ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit: Financial Services

January 12-13, 2021

Register

WELCOME / Summit Overview

The ATM, online banking, mobile payments – you can count on a hand the number of seismic changes in how financial services has conducted business over the past century. With the rise of ecommerce and cryptocurrency, 2021 just may give us another revolution.

Enterprises globally have proven the business case for a 100% remote workforce and customer base, and now the traditional banking institution may be forever changed. Add to that the ongoing entry of non-traditional banking competitors, the evolution of real-time payments and the ever-shifting fraud landscape, and you see an industry ripe for revolutionary change.

Be a part of that revolution. Join our virtual summit to gain expert insight from practitioners, researchers and vendors on the forces, services and technologies that are driving the financial services transformation.

Details

Free Registration

Live: Jan 12th @ 9am ET
On Demand: Jan 13th until 5pm

Register

Registering For a Group?
Call + 1 (609)-356-1499

   Members of the ISMG Community

  • Event Gallery

Eugene Liderman

Director of Mobile Security Strategy, Google

Rohit Ghai

President, RSA

Sam Curry

Chief Security Officer, Cybereason

Tom Field

SVP - Editorial, ISMG

Michael Chertoff

Executive Chairman, The Chertoff Group

Gen. Keith Alexander (retired)

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe

Art Coviello

former CEO, RSA Security; Venture Partner, Rally Ventures

SPEAKERS / Featured Financial Speakers

Joe Martinez

CISO, Aon

Jeff Dant

Managing Director, Fraud Operations & Intelligence - Enterprise Fraud Management, BMO Financial Group

Stephen Scharf

Managing Director & Global Chief Security Officer, The Depository Trust & Clearing Corporation

Selim Aissi

SVP & CISO, Ellie Mae

Thomas Malta

Head of Identity and Access Management, Navy Federal Credit Union

Thomas Hill

CIO, Live Oak Bank

Gary Sorrentino

Global Deputy CIO & Chairman, CISO Council, Zoom

Steven Hunt

Senior Analyst, Aite Group

Christopher Janczewski

Special Agent, IRS

Jon Gebhart

Special Agent, IRS

Chip Mason

Lead, Mainframe Security Product Management, Broadcom

Mary Ann Furno

Offering Manager, Broadcom

Avi Shau

CEO and Co-Founder, Orca Security

Pushp Abrol

Senior Solutions Engineer, Auth0

Martyn Crew

Director of Solutions Marketing, Gigamon

Michael Alouf

Director of FinServ/FinTech Practice, Auth0

Ahmed Mohamud

VP, Cyber Risk, Morgan Stanley

Don Spies

Director of Market Development, Chainalysis

Jackie Koven

Solutions Architect, Chainalysis

James Brotsos

Product Manager, Developer Experience, Checkmarx

Thomas Martin

Founder, NephōSec

Christopher Hertz

VP of Sales for Cloud Solutions, Rapid7

Sion Retskin

CISO & Head of Knowledge & Practice, Pcysys

Chris Dobrec

Vice President of Product Marketing, Armis

Rob Roj

Senior Solutions Architect, Shape Security

Homayun Yaqub

Senior Director of Strategy, Forcepoint

Donald Smith

Senior Director of Product Management, Oracle

Mark Ostrowski

Head of Engineering for the East, US, Check Point

Agenda / Live Sessions Day 1 (ET) / On Demand Available Day 2



  • Tuesday, January 12th

  • Wednesday, January 13th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:00 am -
9:30 am
9:00 am - 9:30 am

Registration & Exhibit Browsing

9:30 am -
10:00 am
9:30 am - 10:00 am

CISO Dialogue: Selim Aissi, Ellie Mae

Speaker:
Selim Aissi, SVP & CISO, Ellie Mae

Selim Aissi is a respected, veteran CISO who has deep experience in technology, management and financial services. In this exclusive fireside chat, he opens up on a range of hot topics, including

  • The security challenges of multicloud environments
  • How to defend against new DDoS and ransomware variants and vectors
  • Do's and don'ts for developing effective relationships with your Board
10:00 am -
10:30 am
10:00 am - 10:30 am

Keynote: Transitioning Ecosystems for Modern Application Development

Speaker:
Donald Smith, Senior Director of Product Management, Oracle

Stability, security, performance and cost are the key parameters organizations consider when choosing an application development platform. Today's microservices and cloud-native approaches bring forth new possibilities but require careful considerations while trying to deliver on customer demands and business needs. In this session, Donald Smith, Senior Director of Product Management for the Java Platform Group at Oracle will cover:

