Fraud losses have reached staggering amounts - an estimated $20 billion last year. Moreover, this very lucrative crime is here to stay. How can businesses bounce back after being victimized? Sadly, many cannot. This makes prevention, identification and isolation imperative to business operations. This session focuses...
According to Javelin, in 2015 there were more than 1.5 million new account fraud victims who accounted for losses of $2.8 billion. This number increased by 40 percent in 2016. And with all the continued data breaches, there are no indications that this trend has slowed in 2017. The Equifax breach, which affected more...
We all know how fragile our digital identities are, and any business offering digital accounts knows about the risks of account takeover attacks. As more and more businesses undertake digital transformation strategies, account takeover becomes an increasingly lucrative attack option for fraudsters. With strategies...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law enforcement experts...
The European Union's General Data Protection Regulation has been the buzz of 2017, and security leaders globally understand the regulation's basics, including the 72-hour breach reporting mandate, the May 2018 enforcement date and the noncompliance penalty of up to 4 percent of annual global revenue or 20 million...
Will the Equifax breach be a game changer, or just another big-name security mishap that slowly fades away out of collective memory? Does this massive breach have the potential to be the incident that leads to sweeping regulatory changes, when it comes to credit bureaus and data collectors like Equifax? If so, what...
Implementing clouds in heavily regulated environments is either unscalable and slow, because of legacy audit requirements and processes, or simply implemented without audit controls. While these may seem like acceptable risks, the 20 million euro minimum penalty under GDPR, and the threat of blanket ransomware...
Organizations of all sizes today face serious and consequential risk management challenges. Technology is often presented as the ultimate solution. But in many cases, organizations are experiencing not just a technical challenge, but a "language" challenge, especially when it comes to risk management communication...
Ransomware presents some unique challenges to organizations, regardless of their size, industry or geography. It has very distinct behavior relative to other kinds of malware. For example, it actually tells you that an attack has taken place. From a defender's point of view, being alerted to an attack is far better...
Organizations are increasingly moving workloads to hosted Infrastructure-as-a-Service (IaaS) environments. In many cases, they are extending their data centers across one or more IaaS providers, creating hybrid cloud environments. This session will explore best practices for extending data centers to hosted...
How have major Canadian data breaches helped to shape incident response plans and data security at the organizational level? In this session, Imran Ahmad, an attorney who leads the cybersecurity practice at Miller Thomson and wrote the book, "Cybersecurity in Canada: A Guide to Best Practices, Planning and...
The financial risks to organizations from data breaches include share price hits, class action lawsuits, fines from regulators and reputational damage. As a result, the cyber insurance market is heating up. Larger insurers are already helping companies spot and mitigate weaknesses as part of their coverage and helping...
The biggest companies often take matters into their own hands when it comes to breach prevention, eschewing long-term relationships with vendors and charting their own courses with a dizzying array of technologies. Meanwhile, smaller companies fall further behind, struggling to find talent and budget, while security...
Many organizations are undergoing a transformation to support digital platforms and stay competitive. But to maintain security, they have to ensure that access to these platforms is limited. New vulnerabilities to cybercrime are being introduced through hybrid environments that often include remote access to systems...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.