<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=6226337&amp;fmt=gif">
  • Overview
  • Call For Presentations
  • Program
  • Sponsors

The theme for our 2024 Summits is: Thriving Together in a Dynamic World.

Together, we have the resources to rise to this challenge. Our 2024 Summits will allow our members to share collective knowledge and experience.

Sponsorship sales are now closed. Please email sales@fsisac.com with inquiries.

We are pleased to announce Summit Chair:

Stephen-sparkes-1

Stephen Sparkes, EVP, CISO & Enterprise Platforms at Scotiabank

 

Join us for a member only insider threat tabletop exercise, taking place on Sunday, 3 March. Please note, the registration is separate from the Summit. Find out more here.

 

Call for Presentations

The call for presentations has closed.

Sessions will fall under the following tracks:

  • Intelligence
    • Incidents and Campaigns
    • Intel Practices and Methodology
    • Actor TTP Analysis
  • Security
    • Working Group Topics (Anti-Fraud, Red Teaming, AI Risk, PQC, etc)
    • COIs & Industry Specific Topics (including regulation)
    • Network Defense
    • App and Data Security
    • Emerging Technology
  • Resilience
    • GRC
    • Board Reporting
    • Exercises
    • Insider Risk
    • Biz Resilience
    • Third-Party Risk Management
  1. March 3 Sunday
  2. 12:00 - 4:00PM

    • Insider Threat Tabletop Exercise | Sponsored by Gurucul
    Cameron Dicker & Sue Goold

    Event Toggle Arrow
    During this four-hour TTX, participants will engage in a challenging insider threat and data theft focused TTX scenario. They will be tasked with discussing the hypothetical ongoing situation using their organization’s existing incident response plans, policies, and procedures. Please note, this exercise requires separate registration. Book your place here.
  3. 5:00 - 7:00PM

    • Welcome Reception | Sponsored by Forescout

  4. March 4 Monday
  5. 7:30 - 8:15 AM

    • Breakfast | Sponsored by Digital.ai

  6. 8:30 - 8:45 AM

    • Opening Remarks with Stephen Sparkes

    Event Toggle Arrow

    Stephen-sparkes-1Stephen Sparkes is the EVP, CISO & Enterprise Platforms at Scotiabank. Stephen is also FS-ISAC's Board Director. Prior to joining Scotiabank to lead Information Security and Control, Stephen was the head of Cyber Security Technology within the Global Information Security team at Bank of America. Stephen has held multiple leadership roles on Wall Street, including CIO for Barclays Capital in the Americas, CTO for Investment Banking and Capital Markets, co-head of Infrastructure, and head of Technology and Information Risk at Morgan Stanley. 

    Earlier in his career, Stephen headed Fixed Income Technology for Credit Suisse First Boston, was a Stratus systems engineer for Salomon Brothers, and started out as a programmer for Logica working on ATM and point-of-sale systems. He also spent a year at an enterprise middleware startup, Incapture Technologies, before joining Bank of America. 

    He is a long-standing champion of diversity and has cultivated diverse leadership teams - and invested in mentoring programs - to encourage greater diversity in the workplace.

  7. 8:30 - 8:45 AM

    • FS-ISAC Board of Directors Election Overview
    Matthew Harper, Aflac

  8. 8:45 - 9:30 AM

    • Keynote with Jonah Berger

    Event Toggle Arrow

    Berger.J.PhotoJonah Berger is a Marketing Professor at the Wharton School at the University of Pennsylvania, an internationally bestselling author, and a world-renowned expert on change management, influence, word of mouth, natural language processing, consumer behavior, and how products, ideas, and behaviors catch on.

    He has published over 50 articles in top-tier academic journals, teaches Wharton’s most popular online course, and popular accounts of his work often appear in places like The New York Times, Wall Street Journal, and Harvard Business Review. Over a million copies of his books, Contagious, Invisible Influence, and The Catalyst: How to Change Anyone’s Mind are in print in over 35 countries around the world.