  • Java's evolution into the modern microservice and cloud-native application platform
  • Evolving threat landscape
  • Current best practices for application platforms in general
10:30 am -
11:00 am
10:30 am - 11:00 am Track A

Modern Cybersecurity Strategy - Integrating Cyber Into Corporate Risk

Speaker:
Homayun Yaqub, Senior Director of Strategy, Forcepoint

Join Forcepoint's Global Security Strategist Homayun Yaqub for a candid discussion on addressing financial services' security challenges today where viewing cyber risk as an information-technology issue will only continue to fall short. And the modern cyber path forward requires cyber integrated into the corporate risk framework making it critical to both business growth and competitive advantage in the years ahead.
10:30 am - 11:00 am Track B

Working from Everywhere - Is It Really Safe?

Speaker:
Gary Sorrentino, Global Deputy CIO & Chairman, CISO Council, Zoom

2021: It's the big global reset. Business offices are likely to reopen, but much of the corporate world still prefers some work-from-home flexibility. Are you ready to secure this hybrid workforce? Do you have the visibility, tools, and skills to protect employees and critical assets, while enabling secure collaboration among your dispersed teams?

Join Zoom Global Deputy CIO Gary Sorrentino for an interactive discussion about:

  • The new three types of workers
  • "Separate but equal" security policies
  • Why when you think you've got security right, you still might be wrong
10:30 am - 11:00 am Track C

Live Oak Bank's Best Practices for Safely Managing its Public Cloud Estate

Speakers:
Avi Shau, CEO and Co-Founder, Orca Security
Thomas Hill, CIO, Live Oak Bank

Public cloud providers like AWS, Azure, and GCP enable financial services firms to deliver new products and capabilities at breakneck speeds, but how do you balance speed to market against compliance mandates and security issues - do you have to choose? This presentation looks at how to meet compliance mandates, gain 100% visibility into security issues, and tips for reducing friction between DevOps and IT security teams.

Three key things the audience will be able to do after attending your session?

  • Apply "lessons learned" from Live Oak Bank's public cloud journey
  • Make a more informed decision when choosing a cloud security provider
  • Implement continuous compliance and hardening of your public cloud environment
11:00 am -
11:15 am
11:00 am - 11:15 am Track A

Application Security to Defend your Business from Fraud & Abuse

Speaker:
Rob Roj, Senior Solutions Architect, Shape Security

Web and mobile apps now represent the single most lucrative set of targets for cybercriminals - which means that application security has never been more important. Together, our combined F5 and Shape Security solutions deliver a comprehensive application security stack that marries best-in-class defenses with the simplicity and ease of a single vendor. Attend this session to learn how F5 and Shape Security can help you achieve: - Detection and mitigation from vulnerability exploits to denial-of-service attacks - Better application performance and uptime - Measurable cost savings for hosting and bandwidth costs - Slashed losses due to fraud and abuse
11:00 am - 11:15 am Track B

Your vulnerabilities are showing and you don't even know it!

Speaker:
Chris Dobrec, Vice President of Product Marketing, Armis

Knowing what you have is the critical starting point for any security footprint, but do you really know about everything in your environment? First and foremost on any CISO's mind, is to understand where all their risks are coming from. And for security personnel in financial services, those risks need to be balanced with worries about fraud as well as focus on protecting key pieces of infrastructure constantly under attack. If you do not understand what is on your network or in your infrastructure:

  • Would you have an accurate picture of your attack surface?
  • Would you be able to find those things that you're not even aware of such as IoT devices you didn't even know were in the building?
  • How would you begin to secure those devices?
  • How would you do patch management to something you don't even know you have?
  • Could you get risk scoring for an unmanaged/IoT device perspective?

During this session we'll take a look at the risks associated with the things you may not even know are in your environment and how to find and protect them.

11:15 am -
11:45 am
11:15 am - 11:45 am Track A

CIAM: The Future of Identity in Financial Services

Speakers:
Michael Alouf, Director of FinServ/FinTech Practice, Auth0
Pushp Abrol, Senior Solutions Engineer, Auth0

How do Financial Services companies provide a personalized and frictionless digital experience that will allow their customers to feel in control of the information they share?

By leveraging a Customer Identity and Access Management (CIAM) platform, businesses can enable solutions to easily identify and authenticate their users, while offering a simplified process that includes anomaly detection and other security measures to ward off attacks.

