Day Three: Tuesday, September 24, 2019
8:00 am - 8:45 am Networking Breakfast
8:45 am - 8:50 am Chairperson's Opening Remarks
8:50 am - 9:00 am Thoughtexchange Market Question
Market Question: What are some things organizations must do more of to transform and remain competitive?
9:00 am - 9:45 am Integrating Emerging Technology in Financial Services
Fintech is disruptive technology within financial services that impacts how it operates including mobile payments, money transfers, fund raising and asset management. This disruptive technology is changing what needs to be secured. Securing in an Internet of Things environment means a much wider attack surface with extra security challenges.
In this session examine:
· Eliminating time consuming and repetitive tasks
· Using machine learning to model user, device and network behaviors
Expanding beyond rules and signatures to mitigate evolving attacks
9:45 am - 10:15 am Case Study- Proactive and Strategic Security Development
Security Operations Model – A strategic approach to building a more robust and secure delivery model in Engineering, Operations and Identity and Access Management within Financial Services.Security Operations Model – A strategic approach to building a more robust and secure delivery model in Engineering, Operations and Identity and Access Management within Financial Services.
10:15 am - 10:45 am Business Meetings
10:45 am - 11:15 am Business Meetings
11:20 am - 11:55 am Enterprise Data Protection and Cryptography Strategy
In this session explore the journey of pioneering payments processing for in-store, online, and mobile environments over the last 30 years. With daunting industry compliance mandates such as PCI-DSS, and a wide range of global privacy mandates that include GDPR, CCPA, and beyond, a clear global strategy and enterprise framework approach to compliance is an integral piece of the enterprise infrastructure. Explore best practices for implementing robust key and secrets management, and data-centric security implementation with tokenization and format-preserving encryption technologies to protect cardholder data and address other personal privacy use cases.
Sid DuttaVice President - Global Head Of Data Protection & Applied Cryptography
11:55 am - 12:30 pm Evolving Threat Trends: Cryptojacking, Botnets, What's Next?
Staying ahead of the latest cyber threats and attack vectors is critical. Cyber criminals continue to successfully penetrate and exploit corporate networks looking for unpatched vulnerabilities and new entry points. Financial services networks are utilized unknowingly to transfer crypto currency through traditional payment paths such as ACH and wire transfers. Proactive hunting and mitigating of potential security incident and users with criminal intent is necessary since current cyber threats are often missed by traditional tools. Threat hunting assumes a breach with the focus on quickly detecting and responding with clear visibility of the network and endpoints.
In this session, explore the necessary proactive stance along with the current types of threats:
•Exploring the latest threats and trends
•Deriving threat intelligence from malware discovered during incident response
•Strengthening incident response and threat hunting skills