    Berger often keynotes major conferences and events like SXSW and Cannes Lions, advises various early-stage companies, and consults for organizations like Apple, Google, Nike, Amazon,GE, 3M, and The Gates Foundation.

  9. 9:30 - 10:00 AM

    • Navigating Current and Future SEC Requirements
    Meg Anderson, Principal; Stacy Graham & Emily Helmke, Booz Allen Hamilton; Peter Marta, Hogan Lovells US LLP

  10. 10:00 - 10:30 AM

    • CISO-GPT: Leverage AI to Augment Corporate Security Posture
    Kunal Anand, Imperva

  11. 10:30 - 11:00 AM

    • AM Networking Break | Sponsored by DataTheorem

  12. 11:00 - 11:45 AM

    • Enhancing Software Supply Chain Risk Management with SBOMS
    Linda Betz, FS-ISAC; Rao Lakkakula, JPMorgan Chase; Nathan Rodgers, JPMorgan Chase; David Steele, Bank of America

  13. 11:00 - 11:45 AM

    • Not Your Average Hack-Hers
    Sharon Flategraff, Mastercard; Liz Geary, FS-ISAC; Kristina Dorville, Truist Insurance; Monica Maher, Goldman Sachs; Sydney Jones, BNP Paribas

  14. 11:00 - 11:45 AM

    • Partnering with Telecom to Combat Voice and Text Abuse
    Elizabeth Gray Nunez, Verizon; Guy Pearson, Bank of America; Jaime Zetterstrom & Stacy Graham, Communications Fraud Control Association (CFCA)

  15. 11:00 - 11:45 AM

    • A Peer-Benchmarked C-Suite Threat Resilience Story
    Tim Wainwright,Security Risk Advisors; Lauren Jones, Mass Mutual

  16. 11:00 - 11:45 AM

    • Closing the Gap: Automating Citi's Cloud Security Hygiene
    Mike Wu, Citi

  17. 11:00 - 11:45 AM

    • Blue Teamer’s Guide to Detecting Qakbot
    Eric Maiwald & Trent Liffick, Fifth Third Bank

  18. 12:00 - 12:45 PM

    • Investing in People: The State of Workforce Development
    Bridgette Walsh, FS-ISAC; Nicole Tisdale, Aspen Digital; Drenan Dudley, Office of National Cyber Director; Ron Green, Mastercard

  19. 12:00 - 12:45 PM

    • Detecting Multi-Cloud Attacks While Protecting Data Privacy
    Saryu Nayyar, Gurucul

  20. 12:00 - 12:45 PM

    • New Regs and the Path to Supply Chain Cyber Resilience
    Perry Robinson, SecurityScorecard; Ahmed Pasha, Nomura Americas

  21. 12:00 - 12:45 PM

    • Down the Rabbit Hole with Fusion Threat Research
    Andrew Lee & Ethan Culp, Nationwide

  22. 12:00 - 12:45 PM

    • Fraud Prevention Roundtable
    Sam Strohm, PNC; Monica Rowe, Mazuma Credit Union; Amy Boawn, FS-ISAC; Jeff Taylor, Regions Bank

  23. 12:00 - 12:45 PM

    • Enterprise Cyber Cost Optimization (ECCO)
    Siddharth Kakkar & Soroush Setodeh, Ernst & Young

  24. 12:45 - 1:45 PM

    • Lunch | Sponsored by HiddenLayer

  25. 2:00 - 2:45 PM

    • The Next Nth Party Disaster: Addressing the Known Unknown
    Adam Perino, Regions; Arun Warikoo, BNP Paribas

  26. 2:00 - 2:45 PM

    • An Iconoclastic Guide to Establishing a CTI Program
    Kyle Davis, Target

  27. 2:00 - 2:45 PM

    • Cyber Vigilance Through Active Situational Awareness
    Steve Winterfeld, Akamai

  28. 2:00 - 2:45 PM

    • Applying AI to API Security
    Josh Goldfarb, F5

  29. 2:00 - 2:45 PM

    • Meeting Security Needs in a Resource-Constrained Environment
    Nick Kakolowski, IANS; Steve Martano, Artico Search

  30. 2:00 - 2:45 PM

    • Building Blocks: Anatomy of a Cyber Fraud Kill Chain
    Ryan Praskovich, Nationwide; Micah Semon, PNC; Anna Fridley, Navy Federal CU; Matt McGorrin, Chime Financial

  31. 2:45 - 3:15 PM

    • PM Networking Break | Sponsored by GuidePoint Security

  32. 3:15 - 4:00 PM

    • A Tale of Two DDoS Attacks
    Bayly Eley & David Zepp, US Bank

  33. 3:15 - 4:00 PM

    • Sound General Quarters
    Wayne Rynhoud & Carlos Recalde, Sheltered Harbor

  34. 3:15 - 4:00 PM

    • Creating Developer-Security Alliances: Proactive Strategies
    Alex Rice, HackerOne

  35. 3:15 - 4:00 PM

    • Catching Phish: Establishing a Telecommunications Abuse Prog
    Sarah Schuilenburg & Michael Rimkus & Micah Semon, PNC Financial Services

  36. 3:15 - 4:00 PM

    • Wrong and Proud: How to Fail Right
    Meg Anderson, Principal

  37. 3:15 - 4:00 PM

    • Building Trust in Applications: SSDF and SLSA to the Rescue
    Alex Ilgayev, Cycode; Roland Cloutier, The Business Protection Group

  38. 4:15 - 5:15 PM

    • Not Your Grandparent’s AI:A New Age of Cybersecurity in FSI
    Erik Gaston & Tim Morris, Tanium

  39. 4:15 - 5:15 PM

    • Attack Surface Protection: CTI Turbocharges Traditional ASM
    David Brooks, Intel 471

  40. 4:15 - 5:15 PM

    • Plunge into Compliance:Stay Afloat on the Attack Surface
    Ali Cheikh, runZero

  41. 4:15 - 5:15 PM

    • Security Validation as the Heart of Exposure Management
    Jason Mar-Tang, Pentera

  42. 4:15 - 5:15 PM

    • Flashpoint's Response to Emerging AI Cyber Threats
    Christian Rencken, Flashpoint

  43. 4:15 - 5:15 PM

    • Why Threat Intelligence is a Crucial Layer in Cyber Defense
    Tony Anscombe & Daniel Navarro, ESET

  44. 4:15 - 5:15 PM

    • The Era of AI: Augmented Security vs Advanced Threats
    Ross Rosenzweig, Blackberry Cybersecurity

  45. 4:15 - 5:15 PM

    • Stairwell Demonstration
    Aaron Mog, Stairwell

  46. 5:30 - 6:30 PM

    • Booth Crawl Reception | Bar sponsored by ServiceNow

  47. March 5 Tuesday
  48. 7:30 - 8:15 AM

    • Breakfast | Sponsored by YouMail PS

  49. 8:15 - 8:30 AM

    • Opening Remarks

  50. 8:30 - 8:45 AM

    • Critical Providers Panel
    Steve Winterfeld, Akamai; David Stone, Google

  51. 8:45 - 9:15 AM

    • Cyber Resilience: The Practical Impact of New Regulations
    Wade Lance, Synack; Ryan Hebert, ICE

  52. 9:15 - 9:45 AM

    • Post-Quantum Cryptography: Is 2024 the Year?
    Colin Soutar & Itan Barmes, Deloitte; Jeff Stapleton, Wells Fargo; Bill Newhouse, National Institute of Standards and Technology

  53. 9:45 - 10:15 AM

    • AM Networking Break | Sponsored by Morgan Franklin

  54. 10:15 - 11:00 AM

    • AI Risk WG: Generative AI Threats and Controls Framework
    John Hancock & Hiranmayi Palanki, American Express

  55. 10:15 - 11:00 AM

    • Securing Open Source Software in the Financial Sector
    Rao Lakkakula, JPMorgan Chase; Gabriele Columbro, FINOS; Omkhar Arasaratnam, Linux Foundation; Brittany Istenes, Fannie Mae