Join Michael Alouf, Director of FinServ/FinTech Practice, Auth0 and Pushp Abrol, Senior Solutions Engineer, Auth0 to discuss:

  • Rapidly increasing security threats and evolving customer expectations
  • How the changing landscape of modern identity is opening doors to disruptive innovation
  • Exploring identity in today's environment and heading in 2021
11:15 am - 11:45 am Track B

Stop Fires before They Start: Extinguish Risks with an Integrated Security Plan

Speakers:
Chip Mason, Lead, Mainframe Security Product Management, Broadcom
Mary Ann Furno, Offering Manager, Broadcom

Today's cloud-connected Mainframe is a vital infrastructure for crucial business applications and data - even more so for banking and financial service companies that carry the highest security and most stringent regulatory requirements. This cloud-connected, hybrid IT model can increase security risk and open opportunities for attacks, but it doesn't have to

Mainframes often house the most vital data and applications. Shifting away from "firefighting" mode and ensuring they integrate into the enterprise security plan can help to eliminate vulnerabilities and threats.

In this session, we'll explore how a comprehensive security suite can help us reduce risk through data classification, avoid human error, use automation and analytics to make decisions and align with best practices, and reduce insider and stolen credential threats with advanced identity management and privileged user management.

Key takeaways:
  • Reduce insider threats with advanced authentication and privileged user management
  • Identify hidden risks in my data from a governance and regulatory compliance perspective
  • Monitor activity and determine if there is risky behavior going on that I'm unaware of
  • Explore how analytics and automation can simplify security management
  • Understand the importance of a comprehensive Mainframe security lifecycle
11:15 am - 11:45 am Track C

Continuous security validation case studies in the financial sector

Speaker:
Sion Retskin, CISO & Head of Knowledge & Practice, Pcysys

Today more than ever, financial intuitions are looking for the flexibility of a fully automated platform that validates security efficiency with a click of a button. Security teams are met with an unfair challenge, the attack surface continues to grow and the number of attacks increases yet no matter how many security measures are implemented, there still remains a gap when it comes to validating their effectiveness and the accurate state of the enterprise's cyber posture.

PenTera is an Automated Security Validation solution that ensures you are secure around the clock. Continuous Automated Security Validation ensures your system's cyber posture by applying machine-based, agentless, and on-demand penetration testing.

Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:

  • Build up your cyber resilience with continuous risk validation
  • Prioritize remediation efforts with a threat-facing perspective
  • Increase the productivity of your security teams
11:45 am -
12:00 pm
11:45 am - 12:00 pm

Exhibit, Resource Center & Networking Break

12:00 pm -
12:30 pm
12:00 pm - 12:30 pm Track A

Countering Cryptocurrency Crime - IRS Insights from the Front Lines

Speakers:
Christopher Janczewski, Special Agent, IRS
Jon Gebhart, Special Agent, IRS

The IRS Criminal Investigation Cyber Crimes Unit is waging a battle against the use of cryptocurrency for financing terrorists and other money-laundering activities. Agents Chris Janczewski and Jon Gebhart describe recent cryptocurrency-related takedowns.

In this Exclusive Interview agents Janczewski and Gebhart discuss:

  • The role of the IRS in countering cryptocurrency- based criminal activity;
  • The recent disruption of three cryptocurrency financing campaigns for terrorism
  • Their concerns for cryptocurrency-funded crimes in 2021 and optimism for countermeasures
12:00 pm - 12:30 pm Track B

Privileged Access: Fixing Vulnerabilities in Active Directory

Speaker:
Steven Hunt, Senior Analyst, Aite Group

Nestled deep in most networks is such a popular destination for attackers that network security, endpoint security, and cloud security vendors make it their prime directive to catch bad activities before attackers reach this enticing target. The place all attacks seem to be worming their way toward is Active Directory. Microsoft's Active Directory is the treasure trove of all privileges and credentials

12:30 pm -
1:00 pm
12:30 pm - 1:00 pm Track A

Continuous Cloud Security and Compliance for Financial Services

Speakers:
Christopher Hertz, VP of Sales for Cloud Solutions, Rapid7
Thomas Martin, Founder, NephōSec and former CIO at GE

Financial services organizations are experiencing a culture shift as they respond to consumer demand for improved experiences delivered when and how they want them. Building applications and migrating regulated workloads to the cloud offers an attractive way to speed innovation, reduce time to market, and increase resilience.

