(Use Google Chrome or Mozilla Firefox to secure your place)

Establishing A Cyber Secure Financial Services Industry
It’s a fool’s errand to go believing that the Financial Services industry is such fertile ground for cyber threats and incidents simply because of the money. As we know, a successful ransomware attack that nets a significant sum of money for a cyber criminal is nice, but the bigger gain is understanding how your system has been breached. The IP of where future value will be is more valuable than simply securing current currency.

The greater cyber security industry is expediting a tectonic shift to meet the threats associated with a brand new mostly remote workforce. Though the industry has spent the past couple of years ensuring the front lines are aware of myriad threat vectors, awareness campaigns remain on the rise. Our recent Cyber Security Hub survey outlined that the biggest current area of focus is in fact, security awareness.  And it’s not just time spent- asked where budget is being allocated- security awareness is a top three spend.

Compliance with regulation is the reason for some of that focus and spend and the Financial Services industry knows all about regulation. There is an evolution of cyber security regulation to speak to issues beyond privacy. The sharing of attack information, once anathema to regulators- has had a re-think as state and corporate infrastructure can only compete with malicious behavior if collaborative principles are utilized on both sides.

It’s from this brand new landscape that Cyber Security Hub is proud to launch our Financial Services Cyber Security Summit:
Key Themes:
  • Gaining an understanding of FS collaboration tools and consortiums
  • True IAM purpose built for FS
  • The evolution from DDoS to Credential Stuffing
  • Developing secure infrastructure, frameworks and standards
  • Remaining best in class in GRC while outpacing cyber criminals
  • Realizing how far we’ve come on security awareness- and how far we have to go
  • Preparing for the future of FS cyber security due to the coming transaction velocity tsunami
  • How to keep the FS enterprise secure with an onslaught of remote workers
  • Exploring the scope of the CISO role as one part Technical, one part Legal and one part Business
What to expect from CS FS Digital:
  • Access to cutting edge content and world class speakers from the comfort of your desk
  • Video: Downloadable mp4 recordings of all presentations
  • Downloadable slides you can review again and again
  • Opportunity to meet cutting edge technology providers

Who is it for?
  • Cyber Security executives who want to hear from and engage with their peers on similar pain points/challenges faced within the Financial Services industry
  • Attendees of IQPC Cyber Security events that missed sessions or want to re-listen
  • CS professionals based outside the Financial Services industry who want to learn from Financial Services case studies

Who should attend?
  • CISOs
  • CIOs
  • Head and directors of Cyber Security
  • Head and directors of Information Security
  • Head and directors of IT
  • Providers of cyber security solutions, services and software
Day One: September 15
Chairman´s Opening Remarks

9:00am ET
FS Fertile Attack Landscape From DDoS to Brute Force Attacks to Credential Stuffing
  • Realizing the evolution from DDoS Attacks to Credential Stuffing over the past three years
  • Actually realizing the distinction between the attacks in your SOC
  • Noting the distinction of purpose behind each attack
  • Overcoming the disparate detection challenges posed by each attack

10:00am ET

FS Industry Collaboration: Matching The Infrastructure Of Collaborative Cyber Criminals
  • Understanding that cyber criminal infrastructure outperforms industry infrastructure due to true collaboration
  • Netting a paradigm shift through advanced industry collaboration
  • Ensuring industry collaboration is deep and wide to gain true participation and knowledge
  • Attaining best in class GRC while remaining creative to best support vulnerability management
  • Leveraging baseline industry standards around threat vector intelligence
11:00am ET

Unpacking The Challenges Within The Final Mile Of Cloud Migration
  • What crown jewels are still being protected on-prem?
  • Do you have the infrastructure visibility needed to forge ahead into further private cloud use?
  • How are the controls on your hybrid cloud evolving for the better?
  • What, if anything belongs in a public cloud environment?

12:00pm ET

Actually Conceiving Of A True GRCS Strategy
  • Not getting lost in the checkboxes of G, R and C by ensuring you are actually keeping your organization secure
  • Realizing how your GRCS strategy plays into the greater enterprise business vision
  • Ensuring your GRCS strategy is in line with your overall organization technology strategy
  • Comprehending how the corporate legal approach can inform your GRCS strategy
  • Building a GRCS strategy that ensures a defense in depth model and structure

Day Two: September 16
Chairperson’s Opening Remarks

9:00am ET

Thwarting The Threat Matrix When Transaction Velocity Increases By 40%
  • Realizing that the US Federal Reserve will in fact go to 24/7
  • The real-time payment and settlement service supporting faster payments has been pushed to 2021, but it’s coming
  • Steadily ramping up your threat intelligence and detection to ensure your defense is ready for the tsunami of offense on it’s way
  • Threading the needle on compliance to ensure a full real-time cyber security toolbox
10:00am ET

FS Endpoint Security Beyond Zero Trust
  • Knowing that a lack of knowledge of incident doesn’t mean there has not been an incident
  • Realizing your technology stack now lives with your employee’s kids
  • Ensuring consistent an continual improved user cyber security awareness
  • Scaling up your communications efforts as you ascend the privilege ladder

11:00am ET

Under Discussed: How Constant Conversation Has Not Uncovered Purpose-Built IAM/PAM Step-Change In FS
  • Zeroing in on fully integrated, truly comprehensive solutions 
  • Unpacking solutions looking for cradle to grave identity management
  • Uncovering administration and visibility
  • Diving in to find the pearls of implementation and maintenance
  • Demanding integration points for HR, IT, Business, & Vendor management
  • Capturing true lifecycle management
  • Ensuring trust isn’t necessary for zero trust solutions

12:00pm ET
Searching For FS SIEM Insights: Lost In The Data Warehouse, Drowning In The Data Lake 
  • Unpacking your on-prem SIEM protected data to find that you are data rich and insight poor
  • Securely recalculating the calculated does not net your financial services organization a competitive advantage
  • Identifying how to securely leverage external transaction velocity and buying propensity for your organization
  • Gaining an understanding that the data conversation is a risk conversation

1:00pm ET

Pristine Cloud Management To Vanquish The Cloud As Haven For Data Breaches
  • Moving forward with the understanding that most major breaches have occurred in the cloud
  • Having an honest conversation about your visibility over your data in transit
  • Having an honest conversation abut your knowledge of cloud leakage
  • Respecting the change management that must occur in cloud management
  • Identifying the legitimate advantages which cloud based AI & BI can bring
  • Quantifying your true cloud enterprise risk vs. reward

Featured Speakers

Cynthia Burke

Program Manager


Event Sponsors