other security measures to ward off attacks.
Join Michael Alouf, Director of FinServ/FinTech Practice, Auth0 and Pushp Abrol, Senior Solutions Engineer, Auth0 to discuss:
Speakers:
Chip Mason, Lead, Mainframe Security Product Management, BroadcomMary Ann Furno, Offering Manager, Broadcom
Today's cloud-connected Mainframe is a vital infrastructure for crucial business applications and data - even more so for banking and financial service companies that carry the highest security and most stringent regulatory requirements. This cloud-connected, hybrid IT model can increase security risk and open opportunities for attacks, but it doesn't have to
Mainframes often house the most vital data and applications. Shifting away from "firefighting" mode and ensuring they integrate into the enterprise security plan can help to eliminate vulnerabilities and threats.
In this session, we'll explore how a comprehensive security suite can help us reduce risk through data classification, avoid human error, use automation and analytics to make decisions and align with best practices, and reduce insider and stolen credential threats with advanced identity management and privileged user management.
Key takeaways:Speaker:
Sion Retskin, CISO & Head of Knowledge & Practice, Pcysys
Today more than ever, financial intuitions are looking for the flexibility of a fully automated platform that validates security efficiency with a click of a button. Security teams are met with an unfair challenge, the attack surface continues to grow and the number of attacks increases yet no matter how many security measures are implemented, there still remains a gap when it comes to validating their effectiveness and the accurate state of the enterprise's cyber posture.
PenTera is an Automated Security Validation solution that ensures you are secure around the clock. Continuous Automated Security Validation ensures your system's cyber posture by applying machine-based, agentless, and on-demand penetration testing.
Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:
Speakers:
Christopher Janczewski, Special Agent, IRSJon Gebhart, Special Agent, IRS
The IRS Criminal Investigation Cyber Crimes Unit is waging a battle against the use of cryptocurrency for financing terrorists and other money-laundering activities. Agents Chris Janczewski and Jon Gebhart describe recent cryptocurrency-related takedowns.
In this Exclusive Interview agents Janczewski and Gebhart discuss:
Speaker:
Steven Hunt, Senior Analyst, Aite Group
Nestled deep in most networks is such a popular destination for attackers that network security, endpoint security, and cloud security vendors make it their prime directive to catch bad activities before attackers reach this enticing target. The place all attacks seem to be worming their way toward is Active Directory. Microsoft's Active Directory is the treasure trove of all privileges and credentials
Speaker:
Christopher Hertz, VP of Cloud Security Sales, Rapid7
Financial services organizations are experiencing a culture shift as they respond to consumer demand for improved experiences delivered when and how they want them. Building applications and migrating regulated workloads to the cloud offers an attractive way to speed innovation, reduce time to market, and increase resilience.
The financial services industry experiences security incidents at 300 percent more frequently than other sectors. The data breaches caused by cloud misconfiguration continue to be rampant, costing enterprises an estimated $5 trillion in 2018 and 2019 alone. Organizations must modify the "command and control" mentality of traditional IT and marry it with a "trust but verify" approach when looking to take advantage of the advantages in public cloud.
In this session, learn how to identify and implement the systems that are cloud-native, and can help you address the unique challenges of public cloud offerings through automation.
Speakers:
Ahmed Mohamud, VP, Cyber Risk, Morgan StanleyMartyn Crew, Director of Solutions Marketing, GigamonStephen Scharf, Managing Director & Global Chief Security Officer, The Depository Trust & Clearing Corporation
AS we begin 2021, many financial services companies are turning their attention to planning for the future - this means adapting to a hybrid workforce and a much greater reliance on cloud for operational efficiencies. While the transition is well underway for many organizations, the journey is fraught with challenges and potential security threats. This session will discuss
Please join Martyn Crew, Gigamon's Solutions Marketing Director, Ahmed Mohamud, VP, Cyber Risk, Morgan Stanley and Stephen Scharf, Managing Director & Global Chief Security Officer, The Depository Trust & Clearing Corporation to discuss some of the issues and options facing the Financial Services industry as we step into The New Tomorrow
Speaker:
Mark Ostrowski, Head of Engineering for the East, US, Check Point
Security is everyone's problem, forging close partnerships between developers, DevOps, and AppSec teams is critical. Ops must create pipelines that let developers work at the speed of serverless and still deploy applications in a realistic and secure way.
Speaker:
James Brotsos, Product Manager, Developer Experience, Checkmarx
Today's modern applications are made up of a significant percentage of open source libraries, components, and packages. As a result, organizations must recognize, accept, and oversee how and where open source is used in the products and services delivered to their customer base.
Although organizations acknowledge a heightened level of security, license, and operational risk, unfortunately, most don't effectively track or manage open source throughout their entire code base and cannot easily address the widening hazards they face. Are you one of the organizations that lack automated, repeatable processes for open source usage, risk management, and remediation? In this session, attendees will hear recommendations on how to tackle the following:
Speakers:
Don Spies, Director of Market Development, ChainalysisJackie Koven, Solutions Architect, Chainalysis
It is no longer a question of "if" financial institutions and cyber security organizations are exposed to cryptocurrency - it is now, "how." The question then becomes how to build a risk-based approach to engage responsibly, identify and mitigate risks, and investigate financial crime with a crypto nexus.
