CYBERSECURITY VIGILANCE FOR BDs AND IAs
|
|
|
- Anis Austin
- 10 years ago
- Views:
Transcription
1 EARN UP TO 11 CPE CREDITS AT THIS MUST-ATTEND EVENT! FINANCIAL RESEARCH ASSOCIATES PRESENTS CYBERSECURITY VIGILANCE FOR BDs AND IAs Compliance and IT Collaboration on Data and Network Protection August 24-25, 2015 Princeton Club New York, NY What specific readiness steps should investment advisory firms and broker-dealers be taking to prepare for attacks that are no longer hypothetical, but assured? The new defense against cyberattacks must be flexible and able to react instantaneously and preemptively to breaches from hackers who represent an agile and unrelenting force seeking to expose vulnerabilities. Get the facts on cybersecurity resilience for IAs and BDs, including case studies and discussions from: Rich Hannibal, SEC Office of Compliance Inspections and Examinations Steven J. Randich, FINRA Andrew Hartnett, Missouri Secretary of State s Office Tate Jarrow, United States Secret Service Jay Leek, Blackstone Matthew Lehman, Cetera Financial Group Benjamin Eason, The Carlyle Group Melissa Soiefer, Barclays Jim Jones, PhD, George Mason University Cindy Donaldson, FS-ISAC SILVER SPONSOR BRONZE SPONSOR TO REGISTER: CALL OR VISIT US AT
2 Investment advisory firms and broker-dealers face stiff odds in the fight against cyberattacks. Across all industries, financial services were the most frequently targeted by hackers as well as the most vulnerable the average cost of an attack being upwards of 22 million dollars, a figure that also amounted the greatest average loss for any industry. The number of breaches represented an increase of almost 44 percent from the previous year. Obviously investment advisory firms and broker-dealers are a lucrative target for hackers an agile and diverse assortment of hacktavists, organized criminals, and nation states but what can IAs and BDs do when cybersecurity already attracts the highest level scrutiny from government and regulators? Join Financial Research Associates on August 24-25, at the Princeton Club in New York, for the Cybersecurity Vigilance for BDs and IAs, a collaborative event that will offer practical, implementable options for firms and brokerages of all sizes looking for protection against threats that are now both persistent, and all but assured. The event will bring together regulators, federal agents, top cyber experts, CISOs, and compliance professionals to collaborate on specific readiness steps to repel hackers determined to access clients data, personal information, and assets. This conference provides crucial new cybersecurity intelligence on topics such as: How to assemble a crisis management plan for firms of all sizes How to maintain a nimble, swift response protocol that balances the needs of employees and clients How to conduct adequate vendor due diligence, what questions to ask, what to require to ensure you re safe Cybersecurity Vigilance for BDs and IAs provides a high-value, comprehensive look at cybersecurity before, during, and after a breach. The event offers a mix of roundtable discussion and actionable strategy sessions; don t miss a chance to see how industry leaders from large and small firms are advancing their cyber defense systems. This event will give even the shrewdest firms implementable strategies worth millions compared with expensive cybersecurity lapses. Register today! Call or online at Sincerely, Ryan Matthews, Conference Director FINANCIAL RESEARCH ASSOCIATES, LLC P.S. This is the MOST COMPREHENSIVE event of its kind! Don t miss an unparalleled networking opportunity! Sponsorship and Exhibit Opportunities Enhance your marketing efforts through sponsoring a special event or exhibiting your product at this event. We can design custom sponsorship packages tailored to your marketing needs, such as a cocktail reception or a custom-designed networking event. To learn more about sponsorship opportunities, please contact Jennifer Clemence at (704) or her at [email protected]. Our Renowned Speaking Faculty: Rich Hannibal, Esq., Assistant Director, SEC Office of Compliance Inspections and Examinations Steven J. Randich, Executive Vice President, Chief Information Officer, FINRA Andrew Hartnett, Commissioner of Securities, Missouri Secretary of State s Office Laura L. Grossman, Assistant General Counsel, Investment Adviser Association Eric Hess, Founder and Managing Director, Hess Legal Counsel Jason Harrell, Corporate SIRO - Investment Management, BNY Mellon Glenn A. Siriano, Principal - Information Protection & Business Resiliency, KPMG Michelle Wraight, Vice President & Chief Privacy Officer, Pershing LLC, a BNY Mellon company Tate Jarrow, Special Agent, New York Electronic Crimes Task Force, United States Secret Service Jay Leek, Chief Information Security Officer, Information Technology, Blackstone Michael L Woodson, Information Systems Security Director, VP State Street Corporation Peter Keenan, Global Information Security, Head of Information Risk Governance, Citi Jim Jones, PhD, Associate Professor of Computer Forensics, George Mason University Matthew Lehman, CISO, Cetera Financial Group Benjamin Eason, CISO & Vice President Information Technology, The Carlyle Group Melissa Soiefer, Vice President Global Information Security, Barclays James Markakis, Security Analyst, Systems Engineer, Campbell and Company Adam J. Reback, Chief Compliance Officer, J. Goldman & Co Joseph V. DeMarco, Partner, DeVore & DeMarco Colleen Brown, Associate, Sidley Austin Cindy Donaldson, Vice President of Products and Services, FS-ISAC Merton E. Thompson IV, Partner, Burns & Levinson Eldon Sprickerhoff, Founder and Chief Security Strategies, esentire Inc. Who Should Attend This conference is designed for staff from Investment Advisory Firms and Broker-Dealers including (but not limited to): CISOs (Chief Information Security Officers) CCOs (Chief Compliance Officers) CPOs (Chief Privacy Officers) CTOs (Chief Technology Officers) CSIRO (Chief Security Information Risk Officer) General Counsel/In-house Legal Counsel AND: Tech providers (cybersecurity software, network protection, etc.) IT and Enterprise Risk Management Professionals/Consultants Law firms specializing in: Privacy Data Protection Information Security Consumer Finance Regulatory Compliance E-Commerce & Technology