  56. 10:15 - 11:00 AM

    • On Your Left: How Target Collects and Processes Intelligence
    Matthew Brady & Derek Thomas, Target

  57. 10:15 - 11:00 AM

    • Journey to an Effective User and Entity Behavior Analytics
    Scott Kerber & Steph Klingele, State Farm

  58. 10:15 - 11:00 AM

    • Spider Stompin': Turning Weak Signals into Noise
    Chester Le Bron & Chris Beckett, Northwestern Mutual

  59. 10:15 - 11:00 AM

    • How Fraud Info Sharing Helps Prevent and Mitigate Fraud
    Michael Timoney, FRB Boston; Scott Anchin, ICBA; Amy Boawn, FS-ISAC; Ryan McNaughton, North American Banking Company

  60. 11:15 -12:00 PM

    • A Business Case for IAM Transformation
    Ann Barron-DiCamillo, Citi; Jim Routh, Saviynt; Ariel Weintraub, Aon; Laura Deaner, Northwestern Mutual

  61. 11:15 -12:00 PM

    • Build a Preventative AI-Powered Approach to DDoS Protection
    Matthew Andriani & Rona Amram, MazeBolt; Yaron Weiss, Payoneer

  62. 11:15 - 12:00 PM

    • The Intersection of Insider Risk and Incident Response
    David Jarrett & Elisa Corcoran, DTCC

  63. 11:15 - 12:00 PM

    • Journey to Modern FIDO Authentication
    Josh Cigna, Yubico; Alfred Bonilla,Mastercard; Jean-Carlos Chavez, Mastercard; Shashank Modi, Freddie Mac

  64. 11:15 - 12:00 PM

    • Case Study: Disrupting Check Fraud
    Eric Huber & Kevin Thomsen, TD Bank

  65. 11:15 - 12:00 PM

    • Coordination & Information Sharing In Global Institutions
    Elizabeth Wanic & Bradley Smith, Barclays

  66. 12:00 - 1:45 PM

    • Tempt the Titans Lunch

  67. 12:25 - 12:40 PM

    • Achieving AppSec Maturity Through Unification
    Mark Lambert, ArmorCode

  68. 12:40 - 12:55 PM

    • World's First: Fast, Real-Time, Encrypted Data Processing
    Alessandro Watson, Vaultree

  69. 12:55 - 1:10 PM

    • Unlocking Visibility in FinServ for Better AppSec Programs
    Joe Nicastro, Legit Security

  70. 1:10 - 1:25 PM

    • Beyond Prioritization: Parallel Workflows to Max Efficiency
    Ravid Circus, Seemplicity

  71. 2:00 - 2:45 PM

    • Financial Public Key Infrastructure (PKI)
    Jeff Stapleton & Peter Bordow, Wells Fargo

  72. 2:00 - 2:45 PM

    • Evolving Protection Beyond the Four Walls
    Roland Chan & J.R. Crocker, Bank of America

  73. 2:00 - 2:45 PM

    • Addressing the Domino Effect of Third-Party Risk
    Brendan Conlon, BlueVoyant

  74. 2:00 - 2:45 PM

    • CTI & Fraud Collaboration Playbook
    Stas Alforov, Recorded Future

  75. 2:00 - 2:45 PM

    • Partnering for Card Fraud & Data Security Protection
    Karen Helmberger, FS-ISAC; Christopher DeAngelis, Zelis; Chelsea Lopez, FIS; James Boyd, Shazam

  76. 2:00 - 2:45 PM

    • Managing Identity Attack Paths in Active Directory and Azure
    Justin Kohler, SpecterOps; Adam Przybyszewski, Edward Jones

  77. 2:45 - 3:15 PM

    • PM Networking Break | Sponsored by Morgan Franklin

  78. 3:15 - 4:00 PM

    • Claims Automation Risk Integration and Platform Development
    Hailey Phillips & Stephen McCamy, Aflac

  79. 3:15 - 4:00 PM

    • How to Take Cookies from the Cookie Monster: Genesis Market
    John Fokker, Trellix