The financial services industry experiences security incidents at 300 percent more frequently than other sectors. The data breaches caused by cloud misconfiguration continue to be rampant, costing enterprises an estimated $5 trillion in 2018 and 2019 alone. Organizations must modify the "command and control" mentality of traditional IT and marry it with a "trust but verify" approach when looking to take advantage of the advantages in public cloud.

In this session, learn how to identify and implement the systems that are cloud-native, and can help you address the unique challenges of public cloud offerings through automation.

12:30 pm - 1:00 pm Track B

Securing the "New Tomorrow" in Financial Services

Speakers:
Ahmed Mohamud, VP, Cyber Risk, Morgan Stanley
Martyn Crew, Director of Solutions Marketing, Gigamon
Stephen Scharf, Managing Director & Global Chief Security Officer, The Depository Trust & Clearing Corporation

AS we begin 2021, many financial services companies are turning their attention to planning for the future - this means adapting to a hybrid workforce and a much greater reliance on cloud for operational efficiencies. While the transition is well underway for many organizations, the journey is fraught with challenges and potential security threats. This session will discuss

    • How has the shift to dynamic work and multicloud environments introduced cybersecurity risk?
      How has the cloud journey been accelerated? Are you digitally transformed?
      What have been the network challenges in enabling the hybrid workforce?
      What will be the security model of The New Tomorrow?
  • Please join Martyn Crew, Gigamon's Solutions Marketing Director, Ahmed Mohamud, VP, Cyber Risk, Morgan Stanley and Stephen Scharf, Managing Director & Global Chief Security Officer, The Depository Trust & Clearing Corporation to discuss some of the issues and options facing the Financial Services industry as we step into The New Tomorrow

    12:30 pm - 1:00 pm Track C

    Get Security into Your CI/CD Pipeline

    Speaker:
    Mark Ostrowski, Head of Engineering for the East, US, Check Point

    Security is everyone's problem, forging close partnerships between developers, DevOps, and AppSec teams is critical. Ops must create pipelines that let developers work at the speed of serverless and still deploy applications in a realistic and secure way.

    1:00 pm -
    1:30 pm
    1:00 pm - 1:30 pm Track A

    How to (Tackle, Address, Mitigate, Manage, etc.) Your Open Source Risks

    Speaker:
    James Brotsos, Product Manager, Developer Experience, Checkmarx

    Today's modern applications are made up of a significant percentage of open source libraries, components, and packages. As a result, organizations must recognize, accept, and oversee how and where open source is used in the products and services delivered to their customer base.

    Although organizations acknowledge a heightened level of security, license, and operational risk, unfortunately, most don't effectively track or manage open source throughout their entire code base and cannot easily address the widening hazards they face. Are you one of the organizations that lack automated, repeatable processes for open source usage, risk management, and remediation? In this session, attendees will hear recommendations on how to tackle the following:

    • Open source selection and approval processes as it enters a code base
    • Inventory and tracking of open source usage
    • Monitoring, identification, and mitigation of security vulnerabilities
    • License compliance efforts to avoid risk of potential litigation
    • Prioritization of security risks and automated workflows to accelerate remediation
    • Enforcement of open source security policies throughout development pipelines
    1:00 pm - 1:30 pm Track B

    Identify and Mitigate your Exposure to Cryptocurrency Risks

    Speakers:
    Don Spies, Director of Market Development, Chainalysis
    Jackie Koven, Solutions Architect, Chainalysis

    It is no longer a question of "if" financial institutions and cyber security organizations are exposed to cryptocurrency - it is now, "how." The question then becomes how to build a risk-based approach to engage responsibly, identify and mitigate risks, and investigate financial crime with a crypto nexus.

    Whether you're dealing with risks on the cyber security front or as a bank, Don Spies, Director of Market Development and Jackie Koven, Solutions Architect at Chainalysis, will guide you through the process of identifying risk and discuss how to build a framework to help understand and address your institution's overall crypto exposure.

    1:30 pm -
    2:00 pm
    1:30 pm - 2:00 pm Track A

    IAM in a Multi/Hybrid Cloud Environment - Can We Do it Better This Time?

    Speaker:
    Thomas Malta, Head of Identity and Access Management, Navy Federal Credit Union

    Multi-cloud and hybrid cloud solutions are great enablers for organizations, but managing IAM across multiple entities that are ever expanding in capability and use? Big challenges. But here's an opportunity to re-do enterprise IAM. Join Tom Malta of Navy Federal Credit Union for insight on:

    • Business requirements;
    • Next-gen IAM architectures;
    • A roadmap for success.
    1:30 pm - 2:00 pm Track B

    Financial Crime and Fraud Fusion 2021

    Speaker:
    Jeff Dant, Managing Director, Fraud Operations & Intelligence - Enterprise Fraud Management, BMO Financial Group

    Financial crime has seen some unique spikes in the past year, and banking institutions are taking extraordinary steps to coordinate their detection, prevention and response efforts - much like their fraud fusion centers. Jeff Dant, a former U.S. Secret Service agent, now plies his skills at BMO Financial Group, where he's dealing not only with financial crime ever more persistent fraudsters ... but the impacts of the COVID-19 pandemic. In this session, Dant discusses

    • Financial crimes and a holistic response
    • The evolution of the Fusion Center concept;
    • How COVID-19 has impacted fraud schemes and how we defend against them
    2:00 pm -
    2:30 pm
    2:00 pm - 2:30 pm

    CISO's Guide to Cybersecurity During Mergers & Acquisitions

    Speaker:
    Joe Martinez, CISO, Aon

    2020 was a volatile year in the marketplace, and 2021 promises more of the same, with mergers and acquisitions dominating the news. But what often gets overlooked in the mix - even by those who know better - is cybersecurity. In this session, Joe Martinez, a veteran CISO with M&A experience, discusses:

    • How to balance competing challenges in M&A
    • Major milestones in the process
    • How to assess risk in a company when you have limited visibility
    2:30 pm -
    5:00 pm
    2:30 pm - 5:00 pm

    On Demand Viewing, Resource Center & Expo Hall

    View Schedule
    • Hall A
    • Hall B
    • Hall C
    • Hall D
    9:00 am -
    9:30 am
    9:00 am - 9:30 am

    Registration & Exhibit Browsing

    9:30 am -
    10:00 am
    9:30 am - 10:00 am

    Keynote: Transitioning Ecosystems for Modern Application Development

    Speaker:
    Donald Smith, Senior Director of Product Management, Oracle

    Stability, security, performance and cost are the key parameters organizations consider when choosing an application development platform. Today's microservices and cloud-native approaches bring forth new possibilities but require careful considerations while trying to deliver on customer demands and business needs. In this session, Donald Smith, Senior Director of Product Management for the Java Platform Group at Oracle will cover:

    • Java's evolution into the modern microservice and cloud-native application platform
    • Evolving threat landscape
    • Current best practices for application platforms in general
    10:00 am -
    10:30 am
    10:00 am - 10:30 am

    CISO Dialogue: Selim Aissi, Ellie Mae

    Speaker:
    Selim Aissi, SVP & CISO, Ellie Mae

    Selim Aissi is a respected, veteran CISO who has deep experience in technology, management and financial services. In this exclusive fireside chat, he opens up on a range of hot topics, including

    • The security challenges of multicloud environments
    • How to defend against new DDoS and ransomware variants and vectors
    • Do's and don'ts for developing effective relationships with your Board
    10:30 am -
    11:00 am
    10:30 am - 11:00 am Track A

    Modern Cybersecurity Strategy - Integrating Cyber Into Corporate Risk

    Speaker:
    Homayun Yaqub, Senior Director of Strategy, Forcepoint

    Join Forcepoint's Global Security Strategist Homayun Yaqub for a candid discussion on addressing financial services' security challenges today where viewing cyber risk as an information-technology issue will only continue to fall short. And the modern cyber path forward requires cyber integrated into the corporate risk framework making it critical to both business growth and competitive advantage in the years ahead.
    10:30 am - 11:00 am Track B

    Working from Everywhere - Is It Really Safe?

    Speaker:
    Gary Sorrentino, Global Deputy CIO & Chairman, CISO Council, Zoom

    2021: It's the big global reset. Business offices are likely to reopen, but much of the corporate world still prefers some work-from-home flexibility. Are you ready to secure this hybrid workforce? Do you have the visibility, tools, and skills to protect employees and critical assets, while enabling secure collaboration among your dispersed teams?

    Join Zoom Global Deputy CIO Gary Sorrentino for an interactive discussion about:

    • The new three types of workers
    • "Separate but equal" security policies
    • Why when you think you've got security right, you still might be wrong
    10:30 am - 11:00 am Track C

    Live Oak Bank's Best Practices for Safely Managing its Public Cloud Estate

    Speakers:
    Avi Shau, CEO and Co-Founder, Orca Security
    Thomas Hill, CIO, Live Oak Bank

    Public cloud providers like AWS, Azure, and GCP enable financial services firms to deliver new products and capabilities at breakneck speeds, but how do you balance speed to market against compliance mandates and security issues - do you have to choose? This presentation looks at how to meet compliance mandates, gain 100% visibility into security issues, and tips for reducing friction between DevOps and IT security teams.

