Agenda Day 1

Track 1A

11:00 AM - 11:45 AM Welcome Brunch & Registration

Track 1B

11:45 AM - 12:00 PM Sponsor Orientation

Track 1C

11:45 AM - 12:00 PM Delegate Orientation

Track 1D

12:00 PM - 12:15 PM Ice Breaker

Track 1E

12:15 PM - 12:30 PM Chairperson's Opening Remarks

12:30 PM - 1:00 PM Cyber Resiliency- Fortifying Responses to Weather Breaches


Cyber security dominates the news feeds and every breach means fielding calls from the board regarding the organization’s security posture- could this same attack happen to us? Strengthening the human element can minimize the impact of incidents and bolster organizational resiliency. The approach to security needs to be retooled to reflect the current breach climate. Breaches will happen, the focus needs to be how should the organization weather ransomware and other attacks including incident response and business continuity measures.
In this session:
•Embedding security culture into the corporate DNA
•Identifying crown jewels
•Keeping and testing plans and backups
•Maintaining Threat Intelligence

1:00 PM - 1:30 PM Identity and Access Management as a Team Sport

People, processes and technologies are all critical to effective privileged access management. The evolving IAM landscape improves business outcomes, strengthens the user experience and increases operational efficiency. Beyond a tick box for compliance, identity and security analytics can improve decision-making information for business managers, driving access revocation rates higher. Attend this session to learn how analytics can make your governance investment worthwhile with examples including:
  • Focusing on orphaned accounts
  • Detecting behavioral anomalies
  • Responding with multi-factor authentication

1:35 PM - 2:05 PM Business Meetings

2:05 PM - NaN:NaN AM Business Meetings

2:05 PM - NaN:NaN AM Business Meetings

3:10 PM - NaN:NaN AM BrainWeave: Next Steps in Security Awareness, Attitudes and Behavior

Cyber criminals continue to successfully and consistently exploit human nature to accomplish their goals. Employees are often the last line of defense between a sophisticated cyber-scam and internal systems, data, and customers. This session will provide practical advice to help organizations leverage effective security awareness and behavior management practices to strengthen their human firewall.
  • Practical security awareness and behavior management tips
  • Outlining how and where tools are helpful
  • Emerging industry trends
  • How to create a “human firewall”
  • Security Ambassador Program- lessons learned and best practices, gamification, security mascots
Session Themes: Security Awareness Training, Situational Awareness, Behavior Analytics


3:10 PM - 3:55 PM Master Class; Navigating Risk With Big Data and Predictive Analytics

Enterprise risk assessment and modelling using predictive analytics is a major tool for insurance, financial services and government. The availability of big data and the tools used to process data from multiple sources has led to a more comprehensive understanding of customers’ risk for actions ranging from defaulting on debt to suffering a major security incident. Financial institutions must understand data sources and where technology intersects. Using these tools and techniques to their fullest capacity will save enterprises money and time in the long run by avoiding less-desirable outcomes.
In this session:
  • Introducing the newest innovations for more precise assessment
  • Utilizing broad-base risk modelling to identify and define a customer profile
  • Exercising prudence in selecting data sets to avoid discriminatory analysis
Session Themes: Data Classification ,Identification, Digital Forensics, Business Intelligence

3:55 PM - 4:10 PM Networking Break

4:10 PM - 4:40 PM Business Meetings

4:40 PM - 5:10 PM Business Meetings

3:10 PM - 3:45 PM Ignite Session – 3 Quick Fire Presentations in 30 Minutes. Talk about getting to the crux of the matter, fast!

  • Case Study: Converging User Experience and IAM
  • Quantum Computing- What Would it Mean for Online Banking?
  • Innovating Ways to Modernize Device Identification to Reduce Fraud

5:10 PM - 6:15 PM Roundtable - Small, targeted discussions enabling open exchange amongst industry peers

  1. Understanding and Analyzing Threat Data- Utilizing Models Such As STIX for Threat Intelligence (Models for communicating threat intelligence)
  2. How Artificial Intelligence Will Affect Attack and Defense (Practical Real World Insights on Deploying Machine Learning and Artificial Intelligence)
  3. Establishing a Business Case for Expensive, Complex Projects (Board Communications)



6:30 PM - 7:30 PM Networking Reception