This panel discussion covers the criminal use of newer forms of money movement to hide criminal proceeds and cash out. It examines how criminals use money movement with Sell, Coinbase, Fan Duel and other legalized gambling mechanisms.
Was last year’s record surge of ransomware and supply chain attacks an anomaly? Unfortunately, the FBI is positive it was not, and the outlook for the New Year is: more attacks. Many more.
In this exclusive session, James Dennehy, special agent in charge of the Intelligence and Surveillance Division at the FBI's New York Field Office, shares expert insight on:
• The current and future trajectory of ransomware, business email compromise, supply chain attacks and more;
• The resources the FBI brings to a cybercrime investigation;
• When and how to engage with the FBI before an attack has been detected.
Threats have rapidly evolved in the COVID-19 era. Does your IR plan have dust or has it evolved to meet today's threats? Have you transformed from cyber resilience to operational resilience?
To help reduce exposure to ransomware and related sanctions, the U.S. Treasury Department's Financial Crimes Enforcement Network in November updated a 2020 advisory to warn financial institutions to regularly update their compliance programs, monitor convertible currency transactions and comply with requirements for reporting suspicious activity.
In this exclusive interview with FinCEN Deputy Director Anna Lou Tirol, we will explore these and the additional measures the agency is taking in regard to ransomware.
The current state of identity for many enterprises relies on redundant and high friction steps to verify a user's identity information, because of the inability to unify and leverage previously verified information. Enterprises need a better approach to identity vetting to fully verify all user accounts in a low friction manner. Accountable Digital Identity Association's (ADIA) created an open specification to solve this problem. They created a working prototype that is scalable, supportable and empowers consumer with self-service capabilities to manage their own identity. ADIA enables consumers to present proof of a verified identity eliminating the need for ID proofing for every digital engagement before any transaction thereby reducing the risk of fraud.
Kay Turner joined FinCEN about a year ago. Her mission: to advance the use of digital identity, to create new partnerships with federal agencies and to spread awareness about the new challenges and opportunities brought by emerging technology.
In this exclusive IAM Summit session, Turner opens up on:
If we have learned anything from the past year-plus of cybersecurity headlines, it's this: Behind every great breach there is likely a password compromise. Clumsy, hard to remember, easy to phish … "Passwords are not fit for purpose," says Andrew Shikiar of the FIDO Alliance. And in this Summit exclusive he talks about:
In 2021, the Biden administration issued the most comprehensive cybersecurity executive order in history. How is the order being enforced to protect critical infrastructure and financial services? And how fares the administration's battle against ransomware?
In this exclusive keynote, Carole House, the director of cybersecurity and secure digital innovation within the NSC, discusses:
All content from Day 1 will be available on demand from 9 AM - 5 PM ET on Day 2, Wednesday, October 12th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.
This panel discussion covers the criminal use of newer forms of money movement to hide criminal proceeds and cash out. It examines how criminals use money movement with Sell, Coinbase, Fan Duel and other legalized gambling mechanisms.
Was last year’s record surge of ransomware and supply chain attacks an anomaly? Unfortunately, the FBI is positive it was not, and the outlook for the New Year is: more attacks. Many more.
In this exclusive session, James Dennehy, special agent in charge of the Intelligence and Surveillance Division at the FBI's New York Field Office, shares expert insight on:
• The current and future trajectory of ransomware, business email compromise, supply chain attacks and more;
• The resources the FBI brings to a cybercrime investigation;
• When and how to engage with the FBI before an attack has been detected.
Threats have rapidly evolved in the COVID-19 era. Does your IR plan have dust or has it evolved to meet today's threats? Have you transformed from cyber resilience to operational resilience?
To help reduce exposure to ransomware and related sanctions, the U.S. Treasury Department's Financial Crimes Enforcement Network in November updated a 2020 advisory to warn financial institutions to regularly update their compliance programs, monitor convertible currency transactions and comply with requirements for reporting suspicious activity.
In this exclusive interview with FinCEN Deputy Director Anna Lou Tirol, we will explore these and the additional measures the agency is taking in regard to ransomware.
The current state of identity for many enterprises relies on redundant and high friction steps to verify a user's identity information, because of the inability to unify and leverage previously verified information. Enterprises need a better approach to identity vetting to fully verify all user accounts in a low friction manner. Accountable Digital Identity Association's (ADIA) created an open specification to solve this problem. They created a working prototype that is scalable, supportable and empowers consumer with self-service capabilities to manage their own identity. ADIA enables consumers to present proof of a verified identity eliminating the need for ID proofing for every digital engagement before any transaction thereby reducing the risk of fraud.
Kay Turner joined FinCEN about a year ago. Her mission: to advance the use of digital identity, to create new partnerships with federal agencies and to spread awareness about the new challenges and opportunities brought by emerging technology.
In this exclusive IAM Summit session, Turner opens up on:
If we have learned anything from the past year-plus of cybersecurity headlines, it's this: Behind every great breach there is likely a password compromise. Clumsy, hard to remember, easy to phish … "Passwords are not fit for purpose," says Andrew Shikiar of the FIDO Alliance. And in this Summit exclusive he talks about:
In 2021, the Biden administration issued the most comprehensive cybersecurity executive order in history. How is the order being enforced to protect critical infrastructure and financial services? And how fares the administration's battle against ransomware?
In this exclusive keynote, Carole House, the director of cybersecurity and secure digital innovation within the NSC, discusses:
All content from Day 1 will be available on demand from 9 AM - 5 PM ET on Day 2, Wednesday, October 12th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.
October 11 - 12, 2022
Southeast US Summit