    Three key things the audience will be able to do after attending your session?

    • Apply "lessons learned" from Live Oak Bank's public cloud journey
    • Make a more informed decision when choosing a cloud security provider
    • Implement continuous compliance and hardening of your public cloud environment
    11:00 am -
    11:15 am
    11:00 am - 11:15 am Track A

    Application Security to Defend your Business from Fraud & Abuse

    Speaker:
    Rob Roj, Senior Solutions Architect, Shape Security

    Web and mobile apps now represent the single most lucrative set of targets for cybercriminals - which means that application security has never been more important. Together, our combined F5 and Shape Security solutions deliver a comprehensive application security stack that marries best-in-class defenses with the simplicity and ease of a single vendor. Attend this session to learn how F5 and Shape Security can help you achieve: - Detection and mitigation from vulnerability exploits to denial-of-service attacks - Better application performance and uptime - Measurable cost savings for hosting and bandwidth costs - Slashed losses due to fraud and abuse
    11:00 am - 11:15 am Track B

    Your vulnerabilities are showing and you don't even know it!

    Speaker:
    Chris Dobrec, Vice President of Product Marketing, Armis

    Knowing what you have is the critical starting point for any security footprint, but do you really know about everything in your environment? First and foremost on any CISO's mind, is to understand where all their risks are coming from. And for security personnel in financial services, those risks need to be balanced with worries about fraud as well as focus on protecting key pieces of infrastructure constantly under attack. If you do not understand what is on your network or in your infrastructure:

    • Would you have an accurate picture of your attack surface?
    • Would you be able to find those things that you're not even aware of such as IoT devices you didn't even know were in the building?
    • How would you begin to secure those devices?
    • How would you do patch management to something you don't even know you have?
    • Could you get risk scoring for an unmanaged/IoT device perspective?

    During this session we'll take a look at the risks associated with the things you may not even know are in your environment and how to find and protect them.

    11:15 am -
    11:45 am
    11:15 am - 11:45 am Track A

    CIAM: The Future of Identity in Financial Services

    Speakers:
    Michael Alouf, Director of FinServ/FinTech Practice, Auth0
    Pushp Abrol, Senior Solutions Engineer, Auth0

    How do Financial Services companies provide a personalized and frictionless digital experience that will allow their customers to feel in control of the information they share?

    By leveraging a Customer Identity and Access Management (CIAM) platform, businesses can enable solutions to easily identify and authenticate their users, while offering a simplified process that includes anomaly detection and other security measures to ward off attacks.

    Join Michael Alouf, Director of FinServ/FinTech Practice, Auth0 and Pushp Abrol, Senior Solutions Engineer, Auth0 to discuss:

    • Rapidly increasing security threats and evolving customer expectations
    • How the changing landscape of modern identity is opening doors to disruptive innovation
    • Exploring identity in today's environment and heading in 2021
    11:15 am - 11:45 am Track B

    Stop Fires before They Start: Extinguish Risks with an Integrated Security Plan

    Speakers:
    Chip Mason, Lead, Mainframe Security Product Management, Broadcom
    Mary Ann Furno, Offering Manager, Broadcom

    Today's cloud-connected Mainframe is a vital infrastructure for crucial business applications and data - even more so for banking and financial service companies that carry the highest security and most stringent regulatory requirements. This cloud-connected, hybrid IT model can increase security risk and open opportunities for attacks, but it doesn't have to

    Mainframes often house the most vital data and applications. Shifting away from "firefighting" mode and ensuring they integrate into the enterprise security plan can help to eliminate vulnerabilities and threats.

    In this session, we'll explore how a comprehensive security suite can help us reduce risk through data classification, avoid human error, use automation and analytics to make decisions and align with best practices, and reduce insider and stolen credential threats with advanced identity management and privileged user management.

    Key takeaways:
    • Reduce insider threats with advanced authentication and privileged user management
    • Identify hidden risks in my data from a governance and regulatory compliance perspective
    • Monitor activity and determine if there is risky behavior going on that I'm unaware of
    • Explore how analytics and automation can simplify security management
    • Understand the importance of a comprehensive Mainframe security lifecycle
    11:15 am - 11:45 am Track C

    Continuous security validation case studies in the financial sector

    Speaker:
    Sion Retskin, CISO & Head of Knowledge & Practice, Pcysys

    Today more than ever, financial intuitions are looking for the flexibility of a fully automated platform that validates security efficiency with a click of a button. Security teams are met with an unfair challenge, the attack surface continues to grow and the number of attacks increases yet no matter how many security measures are implemented, there still remains a gap when it comes to validating their effectiveness and the accurate state of the enterprise's cyber posture.

