September 22 - 24, 2019
The Ballantyne Charlotte, Charlotte, NC
Paul Hamman, Senior Vice President, Head of Cloud Security at Suntrust
Suntrust Logo

Paul Hamman

Senior Vice President, Head of Cloud Security

Check out the incredible speaker line-up to see who will be joining Paul.

Download The Latest Agenda

Day One: Sunday, September 22, 2019

Sunday, September 22nd, 2019

12:30 PM Evolving Threats and Empowering Security through the Cloud

The cloud offers economic, competitive and collaborative benefits to financial services. But the sensitive and regulated data kept by financial services requires heightened security measure. In this session, discuss the challenges and benefits of moving to the cloud. Look at how the changing threat landscape creates risks to traditional security practices. Examine current security trends affecting financial services  and approaches to protecting sensitive data:
•              Prioritizing and overcoming challenges to the cloud
•              Embracing the cloud with full visibility while managing shadow IT
•              Identifying gaps and ensuring regulatory compliance through the cloud

5:40 PM Converging Risk Management Across Multiple Disciplines to Address Recovery from Attacks

The parade of discussions regarding the Business Impact Analysis and Business Impact Assessment (collectively, the BIA) continue to play out across Business Continuity, Risk and Security industry events, discussion boards, articles, blogs, etc.  Discussion topics include streamlining, mechanizing and integrating the BIA with the Risk Assessment, and eliminating the BIA altogether as proposed by select new BCM and Security methodologies. This discussion will look at the necessary convergence and major expansion of the BIA across multiple risk disciplines supporting a fundamental business intelligence and requirements driven contribution to all of these risk domains, supporting Information Security, Data Privacy, Incident Management and Operational Risk (by example).
Importantly, the BIAs that are performed today by standalone BCM teams are increasingly becoming out of date and insufficient as business continuity, technology operations and the business are called upon to address recovery from cyber-attacks.