What does a targeted attack really look like? How can you effectively defend your organization? What does it take to recover from a headline-grabbing breach and rebuild trust with your customers?
Join Matthew Maglieri, CISO of Ashley Madison's parent company Ruby Life Inc. and ex-Mandiant consultant, as he presents...
When it comes to fraud prevention, many organizations overlook the insider threat - both the malicious actor who intends to commit fraud, as well as the accidental insider who makes a mistake or is taken advantage of by an external entity? The CERT Insider Threat Center at Carnegie Mellon University is one of the...
"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation states, cybercrime gangs or lone actors. Join...
An in-depth look at the frequency, magnitude, and manner in which modern enterprise networks change and the risks these changes pose, across all F100 FSI organizations. We highlight different technological and organization processes, such as M&A events, cloud migration, IoT deployment, and network misconfigurations...
Open source and third-party components help developers build and deploy applications faster. But with increased speed comes greater risk. Vulnerabilities in components are a hidden cost of free software. And their widespread use creates opportunities for attackers looking to exploit the most possible victims by...
Recent apparent hack attacks against Canadian banks, the sentencing of a Canadian for helping enable the Yahoo breach, and the Equifax breach's impact in Canada all point to the need to be more aggressive in ramping up cybersecurity efforts in light of emerging threats.
Protecting data has become more challenging as...
Cybercrime is a global and systemic problem that's growing exponentially. High-profile attacks can be committed with less sophistication because of services for hire readily available on criminal forums. This has resulted in making the methodology and attack vectors mainstream. The impact of new types of crime, as...
Cybercriminals have a seemingly unlimited arsenal of attack types at their disposal, ranging from identity theft and CEO fraud to botnet attacks and even clairvoyant scams. However, criminals' goals, by and large, remain unchanged: to profit as quickly and easily as possible. In this session, a senior detective from...
Will the Equifax breach upend the rules of the data breach notification game? Will it even be discussed in another year? Already, the breach is leading to tough questions about how personal data gets stored, sold and secured - or not - in the United States. Equifax also should consider itself lucky that it didn't lose...
In the wake of recent ransomware attacks, such as WannaCry, which have plagued organizations for the last year, what lessons do we have yet to learn? The widespread WannaCry attacks were not particularly sophisticated or stealth. So why did they have such an impact?
In this session, panelists discuss why the "wartime...
Detective Constable Raymond Black of the Met Police's FALCON Cyber Crime Unit has been an investigating officer for numerous high-profile hacking cases in Britain. Black offers several high-profile takeaways from cases investigated by FALCON and describes how law enforcement pursues cybercrime perpetrators and...
After a breach, businesses need to know their incident response from their digital forensics. Hint: Forensics enables organizations to know what happened, when and how, to guide incident responders as they defuse the problem, block further exploits and quickly restore all systems and data. Incident response expert...
The financial risks to organizations from data breaches come from a variety of angles, from share price hits to class-action lawsuits to fines from regulators to reputational damage. As a result, the insurance industry has jumped full steam ahead into cyber. Larger insurers are already helping companies spot and...
In an increasingly digital world, where players from virtually all sectors are racing to innovate, the risk of data theft is very real. The payment card industry has defined standards for protecting cardholder account data. But what about other data types? And what can be learned from payment card industry standards?...
Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But that's only half the battle. Securing the access pathways is just as critical to protecting critical systems and data from cyber threats. This session outlines the six steps...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.