Whether you're dealing with risks on the cyber security front or as a bank, Don Spies, Director of Market Development and Jackie Koven, Solutions Architect at Chainalysis, will guide you through the process of identifying risk and discuss how to build a framework to help understand and address your institution's overall crypto exposure.
Speaker:
Thomas Malta, Head of Identity and Access Management, Navy Federal Credit Union
Multi-cloud and hybrid cloud solutions are great enablers for organizations, but managing IAM across multiple entities that are ever expanding in capability and use? Big challenges. But here's an opportunity to re-do enterprise IAM. Join Tom Malta of Navy Federal Credit Union for insight on:
Speaker:
Jeff Dant, Managing Director, Fraud Operations & Intelligence - Enterprise Fraud Management, BMO Financial Group
Financial crime has seen some unique spikes in the past year, and banking institutions are taking extraordinary steps to coordinate their detection, prevention and response efforts - much like their fraud fusion centers. Jeff Dant, a former U.S. Secret Service agent, now plies his skills at BMO Financial Group, where he's dealing not only with financial crime ever more persistent fraudsters ... but the impacts of the COVID-19 pandemic. In this session, Dant discusses
Speaker:
Joe Martinez, CISO, Aon
2020 was a volatile year in the marketplace, and 2021 promises more of the same, with mergers and acquisitions dominating the news. But what often gets overlooked in the mix - even by those who know better - is cybersecurity. In this session, Joe Martinez, a veteran CISO with M&A experience, discusses:
Speaker:
Donald Smith, Senior Director of Product Management, Oracle
Stability, security, performance and cost are the key parameters organizations consider when choosing an application development platform. Today's microservices and cloud-native approaches bring forth new possibilities but require careful considerations while trying to deliver on customer demands and business needs. In this session, Donald Smith, Senior Director of Product Management for the Java Platform Group at Oracle will cover:
Speaker:
Selim Aissi, SVP & CISO, Ellie Mae
Selim Aissi is a respected, veteran CISO who has deep experience in technology, management and financial services. In this exclusive fireside chat, he opens up on a range of hot topics, including
Speaker:
Homayun Yaqub, Senior Director of Strategy, Forcepoint
Speaker:
Gary Sorrentino, Global Deputy CIO & Chairman, CISO Council, Zoom
2021: It's the big global reset. Business offices are likely to reopen, but much of the corporate world still prefers some work-from-home flexibility. Are you ready to secure this hybrid workforce? Do you have the visibility, tools, and skills to protect employees and critical assets, while enabling secure collaboration among your dispersed teams?
Join Zoom Global Deputy CIO Gary Sorrentino for an interactive discussion about:
Speakers:
Avi Shau, CEO and Co-Founder, Orca SecurityThomas Hill, CIO, Live Oak Bank
Public cloud providers like AWS, Azure, and GCP enable financial services firms to deliver new products and capabilities at breakneck speeds, but how do you balance speed to market against compliance mandates and security issues - do you have to choose? This presentation looks at how to meet compliance mandates, gain 100% visibility into security issues, and tips for reducing friction between DevOps and IT security teams.
Three key things the audience will be able to do after attending your session?
Speaker:
Rob Roj, Senior Solutions Architect, Shape Security
Speaker:
Chris Dobrec, Vice President of Product Marketing, Armis
Knowing what you have is the critical starting point for any security footprint, but do you really know about everything in your environment? First and foremost on any CISO's mind, is to understand where all their risks are coming from. And for security personnel in financial services, those risks need to be balanced with worries about fraud as well as focus on protecting key pieces of infrastructure constantly under attack. If you do not understand what is on your network or in your infrastructure:
During this session we'll take a look at the risks associated with the things you may not even know are in your environment and how to find and protect them.
Speakers:
Michael Alouf, Director of FinServ/FinTech Practice, Auth0Pushp Abrol, Senior Solutions Engineer, Auth0
How do Financial Services companies provide a personalized and frictionless digital experience that will allow their customers to feel in control of the information they share?
By leveraging a Customer Identity and Access Management (CIAM) platform, businesses can enable solutions to easily identify and authenticate their users, while offering a simplified process that includes anomaly detection and other security measures to ward off attacks.
Join Michael Alouf, Director of FinServ/FinTech Practice, Auth0 and Pushp Abrol, Senior Solutions Engineer, Auth0 to discuss:
Speakers:
Chip Mason, Lead, Mainframe Security Product Management, BroadcomMary Ann Furno, Offering Manager, Broadcom
Today's cloud-connected Mainframe is a vital infrastructure for crucial business applications and data - even more so for banking and financial service companies that carry the highest security and most stringent regulatory requirements. This cloud-connected, hybrid IT model can increase security risk and open opportunities for attacks, but it doesn't have to
Mainframes often house the most vital data and applications. Shifting away from "firefighting" mode and ensuring they integrate into the enterprise security plan can help to eliminate vulnerabilities and threats.
