In 2021, the Biden administration issued the most comprehensive cybersecurity executive order in history. How is the order being enforced to protect critical infrastructure and financial services? And how fares the administration's battle against ransomware?
In this exclusive keynote, Carole House, the director of cybersecurity and secure digital innovation within the NSC, discusses:
72 hours. That’s how long organizations have to report known ransomware to the New York Department of Financial Services. Cybercriminals' methodology has changed from a quick, opportunistic attack to a prolonged and targeted approach. While this shift presents threat actors with the opportunity to spread wider and lay the foundation for a double extortion scheme, it also presents security teams with the opportunity to detect activity before the encryption trigger is pulled.
We will explore how ransomware loitering allows security analysts to use network visibility, detection and response to discover malicious activity between initial compromise and encryption, including:
When it comes to cyber incident response, it truly is a matter of: It's not just what you know, it's who know. Proper response requires a proper team, and renowned attorney Lisa Sotto is often on the receiving end of a 2am emergency incident response call. In this exclusive ISMG summit session, she shares insight on:
When CNA Financial – a top U.S. insurance company – was struck by ransomware a year ago, it reportedly paid $40 million in ransom to restore access to its network and data. How do record-high ransomware incidents – and ransoms – affect the cyber insurance sector? What are the emerging standards for coverage, as well as legislative trends affecting the practice?
This exclusive panel tackles these questions as well as:
The Log4shell vulnerability found in the Log4j logging framework has been recognized as one of the most critical vulnerabilities ever, open source or otherwise. And while the dangers of the Log4j vulnerability remain high, the situation has highlighted an even bigger issue that is plaguing security professionals and developers: If you don’t know what’s in your software supply chain, you’re already behind.
When a flaw is disclosed, companies are instantly thrust into a race against time to fix it before it can be exploited by an attacker, meaning every minute counts. If you don’t know what’s in your software, you’re effectively giving hackers a huge head start.
While this outlook might seem bleak, there are easy steps you can take to significantly mitigate risk. This session will help you do that by answering:
A ransomware attack strikes every 11 seconds.
Despite thick firewalls, the bad guys will get through. Some businesses pay the ransom but most want to recover, so they don’t let the bad guys win.
A payout isn't the only way out.
If hackers exploit your backups, you pay the ransom. If your backups survive, you need to know what to recover and how long it will take. If you don't, you pay the ransom. But even with a decryption key, recovery takes days or weeks and the hackers may not return all the data.
Recovery from a clean backup is the only way to beat hackers. Data managed by Rubrik can’t be encrypted after the fact. Once ingested, no external or internal operation can modify it. So, your data is immune to ransomware. Since data can’t be overwritten, even infected data ingested by Rubrik can’t infect existing files/folders.
We'll discuss how to:
Was last year’s record surge of ransomware and supply chain attacks an anomaly? Unfortunately, the FBI is positive it was not, and the outlook for the New Year is: more attacks. Many more.
In this exclusive session, James Dennehy, special agent in charge of the Intelligence and Surveillance Division at the FBI's New York Field Office, shares expert insight on:
A banking revolution is underway in the form of a new financial transparency. A focus on third-party access and straightforward payment options is forcing compliance and regulation mandates on a global scale. The critical technology for this shift is the open API. What does this mean for service providers worldwide?
In this session, attendees will learn about the importance of securing customer identity, protecting APIs and enforcing authentication.
The Zero Trust framework is based on the principle of "never trust, always verify." Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.
Digital transformation promises business growth by providing value to customers by leveraging emerging technologies and supporting skills for new business models. At its core, data-driven decisions are the lifeblood of digital transformation. When data is poisoned, stolen and misused for malicious intent, progress slows, resulting in poor customer experience and satisfaction.
In this session, we will explore how sophisticated bot attacks are contaminating top digital transformation trends related to automation, data analytics and application architectures that should be part of every security strategy to solve in 2022.
The financial services industry often struggles with perceived commoditization among customers, but organizations can set themselves apart by offering strong security. Fraud associated with account takeover is largely driven by weak authentication, such as usernames and passwords, security questions and mobile-based authentication - OTP, SMS and push notifications. Modern strong authentication offers end customers highest-assurance security along with ease of use and can create meaningful differentiation and value to drive new customer acquisition and customer retention. Attend this panel discussion to hear the current challenges related to authentication and best practices to implement moving forward.
