Agenda Day 2

8:00 AM - 8:45 AM Networking Breakfast

8:00 AM - AM Panel: Managing, Interpreting and Implementing Regulatory Complexity

The industry is faced with new regulations from New York Department of Financial Services and other bodies including the European Union General Data Protection plan. Nation states, hacktivists and other cyber criminals seek to exploit technological vulnerabilities to access data. While the types of cyber security threats continue to grow, so do the cyber security regulations. In this session, explore the way growing regulations are affecting operations. Technology alone is not enough, but a blend of people, processes and technology. The New York regulations require companies to have a CISO who will implement correct risk assessments and processes- the regulations also require reporting of attempted breaches and ensuring third-parties are also secure. The regulations 180-day transitional period ends in August with some of the requirements and the two-year transitional period will end in March 1, 2019. In this interactive session, discuss the impact, effect and next steps from transitional legislation and other evolving legislation and regulations.

9:35 AM - 10:05 AM Business Meetings

10:05 AM - 10:35 AM Business Meetings

10:35 AM - 10:50 AM Networking Break

10:50 AM - 11:35 AM BrainWeave: Bring in the Machines: Intelligent and Proactive Defense

In this digital age, security and regulatory requirements necessitate breach prevention, user protection and rapid threat analysis. Yet attackers have an advantage over defenders as opportunity and convenience drive technology. Security executives must look at the entire lifecycle of threats and focus security priorities. Working together is essential in sharing threats to prevent attacks.
In this session:
•Intrusion prevention / detection
•Anti-malware / machine based learning protection
•Efficiency in the resolution process
Session themes: Machine Learning, Intrusion Detection, Malware Prevention, Threat Sharing

10:50 AM - 11:35 AM Navigating Biometrics for Financial Services

While facial recognition, iris scanning and biometric security may sound like the stuff of sci-fi movies, today’s financial services industry must solve security and meet customer needs simultaneously. The rapid pace of innovation continues in financial services, especially in biometrics including real-time authentication for payment and money transfers through the mobile banking applications.
Organizations must adopt a pro-active strategy with a focus on the most vulnerable areas while giving consumers and corporate users the functionality and services they receive from other businesses.
•Weighing drivers and challenges to biometrics adoption
•Streamlining multi-factor authentication
•Ensuring consistency and reliability
Session themes: biometrics, multi-factor authentication, implementing emerging technologies

11:40 AM - NaN:NaN AM Case Study: Role of Law Enforcement in Cyber Security

The threat of cyber attacks is increasing daily and many companies have found themselves victimized by criminals and nation state actors. No industry segment is immune yet financial services continue to be a popular target of criminals. The purpose of this presentation is to provide this information so companies can improve their cyber security posture and protect their critical data. This session will look at the public-private partnership in fighting cyber crime with law enforcement and financial services.

12:10 PM - 1:10 PM Networking Lunch

1:10 PM - 2:15 PM Roundtables Small, targeted discussions enabling open exchange amongst industry peers

  • Evolving Information Sharing: Gaining Insights into Intelligence
  • Modern Espionage: Detecting Spies, Hacktivists and Trusted Insiders
  • Secure Sharing of Critical Data- Control, Protection and Visibility

2:15 PM - 2:45 PM Business Meetings

2:45 PM - NaN:NaN AM Business Meetings

3:20 PM - 4:05 PM BrainWeave: Utilizing Deception to Reduce Fraud and Insider Threats

The emerging technology of deception offers early detection of in-network threats. In this session, explore how deception strategies can lessen the risk of fraud, help over tasked security teams and provide a more proactive approach. Deception adjusts to varying network conditions and does not require known attack paths. The discussion will include case studies of actual deployments within financial services.
In this session:
•Utilizing deception for advanced threat detection
•Assessing varying results of deception techniques
•Deploying deception in incident response

Session Themes: Deception, Threat Mitigation, Incident Respons

3:20 PM - 4:05 PM Master Class: Providing True Data Protection Beyond Compliance

Investigate the use of the cyber security solution stack to get beyond compliance and into protection of key assets and data. Participants will discuss the challenges of implementing a comprehensive security solution which delivers as promised.
In this session:

•Communicating confidently with all stakeholders from the board to business units to ensure true security
•Understanding of the importance of clear visibility into the complete environment, including potential dark endpoints
•Instilling awareness of the need to leverage and protect investments in cyber security solution stacks.
Session Themes: Data security, Comprehensive security solutions

4:05 PM - 4:20 PM Networking Break

4:20 PM - 4:50 PM Business Meetings

4:50 PM - NaN:NaN AM Business Meetings

5:20 PM - 6:00 PM Panel: Creating Emerging Technology in Financial Services

Fintech is disruptive technology within financial services that impacts how it operates including mobile payments, money transfers, fund raising and asset management. This disruptive technology is changing what needs to be secured. Securing in an Internet of Things environment means a much wider attack surface with extra security challenges.
In this session examine:
•Eliminating time consuming and repetitive tasks
•Using machine learning to model user, device and network behaviors
•Expanding beyond rules and signatures to mitigate evolving attacks

Session Themes: Artificial Intelligence, Machine Learning, Automation, Intrusion Management, Internet of Things
Networking Reception


6:00 PM - 7:00 PM Networking Reception