When it comes to fraud prevention, many organizations overlook the insider threat - both the malicious actor who intends to commit fraud, as well as the accidental insider who makes a mistake or is taken advantage of by an external entity? The CERT Insider Threat Center at Carnegie Mellon University is one of the...
The complexity of information technology and the constantly evolving threat landscape makes implementing appropriate controls and processes to secure information assets a major challenge for most enterprises in and out of government. The number of vulnerabilities organizations face is mindboggling: the National...
Applications run your businesses, power grids, defenses, personal and business banking, social networks, hospitals, and entertainment. They are your company's crown jewels, and they continue to be the primary target for hackers' attacks. As your business demands that software is developed faster, application security...
Snowden proved you can't trust on the inside. OPM proved you can't trust the outside. Who should you trust when it comes to your data? No one! In this provocative and informative presentation, retired Brigadier General Greg Touhill, the first Chief Information Security Officer of the U.S. government and current...
Cyber threats pervade almost every aspect of our lives today. Should we be more concerned? Should we be more aggressive in our pursuit of solutions? Join Dr. Ed Amoroso, former CISO of AT&T and current CEO of TAG Cyber, as he walks us through:
How can we prevent election meddling with so many exploitable...
What are the keys to successful threat-intelligence sharing between the public and private sectors? And given what we saw in 2016, how do we ensure the security of the 2018 mid-term election? This session explores how the private sector can use the government's experience and apply it, and develop public/private...
"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation states, cybercrime gangs or lone actors. Join...
Trustwave SpiderLabs has uncovered a new type of cyber-attack targeting the financial industry. Come find out how this "hybrid-style" campaign has resulted in over one billion USD in losses. Featuring a case study on a series of investigations, you will see the most recent pivot in the banking threat landscape and get...
Traditional Authentication is not a standalone fraud killer. One Time Passwords, Biometrics, Mobile Authentication via PUSH or SMS, these technologies by themselves are being subverted by new attacks. 15 years ago, with FFIEC guidance, One Time Passwords reduced fraud by themselves by over half. Today, new forms of...
The likelihood of a cyber-attack that bypasses all of your security controls is high and often not detected until it's already over. To solve this problem service providers have created a radically new model of cyber security services called Managed Detection and Response or MDR. The focus of MDR is to detect the...
Digital Risk is the greatest facet of risk most organizations now face, driven by global acceleration of digitization. It's an issue that has risen well-above the security group, and is forcing executives and boards to think beyond the core competency of their organization; because in many cases, they've transformed...
We are facing an inflection point in the world of cyber-attacks. Mega-attacks have spread fast to almost every country and every industry possible - from banking, transportation to healthcare to production lines. Regardless of all our current investments in cyber security, the majority of enterprises have experienced...
Why do the bad guys always have the best stuff? In most organizations their overworked security analyst, if they have one, are trailing the bad guys in technology and knowledge. This gap leads to a snowball effect of increased risk and frustration.
Join this session, as we discuss:
Where do you stand versus the...
Artificial Intelligence, Machine Learning and Data Science are among the many disciplines abused by cybersecurity marketing and snake oil salesman alike. But how do you separate snake oil from reality? Where do you turn for practical insight on emerging technologies that truly can improve your cybersecurity defensive...
Getting Cyber Security initiatives funded is difficult, now that you have the money how would you spend it to get the most value for all your efforts. Please join Arbor Networks as they discuss what others in the industry are doing by region and type of security defenses. They will review findings in the AT&T reports,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.