In 2021 we saw a steady drum beat toward mainstream adoption of cryptocurrencies by traditional financial institutions and investors of all sizes. We saw a move from a Bitcoin only world to an explosion of digital assets. And, we saw global regulators and policy makers begin discussions about building a clear regulatory framework for crypto. But, questions still remain and many myths still permeate the conversation. Crypto is only used for illicit activity. Crypto causes ransomware. Cryptocurrencies are unregulated and pose systemic risk. Join Dante Disparte of Circle, Perianne Boring of the Chamber of Digital Commerce and Ari Redbord of TRM Labs for some myth busting and a discussion of what to expect from crypto regulation and legislation in 2022 and beyond.
This panel discussion covers the criminal use of newer forms of money movement to hide criminal proceeds and cash out. It examines how criminals use money movement with Sell, Coinbase, Fan Duel and other legalized gambling mechanisms.
If SolarWinds and Kaseya didn't put it to the test, then Log4j did. Your incident response plan: When was it last updated or tested? Does it account for today's latest ransomware and supply chain threats? Does it meet the latest regulatory demands for incident reporting?
Join this panel of seasoned cybersecurity experts for lively discussion of incident response planning, including:
Ransomware has dominated the headlines for the past few years. But much of the long-term human and career devastation resulting from ransomware attacks remains untold and possibly buried out of view.
In this exclusive session, ISMG Global Content Contributor David Pollino will unpack a real-world example of how a ransomware incident led to numerous layoffs and discuss with an individual their journey from ransomware incident to pink slip, during an event you may have read about in the media. Names and details of the incident have been changed to protect the innocent and, at times, the guilty.
In November 2021, the U.S. Financial Crimes Enforcement Network - the bureau of the U.S. Department of the Treasury that collects and analyzes information about financial transactions - released a new advisory on ransomware and the use of the financial system to facilitate ransom payments. The comprehensive advisory covers trends, red flags, suspicious activity reporting and more.
In this exclusive session, AnnaLou Tirol, deputy director of FinCEN, explains the guidance and offers deeper insight into:
In 2021, the Biden administration issued the most comprehensive cybersecurity executive order in history. How is the order being enforced to protect critical infrastructure and financial services? And how fares the administration's battle against ransomware?
In this exclusive keynote, Carole House, the director of cybersecurity and secure digital innovation within the NSC, discusses:
72 hours. That’s how long organizations have to report known ransomware to the New York Department of Financial Services. Cybercriminals' methodology has changed from a quick, opportunistic attack to a prolonged and targeted approach. While this shift presents threat actors with the opportunity to spread wider and lay the foundation for a double extortion scheme, it also presents security teams with the opportunity to detect activity before the encryption trigger is pulled.
We will explore how ransomware loitering allows security analysts to use network visibility, detection and response to discover malicious activity between initial compromise and encryption, including:
When it comes to cyber incident response, it truly is a matter of: It's not just what you know, it's who know. Proper response requires a proper team, and renowned attorney Lisa Sotto is often on the receiving end of a 2am emergency incident response call. In this exclusive ISMG summit session, she shares insight on:
When CNA Financial – a top U.S. insurance company – was struck by ransomware a year ago, it reportedly paid $40 million in ransom to restore access to its network and data. How do record-high ransomware incidents – and ransoms – affect the cyber insurance sector? What are the emerging standards for coverage, as well as legislative trends affecting the practice?
This exclusive panel tackles these questions as well as:
The Log4shell vulnerability found in the Log4j logging framework has been recognized as one of the most critical vulnerabilities ever, open source or otherwise. And while the dangers of the Log4j vulnerability remain high, the situation has highlighted an even bigger issue that is plaguing security professionals and developers: If you don’t know what’s in your software supply chain, you’re already behind.
When a flaw is disclosed, companies are instantly thrust into a race against time to fix it before it can be exploited by an attacker, meaning every minute counts. If you don’t know what’s in your software, you’re effectively giving hackers a huge head start.
While this outlook might seem bleak, there are easy steps you can take to significantly mitigate risk. This session will help you do that by answering:
A ransomware attack strikes every 11 seconds.
Despite thick firewalls, the bad guys will get through. Some businesses pay the ransom but most want to recover, so they don’t let the bad guys win.