    PenTera is an Automated Security Validation solution that ensures you are secure around the clock. Continuous Automated Security Validation ensures your system's cyber posture by applying machine-based, agentless, and on-demand penetration testing.

    Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:

    • Build up your cyber resilience with continuous risk validation
    • Prioritize remediation efforts with a threat-facing perspective
    • Increase the productivity of your security teams
    11:45 am -
    12:00 pm
    11:45 am - 12:00 pm

    Exhibit, Resource Center & Networking Break

    12:00 pm -
    12:30 pm
    12:00 pm - 12:30 pm Track A

    Countering Cryptocurrency Crime - IRS Insights from the Front Lines

    Speakers:
    Christopher Janczewski, Special Agent, IRS
    Jon Gebhart, Special Agent, IRS

    The IRS Criminal Investigation Cyber Crimes Unit is waging a battle against the use of cryptocurrency for financing terrorists and other money-laundering activities. Agents Chris Janczewski and Jon Gebhart describe recent cryptocurrency-related takedowns.

    In this Exclusive Interview agents Janczewski and Gebhart discuss:

    • The role of the IRS in countering cryptocurrency- based criminal activity;
    • The recent disruption of three cryptocurrency financing campaigns for terrorism
    • Their concerns for cryptocurrency-funded crimes in 2021 and optimism for countermeasures
    12:00 pm - 12:30 pm Track B

    Privileged Access: Fixing Vulnerabilities in Active Directory

    Speaker:
    Steven Hunt, Senior Analyst, Aite Group

    Nestled deep in most networks is such a popular destination for attackers that network security, endpoint security, and cloud security vendors make it their prime directive to catch bad activities before attackers reach this enticing target. The place all attacks seem to be worming their way toward is Active Directory. Microsoft's Active Directory is the treasure trove of all privileges and credentials

    12:30 pm -
    1:00 pm
    12:30 pm - 1:00 pm Track A

    Continuous Cloud Security and Compliance for Financial Services

    Speakers:
    Christopher Hertz, VP of Sales for Cloud Solutions, Rapid7
    Thomas Martin, Founder, NephōSec and former CIO at GE

    Financial services organizations are experiencing a culture shift as they respond to consumer demand for improved experiences delivered when and how they want them. Building applications and migrating regulated workloads to the cloud offers an attractive way to speed innovation, reduce time to market, and increase resilience.

    The financial services industry experiences security incidents at 300 percent more frequently than other sectors. The data breaches caused by cloud misconfiguration continue to be rampant, costing enterprises an estimated $5 trillion in 2018 and 2019 alone. Organizations must modify the "command and control" mentality of traditional IT and marry it with a "trust but verify" approach when looking to take advantage of the advantages in public cloud.

    In this session, learn how to identify and implement the systems that are cloud-native, and can help you address the unique challenges of public cloud offerings through automation.

    12:30 pm - 1:00 pm Track B

    Gigamon Panel

    Speaker: Martyn Crew

    1:00 pm -
    1:30 pm
    1:00 pm - 1:30 pm Track A

    How to (Tackle, Address, Mitigate, Manage, etc.) Your Open Source Risks

    Speaker:
    James Brotsos, Product Manager, Developer Experience, Checkmarx

    Today's modern applications are made up of a significant percentage of open source libraries, components, and packages. As a result, organizations must recognize, accept, and oversee how and where open source is used in the products and services delivered to their customer base.

    Although organizations acknowledge a heightened level of security, license, and operational risk, unfortunately, most don't effectively track or manage open source throughout their entire code base and cannot easily address the widening hazards they face. Are you one of the organizations that lack automated, repeatable processes for open source usage, risk management, and remediation? In this session, attendees will hear recommendations on how to tackle the following:

    • Open source selection and approval processes as it enters a code base
    • Inventory and tracking of open source usage
    • Monitoring, identification, and mitigation of security vulnerabilities
    • License compliance efforts to avoid risk of potential litigation
    • Prioritization of security risks and automated workflows to accelerate remediation
    • Enforcement of open source security policies throughout development pipelines
    1:00 pm - 1:30 pm Track B

    Identify and Mitigate your Exposure to Cryptocurrency Risks

    Speakers:
    Don Spies, Director of Market Development, Chainalysis
    Jackie Koven, Solutions Architect, Chainalysis

    It is no longer a question of "if" financial institutions and cyber security organizations are exposed to cryptocurrency - it is now, "how." The question then becomes how to build a risk-based approach to engage responsibly, identify and mitigate risks, and investigate financial crime with a crypto nexus.

