Provisional Agenda

Stream 1
Stream 2

KEYNOTE PANEL: THE INFORMATION SECURITY LEADERS’ PERSPECTIVE

  • A new era for CISOs – what are their responsibilities and what issues and challenges are at the top of their agendas?
  • As a result of digital transformation strategies, what are the key security threats that major FIs will face over the next year in addressing employee and consumer digital requirements?
  • What needs to be done today to prepare your organisation so it can respond to the unprecedented increase in mobile engagement by employees and customers and it’s links to an exponential increase in fraud?
  • What are the key areas of weakness that can be exploited by cyber crime? Passwords and an ability to compromise have been heavily mentioned in the press recently. Is this a key battleground for organisations as they invest in managing cyber threat?

PLENARY PRESENTATION: INSIDER THREAT: WHY DO PEOPLE CAUSE DATA BREACHES?

Data has become one of the world’s most valuable assets – so, unsurprisingly, protecting it from a multitude of risks remains a continual challenge.

Over the last five years, headline-grabbing incidents have demonstrated the potential implications of a data breach – from damaged business reputation, to loss of revenue and even company devaluation. According to the 2018 Cost of a Data Breach survey conducted by the Ponemon Institute, on average data breaches cost a company $3.86m, up 6.4% from 2017.

As the impacts of data breaches increase, so do the opportunities for employees to leak sensitive data – either accidentally or maliciously.

The presenter will be discussing how our recently launched Insider Data Breach survey shows just how prolific insider data breaches are and who is behind them.

PANEL DISCUSSION: DEPLOYING NEW TECHNOLOGIES TO CREATE AN ACTIVE DEFENCE AGAINST CYBER CRIME

  • What are the key areas that need to be addressed in order to develop a robust security framework within your organisation?
  • What factors will determine which financial institutions will become the best protected and most resilient players in the industry over the next few years?
  • Insider threat: how do we prevent individuals in the business leaking data?
  • How can AI and ML enhance protection, detection and response processes?
  • How do you determine which technologies are actually delivering on their promise to enhance information security - and which are hype?
  • How can you assess the ROI of different technologies in order to determine which to invest in, and which to partner or outsource?

PRESENTATION: INCIDENT AND BREACH MANAGEMENT: BUILDING A HARMONIZED RESPONSE PLAN FOR PRIVACY & SECURITY TEAMS

In the event of a breach, privacy and security professionals often approach incident response from two different outlooks. Whereas security teams are focused on threat vectors, privacy teams are concerned with personal data leaks and adhering to various global privacy laws. While the two come from different perspectives, it is possible to build an incident and breach response plan that addresses the needs of both teams. In this session, the presenter will discuss how to build a harmonized response plan that addresses both the security team’s technical needs and privacy team’s regulatory requirements across the patchwork of US privacy laws, the GDPR and other global privacy regulations. They will also provide tips to help you map out a 72-hour personal data breach action plan and share practical advice to improve your privacy program.

  • Learn how to build an incident and breach response plan that fits the needs of security teams and privacy teams
  • Breakdown what stakeholders, teams, tools and processes should come together in the event of an incident or breach
  • Understand how to maintain a consistent approach to incident response while complying with privacy regulations across the globe

PANEL DISCUSSION: KEEPING AHEAD OF FRAUD & FINANCIAL CRIME

  • How can financial institutions develop a responsive approach to deal with cyber criminals who continuously evolve their money laundering tactics?
  • How can AI, ML and big data technologies improve identification and authentication processes?
  • How can identity trust across the omnichannel customer journey be maintained without negatively impacting user experience?
  • What are the specific new threats affecting different financial sectors: asset management, payments, private banking?

PANEL DISCUSSION: ADDRESSING THE SPECIFIC CHALLENGES & THREATS IMPACTING THE INSURANCE INDUSTRY

  • What are the major information security challenges the insurance industry will face over the next two years?
  • Which parts of the network are most vulnerable to a cyber attack?
  • Within the insurance value chain, where do you see the weakest links?
  • Which types of technology solutions are proving most effective for insurance cyber risk management?

PANEL DISCUSSION: REGULATORY REQUIREMENTS, CHALLENGES & OPPORTUNITIES

  • What are the key governance and compliance challenges for all types of financial institutions going forward?
  • To what extent are CEOs, board members and senior executives held accountable for cyber security and how can they protect themselves and their organisations?
  • How can regulators and financial organisations work together to maximize the effectiveness of cyber crime detection, reporting and prevention?
  • How can CyberTech solutions help organisations meet regulatory obligations and enhance their cyber crime compliance processes?

PLENARY PRESENTATION: THE HIDDEN ADVERSARY. ADVANCED DETECTION OF ATTACKERS ON THE NETWORK USING DECEPTION.

Regardless of their motives, cybercriminals continue to breach perimeter defences of financial services organisations, usually remaining undetected for months. Increased perimeter security appears to have bred better attackers, more adept at finding ways behind organisational lines. A pragmatic ‘assumed breach’ mentality breeds innovative thinking in cyber security. By turning our attention to finding attackers already on the network, we can reduce the extent and severity of consequential damage and facilitate faster recovery. Deception, an age old discipline in every adversary based discipline, offers cyber teams the means to identify and detect advanced attackers on the network and effect the correct remediations.

PLENARY PANEL DISCUSSION: ASSESSING CYBER RISKS, COSTS & SOLUTIONS

  • How do you realistically assess the cyber loss curve for your organisation?
  • How do you ensure that cyber risk planning addresses first and third-party scenarios?
  • How can digital resilience be benchmarked against best-practice for the banking, insurance and asset management industries?
  • Which technology solutions are most effective for cyber risk management?
  • What are your thoughts about cyber insurance and cyber assurance ?

PANEL DISCUSSION: THE INVESTOR PERSPECTIVE

  • Which technologies and subsectors will be the most attractive to venture and corporate investors over the next year?
  • What are the differences in the way financial institutions assess potential investments in CyberTech companies compared to VC investors?
  • What are the benefits to financial institutions that actively engage with the startup market and what opportunities are being missed by those waiting on the sidelines?
  • How can startups and scale-ups choose the right investors to back them and the right organisations to partner with?

PRODUCT DEMOS: CYBERTECH (Part 1)

Demos from 19 of the most innovative CyberTech companies (startups, scale-ups and established providers) that every financial institution needs to know about.
15585

Before you go...get discounted tickets

Leave your email to stay up to date with the latest Summit updates and get 15 % OFF the delegate fee

Meet senior decision-makers who are actively looking for suppliers and partners