Fraud Prevention Summit: New York

November 5, 2025 | 8:00 AM - 4:15 PM ET

Event Overview

Fraudsters now wield advanced tools enabling attacks that challenge even the most prepared organizations. Security leaders, in turn, are adopting cutting-edge defenses. The 2025 ISMG Fraud Security Summit addresses this pivotal moment, arming participants with strategies to outpace bold adversaries. Key topics include API security, digital identity, insider threats, credential stuffing and supply chain risks. Experts will share ways to disrupt the shadow economy of fraud-as-a-service and apply lessons from high-profile cases. Attendees will leave equipped to harness AI-driven analytics, bolster collaboration and strengthen defenses for emerging threats.

View our ISMG Event Experience video to see what your peers are saying about their participation.

Venue

Conrad New York Downtown

102 N End Avenue

New York, NY 10282

 

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Highlight Topics

  • Bolstering Identity Verification Tactics Against Expanding Fraud Threats
  • Cross-Industry Fraud Intelligence Sharing: Building Collaborative Defenses
  • Tackling Emerging Fraud Threats in Global Supply Networks
  • Protecting Patient Data from Evolving Fraud in Healthcare  

Karen Boyer

SVP Financial Crimes, M&T Bank, CyberEdBoard Member

Nisan Bangiev

Director, Fraud Risk Officer, Valley Bank

David Pollino

Global Head of Fraud Prevention - Managing Director, Information Security, BNY

Mark Eggleston

CISO, CSC, CyberEdBoard Member

Juan Alberto Funes Carniago

Director, Fraud & Decisioning Products, Mastercard

Steve Lenderman

Head of Fraud Solutions - North America, CyberEdBoard Member

2025 Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

Industry leaders from various sectors in the technology domain share their experience on how the role of chief technology officers (CTOs) has become indispensable across organizations. They discuss unique strategies and techniques applied in businesses, making technology an intrinsic part of their organizational DNA. Additionally, these thought leaders delve into how they have redefined leadership to enhance the organization’s resilience and share their insights on artificial intelligence, sustainability, and the future of internet.

Agenda

Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.

8:00 AM - 9:00 AM ET

Registration & Breakfast

9:00 am - 9:15 am et

Opening Comments

9:15 am - 9:45 am et

Cybersecurity & Fraud Risk: Defend, Detect, Defeat!

We will examine the evolving strategies used by hackers and fraudsters, which range from simple phishing schemes to complex ransomware operations. The line between cybersecurity and fraud is increasingly blurred. Cybercriminals often exploit security vulnerabilities to commit fraud, and similarly, fraudsters use social engineering to gain access to sensitive systems. 

The keynote will focus on the need for businesses to adopt a holistic approach that addresses both areas simultaneously, rather than treating them as separate disciplines. The aim will be to provide participants with the knowledge and tools they need to strengthen their defenses, detect risks proactively, and effectively battle cyber fraud, ensuring their organization’s overall protection. Attendees will learn to move beyond reactive measures and adopt a proactive stance that defends against potential threats, detects risks as they emerge, and defeats attackers swiftly and efficiently.

Key Takeaways: 

  • Developing integrated security frameworks to shield against both cybersecurity breaches and fraud. This involves leveraging technology, process controls, and employee awareness. 
  • Exploring state-of-the-art tools and techniques, including AI-driven analytics and real-time monitoring, to proactively identify and prevent fraudulent activities before they inflict harm. 
  • Understanding the best practices for responding to fraud incidents, encompassing incident response planning, stakeholder communication, and recovery strategies aimed at minimizing impact.

Sunil Malik

, CISO, Discover Financial Services 

Sandra Pesic

Information Security and Data Privacy Officer, Federal Reserve Bank of Chicago

9:45 am - 10:15 am et

Bolstering Identity Verification Tactics Against Expanding Threats​

Fraudsters are increasingly exploiting weak points in verification systems, such as synthetic identities and stolen credentials. This session examines how advancements in biometrics, AI, and fraud modeling are reshaping identity verification to stay ahead of sophisticated financial crime tactics.
 
We’ll explore the critical balance between providing frictionless customer onboarding and maintaining high security standards to prevent fraud. Attendees will gain insights into the latest fraud prevention strategies and learn how to safeguard digital identities without sacrificing user experience.
 
Key Discussion Points:
 
  • Fraud Threats in Identity Verification: Understanding how synthetic identity fraud and credential theft are evolving in digital environments.
  • Innovations in Fraud Detection: Exploring how AI and biometric authentication improve fraud detection in real time.
  • Balancing Customer Experience and Security: Reducing onboarding friction while strengthening identity verification.
  • Adapting to Emerging Fraud Techniques: Preparing for the next wave of identity-related fraud and staying compliant with regulatory standards.
 

Steve Lenderman

Head of Fraud Prevention, iSolved, CyberEdBoard Member

Nisan Bangiev

Director, Fraud Risk Officer, Valley Bank 

Mark Eggelston

CISO, CSC, CyberEdBoard Member

10:15 am - 10:55 am et

Secure the Non-Human Identity Nightmare

R&D teams create and scatter secrets across vaults, code, collaboration solutions and more without any oversight or control by security teams. Secret-based breaches are among the top three attack vectors, and they are the most destructive. What solution is needed to enable organizations to securely utilize non-human identities and secrets? How can you detect, safeguard, and provide context for secrets stored across vaults, source code, collaboration tools, cloud environments, and SaaS platforms?

Introducing Entro – the complete platform for non-human identity & Secrets management. With Entro, Security teams can finally efficiently oversee and protect non-human identities with automated lifecycle processes and seamless integration, ensuring comprehensive security and compliance through a unified interface.

Stephen Johnson

Vice President of Solutions Engineering, Entro Security

10:55 am - 11:20 am et

Networking & Exhibition Break

11:20 am - 11:50 am et

Protecting Patient Data from Evolving Fraud in Healthcare

Recent high-profile incidents, such as the 2024 cyberattack on Change Healthcare, have demonstrated the devastating impact of large-scale breaches on patient care and data integrity. This attack exposed sensitive personal health information (PHI) and disrupted healthcare services nationwide, underlining the importance of strong cybersecurity defenses in the sector. Additionally, the Kaiser Foundation Health Plan breach further highlighted how the improper use of tracking tools on healthcare websites can lead to significant unauthorized data disclosures, affecting over 13 million individuals.
 
Healthcare CISOs must confront a range of fraud risks, including identity theft, phishing attacks on patient portals, and fraudulent insurance claims. This session will explore the latest trends in healthcare fraud and cyber threats, offering strategies to protect against the misuse of patient data and ensure compliance with regulatory frameworks like HIPAA. We will also discuss how healthcare organizations can enhance their fraud detection capabilities through advanced identity verification and real-time monitoring technologies, which are increasingly critical in today’s threat landscape.
 
Our panel will discuss:
 
  • Insights into recent healthcare cyber incidents, including Change Healthcare and Kaiser Permanente, and their implications for fraud prevention.
  • Advanced strategies for protecting patient data, reducing fraud risks, and maintaining compliance with HIPAA.
  • The role of real-time monitoring and identity verification in preventing fraud and protecting patient trust in an evolving digital ecosystem.
 

Michael Sawyer

Head of Enterprise Technology Compliance and Governance, Citi

11:50 am - 12:20 pm et

Fraud as a Service and the Rise of Cybercrime's Shadow Economy

By lowering the technical barriers, FaaS enables large-scale fraud operations that contributed to global financial losses of nearly $485.6 billion in 2023. In 2024, scam operations using Telegram bots to automate phishing and fraud highlight just how widespread and accessible these services have become, affecting industries from financial services to healthcare.
 
This session will explore the growth of FaaS, its impact on security across industries, and effective strategies to combat it.
 
Experts will share insights into how these services operate, as well as actionable defenses to disrupt and prevent FaaS-driven attacks, including:
  • The business model behind FaaS and its role in enabling large-scale cyber fraud, including automation tools like Telegram bots.
  • Practical defense strategies to combat FaaS, focusing on early detection and prevention across key industries.
  • How threat intelligence can uncover FaaS operations and the tactics cybercriminals use to avoid detection.
  • Building cross-industry partnerships to share intelligence and improve defenses against FaaS attacks.
 

Karen Boyer

SVP Financial Crimes, M&T Bank, CyberEdBoard Member

Hiral Mehta

Chief, Business & Securities Fraud, U.S. Attorney's Office for the Eastern District of New York

12:20 pm - 12:50 pm et

Insider Threats: Preventing Fraud from Within

With insider-driven data incidents increasing 28% in the last year alone, employees with privileged access remain a prime target for exploitation by external actors and, potentially, a direct source of fraud and data compromise. As organizations expand and hybrid work grows more common, securing against internal threats has become even more critical. Whether it’s deliberate fraud or unintentional leaks, insider threats can lead to significant financial and reputational damage.
 
This session will explore how organizations can better detect, prevent, and respond to insider-driven fraud. Panelists will share insights on leveraging behavioral analytics, privileged access management, and employee awareness to minimize insider risks.
 
We will discuss:
 
  • Implementing behavioral analytics to detect early signs of insider fraud, such as unusual access patterns or data transfers.
  • Reducing the risk of insider threats through privileged access management (PAM) and least-privilege policies.
  • The role of employee education and awareness in preventing unintentional fraud caused by negligence or phishing attacks.
  • Best practices for incident response when insider fraud is detected, including forensics and legal considerations.
 

David Pollino

Global Head of Fraud Prevention - Managing Director, Information Security, BNY

12:50 pm - 1:50 pm et

Lunch & Exhibition Break

1:50 PM - 2:20 PM ET

Data Breaches and Fraud: Reducing the Impact

This session focuses on practical strategies to minimize fraud risks after a breach, offering insights into how organizations can quickly mitigate the damage and protect affected individuals. From identity monitoring to rapid incident response, this session will cover the critical actions organizations must take to prevent fraud from compounding the impact of a breach.
 
Attendees will explore the latest best practices for post-breach fraud prevention, including how to secure compromised data, implement identity protection measures, and minimize the potential for further financial or reputational damage. Panelists will share real-world examples of organizations that successfully reduced fraud risks after data breaches, offering a roadmap for effective post-breach responses.
 
Key Discussion Points:
 
  • Effective post-breach fraud prevention strategies and identity protection.
  • Real-world examples of mitigating fraud risks after a major breach.
  • Best practices for breach response teams to address identity theft and financial fraud.
  • How to minimize reputational and financial damage in the wake of a breach.
 

Matthew Homer Meade

Chair, Cybersecurity, Data Protection & Privacy Group, Eckert Seamans

Ahmed Pasha

CISO, Nomura

Juan Alberto Funes Carniago

Director,  Fraud & Decisioning Products, Mastercard

2:20 pm - 2:50 pm et

Protecting Against Automated Fraud and Credential Stuffing

The nearly 10 billion passwords compromised in the RockYou2024 leak is a stark example of how an ever-increasing supply of stolen credentials can enable high-volume, precision-driven attacks with minimal effort.
 
With leading companies in finance, retail, and manufacturing all falling victim to credential stuffing attacks in the last year, no organization is immune to the financial and reputational damage they can inflict. This session will explore advanced defense strategies, the role of AI in stopping automated fraud, and the latest tools that organizations are deploying to stay ahead of attackers.
 
We’ll also examine how industries such as financial services, retail, and healthcare are evolving their approach to combat these increasingly sophisticated attacks—integrating cutting-edge solutions to mitigate risks and secure their most valuable assets.
 
