Nathaniel Popper, author of 'Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money'
Known for his in-depth coverage of fintech, cryptocurrencies and online crime, Nathaniel Popper will sit with Teresa Walsh, FS-ISAC's Global Intelligence Officer, and share his views on the future of digital currencies and the implications for the global financial system, as well as his experiences dealing with dark web criminals and crypto kingpins around the world. This session will include a Q&A with attendees.
Gavin Landless, VP Risk Management, Empower Federal Credit Union | Steven Wallstedt, Head of Information Security and Business Continuity, ABN AMRO Holdings USA LLC
Within weeks of the global COVID-19 pandemic, financial institutions around the world had to move hundreds of thousands of employees outside the firewall of their offices. Faced with the unprecedented challenge of rapidly moving all operations remote, institutions dealt with significant security risks during the transition period. By using FS-ISAC’s Mattermost-powered chat app Connect, member companies were able to share information directly with each other and get quick answers to critical, time-sensitive questions. During this session, security leaders from member firms will share their experiences during COVID-19 and the importance of real-time communication channels during a crisis.
Join to learn:
• The benefits of real-time, peer-to-peer chat during a crisis
• What the response to COVID-19 looked like for small and large financial institutions
• How organizations can better prepare for black swan events in the future
The moderator for this panel is Corey Hulen, CTO of Mattermost.
The F3EAD (find, fix, finish, exploit, analyze and disseminate) cycle is an alternative intelligence cycle used in military operations that typically result in lethal action, such as drone strikes and special forces operations. Some of the same principles can be applied to cyberdefense programs. This session will review how organizations can better understand the maturity of their cyberdefense teams using a maturity roadmap as well as how to train cyberdefense teams to be attackers themselves.
Financial services firms are frequent targets for cybercriminals because of valuable information contained in their databases. Today, as institutions outsource more functions, the risk of a cyber-attack breach increases even more. Third parties often do not protect data with the same vigilance as financial institutions. As the number and variety of vendors have increased, so, too, have the risks. The extended ecosystem is under threat. This session will review how to manage cyber-risks within the supply chain, providing attendees with best practices from industry peers that are successfully tackling supply-chain risk head-on.
Booz Allen Hamilton
Today’s attack surface is expanding. Workforces are dispersed. Having the ability to pivot and leverage the cloud through analytics provides a comprehensive view of your institution's fleet, regardless of where it runs, is critical. Fusion centers that are built on cloud-based analytics will define the industry standard for the next 10 years. Institutions that fail to meet this new fusion-center model will be left behind and seen as low-hanging fruit by sophisticated threat actors. This session will provide actionable recommendations around how to secure a fleet in a multi-content-security-policy world, by reviewing real-world examples of tactics for leveraging analytics in the cloud. Additionally, learn best practices for using artificial intelligence and machine learning to reduce alert fatigue.
Data science is fundamentally transforming cybersecurity, specifically, Identity and Access Management Programs. This transformation requires a shift in the way that security teams implement controls. In this session, attendees will learn how establishing behavioral models and continuously measuring them against user actions, anomalies can be detected and treated in real time, without human intervention. Resulting in a better user experience for the customer and better security at a cheaper cost.
Shira Rubinoff, author of 'Cyber Minds' & cybersecurity executive
Shira Rubinoff, an expert in the human factors of information technology and cybersecurity, will deliver an interactive session that explains how incorporating psychology and culture into cybersecurity strategies provides a competitive advantage in an everchanging world. Rubinoff will provide tips for developing tools and frameworks that can help companies navigate their cybersecurity journeys through post-pandemic reality.
MassMutual & CVS Health
Bank of America
Today's cyber security threats require a diverse skill set to defend our institutions. More pressingly organizations need increased creativity and difference of thought to respond to these attacks. Numerous studies have shown the importance of diversity in experience to influence this creativity. Panelists in this discussion will focus on the current state of colorism (skin color bias) in technology. They will also discuss the efforts underway to address this as a community and as an individual firm. This includes an overview of opportunities to partner externally to increase diversity, as well as looking internally at policies for traditional technical language that is racially insensitive.Speakers: