Day One: Sunday, September 22, 2019
10:30 am - 11:20 am Registration
11:20 am - 11:30 am Orientation
11:30 am - 11:40 am Thoughtexchange App Introduction
11:40 am - 11:45 am Chairperson's Opening Remarks
11:45 am - 12:15 pm Proactive Security: Pursuing Threats and Defending Against Cyber Crime
Financial services remain a lucrative target for sophisticated cyber criminals. Explore the latest threats to financial institutions and ways to enhance and improve proactive responses to defend and limit the impact of breaches. In this session, explore the intricacies of the processes, people and technology needed to dissuade attackers from penetrating your networks and reducing the return on investment of an attack.
In this session explore:
•Evolving attack trends and improving incident response
•Reducing the effectiveness of cyber crime
•Instilling proactive prevention including micro-segmentation of the enterprise network
12:15 pm - 12:45 pm Decoupling Security from Your Network: Blueprint for Micro-Segmentation Success
Protecting the digital assets of the trillion-dollar lender of lenders Fannie Mae began with an architectural shift to separate security from the network. Hear first-hand how Fannie Mae took advantage of this approach to operationalize segmentation – a foundational component of any Zero Trust strategy. Clayton will walk through the lesson’s learned when micro-segmenting Fannie Mae’s network.
Clayton MascarenhasDirector of Information Security Engineering & Operations
12:45 pm - 1:00 pm Collaborative & Courageous Leadership
Learn how innovative and dynamic leaders are leading the way by having courageous conversations within their organization. Discover how organizations are creating a culture that promotes openness, transparency and collaboration by empowering their employees to share their voice and consider the thoughts and ideas of others; shifting the corporate paradigm from closed and knowing to open and learning. In this session you’ll learn what collaborative and courageous leadership means to you and those around you.
1:00 pm - 2:00 pm Networking Lunch
2:05 pm - 2:35 pm Security Engineering is My Life(cycle)
Everything has a security consideration whether we build it or buy it. In today's environment of buy first or build quickly, how do we make certain that data is protected? Developing a security engineering discipline that is applied at any lifecycle stage can address this. This talk will look at some practical use cases.
In this session:
•Balancing security and productivity
•Providing real-time feedback loops throughout the organization
•Cultivating a forward-thinking vision for risk management
Janet OrenChief Information Security Officer
2:35 pm - 3:05 pm Tales from the SOC
Let Neustar take you through the key workings of our world class SOC. Learn how we mitigate attacks of all shapes and sizes. Get an overview of the types of attacks and trends we are seeing. See first hand via our interactive demonstrations how our daily attacks are handled and see a live global attack map. Most importantly though - come prepared with questions to make this interactive and let our experts help and guide you regarding your own needs online Security.
• Live DDoS Attack & Mitigation Demonstrations
• Education on DDoS and other online attacks
• Fundamental understanding of a SOC
• Learn from key Neustar customer case study examples
• Your questions answered on your particular business security requirements
Matthew WilsonTechnical Team Lead
3:05 pm - 3:35 pm Business Meetings
3:35 pm - 4:05 pm Business Meetings
4:05 pm - 4:35 pm Business Meetings
Masterclass4:50 pm - 5:35 pm The Human Deception Problem: Understanding and Defending Against Social Engineering Attacks
The most successful method of cyber-attacks continues to be phishing. These attacks cost organizations millions of dollars each year and things are just getting worse. As these attacks intensify and become more refined, technology is failing to keep up and your users will continue to fall prey. To effectively defend yourself against this, you have to understand how the attacks work, including the psychological triggers and tricks the attackers are using. This session will explore the different levers that social engineers and scam artists pull to make your users more likely to do their bidding.
Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by common criminals, to sophisticated social engineering and online scams. Additionally, he'll look at how you can ethically use the very same levers when educating your users.
•The Perception vs. Reality Dilemma
•Understanding the OODA (Observe, Orient, Decide, Act) Loop
•How social engineers and scam artists achieve their goals by subverting critical thinking steps
•How can you defend your organization and create your human firewall
Erich KronSecurity Awareness Advocate
Brainweave4:50 pm - 5:35 pm Adversary Oriented Security
David McGuire CEO Specter Ops
David McGuire CEO Specter Ops
In modern environments, the corporate security program utilizes an increasingly complex inter-relationship of people, processes, and technology in detection and response operations. However, incident response capabilities must be balanced against budgetary constraints and other requirements the security program must meet. How do you measure the effectiveness of your incident response program, and the investments your organization has made? What measure of confidence do you have in your organization’s ability to detect and respond to the worst of circumstances? These are not questions that can be answered by yet another technical solution, yet are critical in understanding how your organization is oriented against the adversary.
This discussion will include:
•Programs that can be utilized to measure the efficacy of the security and incident response technology, people and processes.
•Identifying deficiencies in enterprise adversary detection programs, and pursue continuous improvement in organization-wide detection capability.
•Methods to determining new investments to be made in incident response capabilities.
3 Quick Fire Presentations in 30 Minutes. Talk about getting to the crux of the matter, fast!
Ignite Session5:40 pm - 6:15 pm Digital Transformation: Data Diodes as Gateways to Protect, Detect, Respond and Recover
As financial institutions “open up” and digitally transform, an interlocked cybersecurity transformation plan is essential as the access to operations and data becomes more complex and must be secured. In this session, attendees can expect to learn what a data diode is and how data diodes help financial institutions conform to security frameworks. This includes protecting production applications and data, assisting in anomaly detection, and recovering from a ransomware, wiperware or other malware attack. Security analytics/SIEM, secure blockchain/cryptocurrency processing, and cyber recovery use cases will be reviewed.
Gary McGibbonBusiness Development Manager for Financial Services
Owl Cyber Defense Solutions, LLC
Ignite Session5:40 pm - 6:15 pm How Real-Time Asset Intelligence Enables Full Posture Control
In order to understand the business risk associated with critical systems and applications one needs to understand the state of controls within the ecosystem. This means absolute knowledge of physical and virtual devices on the network inclusive of access, configuration and protective controls. Forescout provides a continuous, real-time, and extendable device visibility platform to enable posture consistency and measurement from campus to datacenter to cloud. Key learnings you will take away from this session include:
· How to achieve continuous control of inventory – real-time, reconciled, and trusted CMDB accuracy
· Why 100% compliance to basic posture configurations should be the goal
· How to coordinate dynamic, unified network segmentation planning and enforcement
Ellen SundraVP, Americas, Systems Engineering
Ignite Session5:40 pm - 6:15 pm The Industrial Revolution of Penetration Testing
Aviv Cohen CMO Pcysys
Aviv Cohen CMO Pcysys
All the drawbacks of manual penetration testing, cost-efficiency, time, and scope limitations, have now been solved.
A major leap in technology has, for the first time, enabled machine-based penetration testing.
Now, with a click of a button, you can perform daily pen-tests without the need for third-party consultants.
Explore how to implement automated penetration testing and its effect on the world of risk validation.
6:15 pm - 6:45 pm Evolving Threats and Empowering Security through the Cloud
The cloud offers economic, competitive and collaborative benefits to financial services. But the sensitive and regulated data kept by financial services requires heightened security measure. In this session, discuss the challenges and benefits of moving to the cloud. Look at how the changing threat landscape creates risks to traditional security practices. Examine current security trends affecting financial services and approaches to protecting sensitive data:
- Prioritizing and overcoming challenges to the cloud
- Embracing the cloud with full visibility while managing shadow IT
- Identifying gaps and ensuring regulatory compliance through the cloud
Paul HammanSVP, Head of Cloud Security