Key Takeaways:
 
  • The latest trends in credential stuffing and how automation is reshaping fraud attacks across industries.
  • Advanced defense strategies, including AI-based anomaly detection and the limitations of traditional solutions like multi-factor authentication.
  • Real-world insights on effective approaches to fraud prevention from across sectors.
  • Future trends in automated fraud and how to prepare your security stack for emerging challenges in 2025.
 
 

Dan Galeon

Director, Head of Platforms Governance, Robinhood

Adé Oyesanya

Regional Information Security Risk Officer - Europe and Americas, Standard Chartered Bank 

2:50 pm - 3:10 pm et

Networking & Exhibition Break

3:10 pm - 3:40 pm et

Cross-Industry Fraud Intelligence Sharing: Building Collaborative Defenses​

This session explores the importance of sharing fraud intelligence across industries to create a more robust and cohesive defense strategy. By learning from one another’s experiences and challenges, organizations can better protect themselves against evolving fraud schemes.
Participants will gain insights into the benefits and challenges of cross-industry collaboration, including the regulatory and privacy considerations that come with sharing sensitive threat intelligence.
 
The session will also examine successful examples of industries working together to combat fraud and how to implement similar strategies within their organizations.
 
Key Discussion Points:
 
  • Building cross-industry collaboration platforms to combat fraud.
  • Case studies of fraud tactics spreading across sectors.
  • Overcoming regulatory and privacy hurdles when sharing threat intelligence.
  • Practical steps for fostering intelligence sharing and improving defenses across industries.
 
 

Fred Harris

Managing Director; Global Head of Cybersecurity & Technology Risk, Deutsche Bank

3:40 pm - 4:10 pm et

Tackling Emerging Fraud Threats in Global Supply Networks

Cybercriminals are targeting third-party service providers to bypass traditional security defenses, injecting malware or stealing sensitive data to infiltrate larger organizations. The April 2024 breach at Sisense, where attackers gained access to cloud storage credentials through a compromised GitLab repository, serves as a stark example of how supply chain attacks can ripple across critical infrastructure. These incidents emphasize the need for stronger vendor management and improved detection systems to prevent fraud.
 
In this session, panelists will discuss the latest tactics bad actors are leveraging to exploit supply chain vulnerabilities, focusing on cross-industry examples and how to identify and mitigate risks before they lead to significant breaches. The conversation will also explore strategies for bolstering defenses, including vetting vendors, enhancing threat intelligence, and building more resilient supply chains.
 
Key Takeaways:
 
  • Mitigating risks from recent supply chain breaches by strengthening protections against multiple threat vectors, including malware injection, data theft, and phishing attacks via third-party services.
  • Practical steps for evaluating, monitoring, and securing vendor relationships, ensuring compliance with industry-specific regulations and standards.
  • Identifying early indicators of supply chain fraud and improving real-time detection through enhanced threat intelligence and AI-powered analysis tools.
  • Best practices for developing a rapid response and recovery framework, minimizing the damage caused by supply chain attacks, and coordinating across industry sectors.
 
 
 

Tim Lucey

upervisory Special Agent, Health Care Fraud Task Force, FBI

4:10 pm - 4:15 pm et

Closing Comments

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Summit Sponsors

Register

:

CPE Credits

ISMG Summits offer Continuing Professional Education Credits. Learn informative and engaging content created specifically for security professionals.

The Summit Experience

Upcoming ISMG Events

November 6, 2025

Cybersecurity Summit: New York Financial Services

October 9, 2025

Retail at the Edge: The Infrastructure To Deliver AI, Prevent Cyber Threats

September 24, 2025

Future-Proofing ERP Transformation With AI and Low-Code

October 1, 2025

CNAPP: Secure Gen AI and Cloud Innovation Without Slowing the Business

November 5, 2025

Fraud Prevention Security Summit: New York

Upcoming ISMG Events

September 24, 2025

Future-Proofing ERP Transformation With AI and Low-Code

October 1, 2025

CNAPP: Secure Gen AI and Cloud Innovation Without Slowing the Business

October 9, 2025

Retail at the Edge: The Infrastructure To Deliver AI, Prevent Cyber Threats