A payout isn't the only way out.
If hackers exploit your backups, you pay the ransom. If your backups survive, you need to know what to recover and how long it will take. If you don't, you pay the ransom. But even with a decryption key, recovery takes days or weeks and the hackers may not return all the data.
Recovery from a clean backup is the only way to beat hackers. Data managed by Rubrik can’t be encrypted after the fact. Once ingested, no external or internal operation can modify it. So, your data is immune to ransomware. Since data can’t be overwritten, even infected data ingested by Rubrik can’t infect existing files/folders.
We'll discuss how to:
Was last year’s record surge of ransomware and supply chain attacks an anomaly? Unfortunately, the FBI is positive it was not, and the outlook for the New Year is: more attacks. Many more.
In this exclusive session, James Dennehy, special agent in charge of the Intelligence and Surveillance Division at the FBI's New York Field Office, shares expert insight on:
A banking revolution is underway in the form of a new financial transparency. A focus on third-party access and straightforward payment options is forcing compliance and regulation mandates on a global scale. The critical technology for this shift is the open API. What does this mean for service providers worldwide?
In this session, attendees will learn about the importance of securing customer identity, protecting APIs and enforcing authentication.
The Zero Trust framework is based on the principle of "never trust, always verify." Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.
Digital transformation promises business growth by providing value to customers by leveraging emerging technologies and supporting skills for new business models. At its core, data-driven decisions are the lifeblood of digital transformation. When data is poisoned, stolen and misused for malicious intent, progress slows, resulting in poor customer experience and satisfaction.
In this session, we will explore how sophisticated bot attacks are contaminating top digital transformation trends related to automation, data analytics and application architectures that should be part of every security strategy to solve in 2022.
The financial services industry often struggles with perceived commoditization among customers, but organizations can set themselves apart by offering strong security. Fraud associated with account takeover is largely driven by weak authentication, such as usernames and passwords, security questions and mobile-based authentication - OTP, SMS and push notifications. Modern strong authentication offers end customers highest-assurance security along with ease of use and can create meaningful differentiation and value to drive new customer acquisition and customer retention. Attend this panel discussion to hear the current challenges related to authentication and best practices to implement moving forward.
In 2021 we saw a steady drum beat toward mainstream adoption of cryptocurrencies by traditional financial institutions and investors of all sizes. We saw a move from a Bitcoin only world to an explosion of digital assets. And, we saw global regulators and policy makers begin discussions about building a clear regulatory framework for crypto. But, questions still remain and many myths still permeate the conversation. Crypto is only used for illicit activity. Crypto causes ransomware. Cryptocurrencies are unregulated and pose systemic risk. Join Dante Disparte of Circle, Perianne Boring of the Chamber of Digital Commerce and Ari Redbord of TRM Labs for some myth busting and a discussion of what to expect from crypto regulation and legislation in 2022 and beyond.
This panel discussion covers the criminal use of newer forms of money movement to hide criminal proceeds and cash out. It examines how criminals use money movement with Sell, Coinbase, Fan Duel and other legalized gambling mechanisms.
If SolarWinds and Kaseya didn't put it to the test, then Log4j did. Your incident response plan: When was it last updated or tested? Does it account for today's latest ransomware and supply chain threats? Does it meet the latest regulatory demands for incident reporting?
Join this panel of seasoned cybersecurity experts for lively discussion of incident response planning, including:
Ransomware has dominated the headlines for the past few years. But much of the long-term human and career devastation resulting from ransomware attacks remains untold and possibly buried out of view.
In this exclusive session, ISMG Global Content Contributor David Pollino will unpack a real-world example of how a ransomware incident led to numerous layoffs and discuss with an individual their journey from ransomware incident to pink slip, during an event you may have read about in the media. Names and details of the incident have been changed to protect the innocent and, at times, the guilty.
In November 2021, the U.S. Financial Crimes Enforcement Network - the bureau of the U.S. Department of the Treasury that collects and analyzes information about financial transactions - released a new advisory on ransomware and the use of the financial system to facilitate ransom payments. The comprehensive advisory covers trends, red flags, suspicious activity reporting and more.
In this exclusive session, AnnaLou Tirol, deputy director of FinCEN, explains the guidance and offers deeper insight into:
January 25 - 26, 2022
Financial Services Summit