    Whether you're dealing with risks on the cyber security front or as a bank, Don Spies, Director of Market Development and Jackie Koven, Solutions Architect at Chainalysis, will guide you through the process of identifying risk and discuss how to build a framework to help understand and address your institution's overall crypto exposure.

    1:30 pm -
    2:00 pm
    1:30 pm - 2:00 pm Track A

    IAM in a Multi/Hybrid Cloud Environment - Can We Do it Better This Time?

    Speaker:
    Thomas Malta, Head of Identity and Access Management, Navy Federal Credit Union

    Multi-cloud and hybrid cloud solutions are great enablers for organizations, but managing IAM across multiple entities that are ever expanding in capability and use? Big challenges. But here's an opportunity to re-do enterprise IAM. Join Tom Malta of Navy Federal Credit Union for insight on:

    • Business requirements;
    • Next-gen IAM architectures;
    • A roadmap for success.
    1:30 pm - 2:00 pm Track B

    Financial Crime and Fraud Fusion 2021

    Speaker:
    Jeff Dant, Managing Director, Fraud Operations & Intelligence - Enterprise Fraud Management, BMO Financial Group

    Financial crime has seen some unique spikes in the past year, and banking institutions are taking extraordinary steps to coordinate their detection, prevention and response efforts - much like their fraud fusion centers. Jeff Dant, a former U.S. Secret Service agent, now plies his skills at BMO Financial Group, where he's dealing not only with financial crime ever more persistent fraudsters ... but the impacts of the COVID-19 pandemic. In this session, Dant discusses

    • Financial crimes and a holistic response
    • The evolution of the Fusion Center concept;
    • How COVID-19 has impacted fraud schemes and how we defend against them
    2:00 pm -
    2:30 pm
    2:00 pm - 2:30 pm

    CISO's Guide to Cybersecurity During Mergers & Acquisitions

    Speaker:
    Joe Martinez, CISO, Aon

    2020 was a volatile year in the marketplace, and 2021 promises more of the same, with mergers and acquisitions dominating the news. But what often gets overlooked in the mix - even by those who know better - is cybersecurity. In this session, Joe Martinez, a veteran CISO with M&A experience, discusses:

    • How to balance competing challenges in M&A
    • Major milestones in the process
    • How to assess risk in a company when you have limited visibility
    2:30 pm -
    5:00 pm
    2:30 pm - 5:00 pm

    On Demand Viewing, Resource Center & Expo Hall

    View Schedule

    SPONSORS / Supporting Organizations

    Armis
    Auth0
    Broadcom
    Chainalysis
    Checkmarx
    Check Point
    DivvyCloud
    Forcepoint
    Gigamon
    Oracle
    Orca Security
    Pcysys
    Shape security
    Zoom

    VIRTUAL SUMMIT DETAILS / what to expect at our virtual event

    View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.

    If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the live agenda has ended.

    ISMG Virtual Summit Attendee Guide
    For more information please download our ISMG Virtual Summit Attendee Guide.

    Meet Our Speakers

    ISMG Global Events: 2020 and Beyond

    ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

    The Critical Importance of Data Integrity

    Microsoft's Diana Kelley on How to Keep Data Untampered

    Steve Katz on Cybersecurity’s State of the Union

    World's First CISO Weighs in on the Technologies and Trends Shaping 2019

    The Challenge of Fighting Identity Fraud

    IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

    A Common Sense Guide to Mitigating Insider Threats

    Randy Trzeciak of CERT Reviews the Latest Research

    Register Today

    To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

    Register Now

    Registering For a Group?
    Call + 1 (609)-356-1499  or email at events@ismgcorp.com

    Contact Us

    Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

    +1 (609) 356-1499
    events@ismg.io

    Join the Community

    Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

      • BankInfoSecurity
      • CUInfoSecurity
      • GovInfoSecurity
      • HealthcareInfoSecurity
      • InfoRiskToday
      • CareersInfoSecurity
      • DataBreachToday
      • CyberEd
      Home | Summits | Press Releases | Sponsorship
      © 2021 Information Security Media Group, Corp. |
      Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data