Information Security Media Group's Fraud, Security and Risk Management Summit brought together a diverse group of cybersecurity leaders and experts in New York City for a comprehensive day of education and collaboration on payment fraud, identity theft and third-party risk management.
AI will enable breakthrough advances in areas like healthcare, agriculture, education and transportation; it's already happening in many ways. But new technology also inevitably raises complex questions and broad societal concerns. As we look to a future powered by a partnership between computers and humans, it's...
Google's Android is the most popular mobile operating system in the world, powering over 2.5 billion devices.
In this exclusive session, Eugene Liderman, Director of Mobile Security Strategy, Google, outlines Android's multi-layered security strategy, which includes hardware and software protections, as well as...
in this session we'll first examine the current state of bot automation and the different attack modalities currently conducted through machine automation. We'll then dive into attacker tools, their infrastructure, and compromised credentials to demonstrate how they were used against a major retailer in a real-world...
IoT, the cloud, advancements in AI, regulatory fines, third-party risk, cyber fraud - we hear a lot about how the cybersecurity risk surface and threat landscape have evolved. But how about the new demands on cybersecurity leaders? What new skills, tools and strategies are needed to understand, quantify and manage...
As new prevention technologies are deployed, Fraudsters are forced to change their approach, develop new tools, and uncover new ways to monetize their activities. In this way, Fraud Protection has been a perpetual cat-and-mouse game.
We'll see a real story about a phishing attack that could involve each bank's...
National security, cyber incident response, and cyber security risk management experts analyze the current state of fraud within political campaigns. This includes current challenges campaigns are facing and how best to address those challenges. Join experts from the US CyberDome to learn how to ensure free speech...
Whether you're a large enterprise that has experienced a headline data breach or a midmarket organization that has just been paralyzed by ransomware, you share points in common. Which law enforcement agency do I call after the incident has been discovered? When do I involve legal counsel? What resources are available...
For the Nation to survive and flourish in the 21st century, where hostile actors in cyberspace are assumed and technology will continue to dominate every aspect of our lives, we must develop trustworthy, secure systems that are cyber resilient. Cyber resilient systems are systems that have security measures or...
In this exclusive one-on-one discussion, we will hear from Chris Calvert, Co-Founder and Product VP for Respond Software, to get his insights on:
Is AI falling short?
How do we successfully balance human and machine approaches to security?
How do we get on the right path?
Cyber threat actors are trans-national, well-funded and highly organized, they are utilizing leading-edge technology to attack merchants and stealing data at a large scale. Join us as we walk you through our research on what happens after the attacks. We will highlight when that stolen payment card data appears on the...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Aetna's Jim Routh on the benefits of 'unconventional controls.' Another influencer, Phil Reitinger of the Global Cyber Alliance discusses email and credential security and how DMARC can...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features New York Presbyterian's Jennings Aske on getting serious about medical device security. Another influencer, John Gunn of VASCO discusses the ISMG Faces of Fraud 2017: Survey Analysis and...
This monthly Security Agenda will highlight some of the most recent additions to our course library. September's edition features Ed Amoroso on the evolution of the role of a CISO. Other influencers like Hearst CISO David Hahn, First U.S. CISO, Gen. Gregory Touhill, Retired and Jennings Aske, CISO of New...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.