Agenda Day 3

7:45 AM - 8:50 AM Networking Breakfast

8:50 AM - 9:00 AM Chairperson's Opening Remarks

9:00 AM - 9:40 AM Panel: Effective Third Party Vendor Risk Management

Robust vendor vetting and management are key when working with third parties. As the cyber security executive, this adds the responsibility of proactively identifying risks, as well as verifying and overseeing that business partners and suppliers meet regulatory and compliance requirements throughout the life of the relationship. This session will explore the extended risk and attack vectors associated with vendor staff, products and services that originate outside of an enterprise’s defensive perimeter and offer best practices for assessing vendor compliance, including:
•Appropriate access levels for third parties user and system accounts
•Secure development of application integrations; including firewall configuration
•Sectioning internal networks to limit third party needs

9:40 AM - NaN:NaN AM Creative Solutions for the Skills Shortage- Developing Talent and Culture

The number of security openings exceeds the number of people available to fill them. A security culture needs to be embraced prior to technical security work. Within the security industry there is a problem of empathy where the victims of the cyber security breaches are punished. The whole world, which utilizes security systems, needs to be engaged to be effective. The true diversity of people who use the systems must be protected and represented. This means the security teams needs to include the variety of cultures and thinking protected. Clearly cyber criminals do not discriminate based on gender and strategies must be implemented to create and inform a growing, strategic workforce and pipeline. In this session, explore efforts for achieving a truly diverse industry and ways to recruit and retain diverse talent including women and minorities.
In this session:
•Planning long term with staff development and culture awareness
•Widening talent searches outside of IT
•Creating and empowering cross-functional teams

10:15 AM - 10:45 AM Business Meetings

10:45 AM - NaN:NaN AM Business Meetings

11:15 AM - 12:00 PM Evolving White Board Workshop Session

In this CISO, inspired session we will discuss a topic suggested by you and your fellow CISOs during the Cyber Security for Financial Services Exchange. Please put up sticky notes on the white board, which you would like to discuss during this workshop on Day 1. Then by lunch on Day 2 please rank, which topics are of most interest to you. Then by evening cocktails the chairperson will select the topic, which we will discuss during the workshop. (Please also, consider emailing the conference producer suggestions ahead of time at Melissa.Lattman@iqpc.com)

12:00 PM - NaN:NaN AM Chairperson's Closing Remarks