  80. 3:15 - 4:00 PM

    • Building a Country Threat Assessment Matrix
    Olivia DiFresca & Emelie Andrusyszyn, TD Bank

  81. 3:15 - 4:00 PM

    • Keep Calm and Patch On: Intel Based Vulnerability Management
    Tyghe Conway & Jared Smolin, Synchrony

  82. 3:15 - 4:00 PM

    • Data Security: Not Just for the AI Generation
    Raymond Lipps & Tobias Pischl, Symantec by Broadcom

  83. 3:15 - 4:00 PM

    • The Evolution & Future of Identity
    Alicia Gamel, Fifth Third Bank; Erica Day, First Financial Bank; Devon Leary, Western & Southern Financial; Jocelyn Whitfield, Fifth Third Bank

  84. 4:15 - 5:15 PM

    • The Top-10 Operational and Security Risks of OSS Consumption
    Brian Hmelyar, Endor Labs

  85. 4:15 - 5:15 PM

    • Harmony & Hazard: The Insider Threat Balance
    Findlay Whitelaw, Securonix

  86. 4:15 - 5:15 PM

    • Integrate Acquisitions & Manage Risk: The DTCC Experience
    Rick Holland, ReliaQuest; Robert Moncini, DTCC

  87. 4:15 - 5:15 PM

    • Mastering Shadow SaaS: Security and Efficiency
    Haviv Ohayon & Levona Simha, Suridata

  88. 4:15 - 5:15 PM

    • Solving the Human Element using Adaptive Email Security
    Jordan Mertel, Egress Software Technologies

  89. 4:15 - 5:15 PM

    • Securing APIs - The New Sheriff in Town
    Karl Mattson, Noname Security

  90. 4:15 - 5:15 PM

    • Top Interview Fraud Tactics and How To Combat Them
    Ryan Rowcliffe, HYPR

  91. 4:15 - 5:15 PM

    • The New Attack Profile for Financial Services Organizations
    Andy Olpin, Lookout

  92. 6:00 - 10:00 PM

    • Signature Event | Sponsored by Abnormal Security; Analyst1; Armis; Entrust; and Obsidian

  93. March 6 Wednesday
  94. 7:30 - 8:30 AM

    • Breakfast | Sponsored by Splunk

  95. 8:30 - 8:45 AM

    • Opening Remarks

  96. 8:45 - 9:15 AM

    • The New Security Landscape in the Era of AI
    Bret Arsenault, Microsoft

  97. 9:15 - 9:45 AM

    • Revamp Advisor Access: Optimizing Security & Reducing Cost
    Scott Montgomery, Island

  98. 9:45 - 10:15 AM

    • AM Networking Break | Sponsored by Morgan Franklin

  99. 10:15 - 11:00 AM

    • The Evolution of SDLC: The SECURE Development Lifecycle
    Jeremy Mill, Varo; Jamie Smith, Snyk; Viswanath Vachanala, Varo

  100. 10:15 - 11:00 AM

    • Protecting Digital Assets
    Sudha Iyer, Citi; Karen Helmberger, FS-ISAC; David Cass, GSR

  101. 10:15 - 11:00 AM

    • What’s Next in AI and Automation for Security Operations?
    Kevin Kin, Palo Alto Networks

  102. 10:15 - 11:00 AM

    • Cyber Resilience Continuous Improvement: Securing the Future
    Dr Miroslav Kis & Bobby Singh, TMX Group

  103. 10:15 - 11:00 AM

    • Countering Emerging APAC Threats
    Santiago Holley, General Electric; Noah Rivers, Wells Fargo

  104. 10:15 - 11:00 AM

    • Beyond Basics: Expert Use of FS-ISAC Resources in IR and CTI
    Rebecca Merson, US Bank; David Broad, CIBC; Matthew Prouse, Golden 1; Annalicia Russell, FS-ISAC

  105. 11:15 - 12:00 PM

    • Building an Effective Red Team Program for Maximum Impact
    Trevin Edgeworth, Bishop Fox

  106. 11:15 - 12:00 PM

    • Shields Up, Shift Left: The Evolution of Cyber Defense
    John Markott & Steven Zaki, PWC

