This panel discussion covers the criminal use of newer forms of money movement to hide criminal proceeds and cash out. It examines how criminals use money movement with Sell, Coinbase, Fan Duel and other legalized gambling mechanisms.
Was last year’s record surge of ransomware and supply chain attacks an anomaly? Unfortunately, the FBI is positive it was not, and the outlook for the New Year is: more attacks. Many more.
In this exclusive session, James Dennehy, special agent in charge of the Intelligence and Surveillance Division at the FBI's New York Field Office, shares expert insight on:
• The current and future trajectory of ransomware, business email compromise, supply chain attacks and more;
• The resources the FBI brings to a cybercrime investigation;
• When and how to engage with the FBI before an attack has been detected.
Threats have rapidly evolved in the COVID-19 era. Does your IR plan have dust or has it evolved to meet today's threats? Have you transformed from cyber resilience to operational resilience?
To help reduce exposure to ransomware and related sanctions, the U.S. Treasury Department's Financial Crimes Enforcement Network in November updated a 2020 advisory to warn financial institutions to regularly update their compliance programs, monitor convertible currency transactions and comply with requirements for reporting suspicious activity.
In this exclusive interview with FinCEN Deputy Director Anna Lou Tirol, we will explore these and the additional measures the agency is taking in regard to ransomware.
In 2021, the Biden administration issued the most comprehensive cybersecurity executive order in history. How is the order being enforced to protect critical infrastructure and financial services? And how fares the administration's battle against ransomware?
In this exclusive keynote, Carole House, the director of cybersecurity and secure digital innovation within the NSC, discusses:
When it comes to cyber incident response, it truly is a matter of: It's not just what you know, it's who know. Proper response requires a proper team, and renowned attorney Lisa Sotto is often on the receiving end of a 2am emergency incident response call. In this exclusive ISMG summit session, she shares insight on:
If SolarWinds and Kaseya didn't put it to the test, then Log4j did. Your incident response plan: When was it last updated or tested? Does it account for today's latest ransomware and supply chain threats? Does it meet the latest regulatory demands for incident reporting?
Join this panel of seasoned cybersecurity experts for lively discussion of incident response planning, including:
The financial services industry often struggles with perceived commoditization among customers, but organizations can set themselves apart by offering strong security. Fraud associated with account takeover is largely driven by weak authentication, such as usernames and passwords, security questions and mobile-based authentication - OTP, SMS and push notifications. Modern strong authentication offers end customers highest-assurance security along with ease of use and can create meaningful differentiation and value to drive new customer acquisition and customer retention. Attend this panel discussion to hear the current challenges related to authentication and best practices to implement moving forward.
This panel discussion covers the criminal use of newer forms of money movement to hide criminal proceeds and cash out. It examines how criminals use money movement with Sell, Coinbase, Fan Duel and other legalized gambling mechanisms.
Was last year’s record surge of ransomware and supply chain attacks an anomaly? Unfortunately, the FBI is positive it was not, and the outlook for the New Year is: more attacks. Many more.
In this exclusive session, James Dennehy, special agent in charge of the Intelligence and Surveillance Division at the FBI's New York Field Office, shares expert insight on:
• The current and future trajectory of ransomware, business email compromise, supply chain attacks and more;
• The resources the FBI brings to a cybercrime investigation;
• When and how to engage with the FBI before an attack has been detected.
Threats have rapidly evolved in the COVID-19 era. Does your IR plan have dust or has it evolved to meet today's threats? Have you transformed from cyber resilience to operational resilience?
To help reduce exposure to ransomware and related sanctions, the U.S. Treasury Department's Financial Crimes Enforcement Network in November updated a 2020 advisory to warn financial institutions to regularly update their compliance programs, monitor convertible currency transactions and comply with requirements for reporting suspicious activity.
In this exclusive interview with FinCEN Deputy Director Anna Lou Tirol, we will explore these and the additional measures the agency is taking in regard to ransomware.
In 2021, the Biden administration issued the most comprehensive cybersecurity executive order in history. How is the order being enforced to protect critical infrastructure and financial services? And how fares the administration's battle against ransomware?
In this exclusive keynote, Carole House, the director of cybersecurity and secure digital innovation within the NSC, discusses:
When it comes to cyber incident response, it truly is a matter of: It's not just what you know, it's who know. Proper response requires a proper team, and renowned attorney Lisa Sotto is often on the receiving end of a 2am emergency incident response call. In this exclusive ISMG summit session, she shares insight on:
If SolarWinds and Kaseya didn't put it to the test, then Log4j did. Your incident response plan: When was it last updated or tested? Does it account for today's latest ransomware and supply chain threats? Does it meet the latest regulatory demands for incident reporting?
Join this panel of seasoned cybersecurity experts for lively discussion of incident response planning, including:
The financial services industry often struggles with perceived commoditization among customers, but organizations can set themselves apart by offering strong security. Fraud associated with account takeover is largely driven by weak authentication, such as usernames and passwords, security questions and mobile-based authentication - OTP, SMS and push notifications. Modern strong authentication offers end customers highest-assurance security along with ease of use and can create meaningful differentiation and value to drive new customer acquisition and customer retention. Attend this panel discussion to hear the current challenges related to authentication and best practices to implement moving forward.
October 25 - 26, 2022
Southwest US Summit