In this session, we'll explore how a comprehensive security suite can help us reduce risk through data classification, avoid human error, use automation and analytics to make decisions and align with best practices, and reduce insider and stolen credential threats with advanced identity management and privileged user management.
Key takeaways:Speaker:
Sion Retskin, CISO & Head of Knowledge & Practice, Pcysys
Today more than ever, financial intuitions are looking for the flexibility of a fully automated platform that validates security efficiency with a click of a button. Security teams are met with an unfair challenge, the attack surface continues to grow and the number of attacks increases yet no matter how many security measures are implemented, there still remains a gap when it comes to validating their effectiveness and the accurate state of the enterprise's cyber posture.
PenTera is an Automated Security Validation solution that ensures you are secure around the clock. Continuous Automated Security Validation ensures your system's cyber posture by applying machine-based, agentless, and on-demand penetration testing.
Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:
Speakers:
Christopher Janczewski, Special Agent, IRSJon Gebhart, Special Agent, IRS
The IRS Criminal Investigation Cyber Crimes Unit is waging a battle against the use of cryptocurrency for financing terrorists and other money-laundering activities. Agents Chris Janczewski and Jon Gebhart describe recent cryptocurrency-related takedowns.
In this Exclusive Interview agents Janczewski and Gebhart discuss:
Speaker:
Steven Hunt, Senior Analyst, Aite Group
Nestled deep in most networks is such a popular destination for attackers that network security, endpoint security, and cloud security vendors make it their prime directive to catch bad activities before attackers reach this enticing target. The place all attacks seem to be worming their way toward is Active Directory. Microsoft's Active Directory is the treasure trove of all privileges and credentials
Speaker:
Christopher Hertz, VP of Cloud Security Sales, Rapid7
Financial services organizations are experiencing a culture shift as they respond to consumer demand for improved experiences delivered when and how they want them. Building applications and migrating regulated workloads to the cloud offers an attractive way to speed innovation, reduce time to market, and increase resilience.
The financial services industry experiences security incidents at 300 percent more frequently than other sectors. The data breaches caused by cloud misconfiguration continue to be rampant, costing enterprises an estimated $5 trillion in 2018 and 2019 alone. Organizations must modify the "command and control" mentality of traditional IT and marry it with a "trust but verify" approach when looking to take advantage of the advantages in public cloud.
In this session, learn how to identify and implement the systems that are cloud-native, and can help you address the unique challenges of public cloud offerings through automation.
Speaker:
James Brotsos, Product Manager, Developer Experience, Checkmarx
Today's modern applications are made up of a significant percentage of open source libraries, components, and packages. As a result, organizations must recognize, accept, and oversee how and where open source is used in the products and services delivered to their customer base.
Although organizations acknowledge a heightened level of security, license, and operational risk, unfortunately, most don't effectively track or manage open source throughout their entire code base and cannot easily address the widening hazards they face. Are you one of the organizations that lack automated, repeatable processes for open source usage, risk management, and remediation? In this session, attendees will hear recommendations on how to tackle the following:
Speakers:
Don Spies, Director of Market Development, ChainalysisJackie Koven, Solutions Architect, Chainalysis
It is no longer a question of "if" financial institutions and cyber security organizations are exposed to cryptocurrency - it is now, "how." The question then becomes how to build a risk-based approach to engage responsibly, identify and mitigate risks, and investigate financial crime with a crypto nexus.
Whether you're dealing with risks on the cyber security front or as a bank, Don Spies, Director of Market Development and Jackie Koven, Solutions Architect at Chainalysis, will guide you through the process of identifying risk and discuss how to build a framework to help understand and address your institution's overall crypto exposure.
Speaker:
Thomas Malta, Head of Identity and Access Management, Navy Federal Credit Union
Multi-cloud and hybrid cloud solutions are great enablers for organizations, but managing IAM across multiple entities that are ever expanding in capability and use? Big challenges. But here's an opportunity to re-do enterprise IAM. Join Tom Malta of Navy Federal Credit Union for insight on:
Speaker:
Jeff Dant, Managing Director, Fraud Operations & Intelligence - Enterprise Fraud Management, BMO Financial Group
Financial crime has seen some unique spikes in the past year, and banking institutions are taking extraordinary steps to coordinate their detection, prevention and response efforts - much like their fraud fusion centers. Jeff Dant, a former U.S. Secret Service agent, now plies his skills at BMO Financial Group, where he's dealing not only with financial crime ever more persistent fraudsters ... but the impacts of the COVID-19 pandemic. In this session, Dant discusses
Speaker:
Joe Martinez, CISO, Aon
2020 was a volatile year in the marketplace, and 2021 promises more of the same, with mergers and acquisitions dominating the news. But what often gets overlooked in the mix - even by those who know better - is cybersecurity. In this session, Joe Martinez, a veteran CISO with M&A experience, discusses:
View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.
If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the live agenda has ended.
ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.
Registering For a Group?
Call + 1 (609)-356-1499 or email at events@ismgcorp.com