  107. 11:15 - 12:00 PM

    • The Dark Side of GenAI
    Robert Boyce & Amy Geiger, Accenture

  108. 11:15 - 12:00 PM

    • External Attack Surface Management & Intelligence Unite!
    AJ Nash, ZeroFox

  109. 11:15 - 12:00 PM

    • Cyber Threat Intelligence for Latin American Finance
    Anne Meriwether, FS-ISAC; Lianne Dings, BNP Paribas; Mark Odiorne, Bank of America

  110. 11:15 - 12:00 PM

    • Anatomy of Incident Response
    Jerry Zepp, SEIC

  111. 12:15 - 1:00 PM

    • Achieving Resilience and Scale in the Cloud
    Swaroop Sham, Wiz; Ryan Hebert, ICE

  112. 12:15 - 1:00 PM

    • Taming without Maiming: AI, Have it Your Way.
    Priyadarshi Prasad & Himanshu Shukla, Lightbeam

  113. 12:15 - 1:00 PM

    • Incident Response Roundtable
    Jeffrey Korte, FS-ISAC; Dana Turner, Union Bank and Trust

  114. 12:15 - 1:00 PM

    • The Great Migration: Journey to a Modern GRC Platform
    Dan Murphy & Marcel Conyers, Northwestern Mutual

  115. 12:15 - 1:00 PM

    • Consolidating Intel Processes: An Arvest Fusion Center Story
    Greg Mathes, Arvest Bank; Neal Dennis, Cyware

  116. 12:15 - 1:00 PM

    • Task Failed Successfully: Planning Efficient Purple Teaming
    Chris Carlis & Austin Rappeport, Zurich Insurance Group

  117. 1:00 - 2:00 PM

    • Lunch | Sponsored by GuidePoint Security

  118. 2:15 - 3:00 PM

    • Discussions with Exchanges after LockBit 3.0 Attack
    Liz Geary, FS-ISAC; Peter Falco, FS-ISAC; Tim McCabe, U.S. Department of Treasury

  119. 2:15 - 3:00 PM

    • The Not-So-Easy Task of Building a Threat Management Team
    Stephanie Copley, Edward Jones

  120. 2:15 - 3:00 PM

    • Addressing Cloud and AI Risks via PPP Collaboration
    Todd Conklin & John Carlson & Paul Benda, American Bankers Association - US Treasury Department

  121. 2:15 - 3:00 PM

    • Exposing Adversarial Use of AI for Cyber Enabled Operations
    Jared Skivington, Bank of America; Monica Maher, Goldman Sachs; Daniel Sorek, Goldman Sachs

  122. 2:15 - 3:00 PM

    • Collaborative Cyber Resilience in Canadian Financial Sector
    Chander Jethwani, Payments Canada

  123. 2:15 - 3:00 PM

    • SaaS Insider Threat Reality vs Gartner Alphabet Soup
    Gary Owen, iCapitalNetwork; Charles Blauner, Cyber Aegis Advisory

  124. 3:15 - 4:00 PM

    • Embracing Systems Thinking in IR
    Jack Burgess, Square

  125. 3:15 - 4:00 PM

    • The New World of Hyperautomated Risk Quantification
    Kanan Vaidya & Rajneel Dhotre, TIAA

  126. 3:15 - 4:00 PM

    • BISO Bootcamp: Everything You Need for a Successful Program
    Tess Andrekus, MassMutual; Ann Hine, USAA; Nick Kelley-Ossey, Travelers Company

  127. 3:15 - 4:00 PM

    • Security Asset Awareness Not Asset Management
    Matthew Prouse, Golden1

  128. 3:15 - 4:00 PM

    • A Survival Guide to PIR Stakeholder Interviews
    Justin Rager & Alena Funtikova-White, State Farm Mutual

  129. 3:15 - 4:00 PM

    • Future Proofing Yourself in a Post Quantum World
    Abhay Raman, SunLife

  130. 4:00 - 5:00 PM

    • Closing Reception