3 DAY ONE: Monday, August 24, :15 1:30 Welcome and Chair s Opening Remarks 1:30 2:30 Regulator Roundtable: Regulatory Perspectives on Cybersecurity and Beyond Having the right protective measures in place is critical and regulators are placing increased emphasis on cyber-readiness. In the first push of cybersecurity initiatives we ve seen pilot surveys, sweep exams, and risk alerts; the next phase will potentially include a focus on legislation and rulemaking. This panel of top regulators and cybersecurity experts will provide critical insights for firms of all sizes into the current and future threat landscape and best practices to consider in terms of where regulation and enforcement may be headed. Focuses of SEC and FINRA sweeps for the rest of 2015 and into 2016 How are institutions complying with cyber security frameworks? Suggestions on balancing regulatory and internal requirements The latest regulatory thoughts on vendor management How information sharing integrating cybersecurity, IT, fraud prevention, and security may be a way forward How to create an incident response plan that articulates regulatory and legal requirements Specific risks involving terminated employees, theft of hardware, and password sharing A look at the 47 state privacy notification laws Laura L. Grossman, Assistant General Counsel Investment Adviser Association Rich Hannibal, Esq., Assistant Director SEC Office of Compliance Inspections and Examinations Steven J. Randich, Executive Vice President, Chief Information Officer FINRA Andrew Hartnett, Commissioner of Securities Missouri Secretary of State s Office 2:30 2:50 Networking Break sponsored by 2:50 4:00 Effective Governance and Risk Management: Keys to Assessing and Reducing Risks in the Real World Establishing and improving your cybersecurity framework: advantages of incorporating a standard like NIST or ISO/IEC Providing meaningful metrics and cogent analysis to leadership and boards; the responsibility of boards and management in assessing risks and giving IT the tools it needs Framing cybersecurity in the same terms as other business risks Differing models firms can utilize to address the multitude of diverse and agile cyber threats The pitfalls of today s network assessments in terms of measuring risk Small firms and effectively dealing with cybersecurity on a budget Focusing on realistic questions like am I hacked?, rather than can I be hacked? Eldon Sprickerhoff, Founder & Chief Security Strategist esentire Inc. Eric Hess, Founder and Managing Director Hess Legal Counsel Jason Harrell, Corporate SIRO - Investment Management BNY Mellon Glenn A. Siriano, Principal - Information Protection & Business Resiliency KPMG 4:00 5:00 Code Blue: Developing and Implementing a Cyber- Response Plan What does an incident response plan look like? What written protocols need to be in place for a plan to be most effective? What are the must have elements of a breach response plan? Who should you contact and how to contact them? How to run effectual and efficient drills? How often should mock breach exercises be used AND updated? Cyber response for smaller firms How to maintain a nimble, swift response protocol that balances the needs of employees and clients in the face of a rapidly evolving threat landscape Is a uniform data breach response plan possible? Dianne Mattioli, Principal Regulatory Compliance Solutions Michelle Wraight, Vice President & Chief Privacy Officer Pershing LLC, a BNY Mellon company Tate Jarrow, Special Agent, New York Electronic Crimes Task Force United States Secret Service 5:00-6:00 Cocktail Reception Contact Jennifer Clemence for information on sponsoring this reception and/or more at or [email protected] DAY TWO: Tuesday, August 25, :00 8:45 Continental Breakfast 8:45 9:00 Welcome and Chair s Recap of Day One 9:00 10:00 What Hackers Don t Want You to Know: Monitoring, Testing, and the Detection of Threats Analysis of a breach in real-time what are they after and how long have they been inside A look at the types of monitoring available and the procedures, processes, and policies that support strong monitoring Making use of big data analytics for event and anomaly detection and maintaining strong detective controls Penetration tests, fire drills, and vulnerability assessments: best practices for white-hat hackers and some alternatives to standard network vulnerability detection tools Effectively analyzing tests: examining the forensic DNA of a breach to retool and better defend yourself in the future An effective cyber audit how often, and how thoroughly, should the protocol be reviewed and reassessed
4 Peter Keenan, Chief Information Security Officer Lazard Jay Leek, Chief Information Security Officer, Information Technology Blackstone Michael L Woodson, Information Systems Security Director, VP State Street Corporation Peter Keenan, Global Information Security, Head of Information Risk Governance Citi Jim Jones, PhD, Associate Professor of Computer Forensics George Mason University 10:00 11:00 We re Hit: Minimizing Damage and Saving Face after an Attack From fear to acceptance: the philosophically necessary realization that you will be compromised and how anticipate the inevitable How to respond to, and recover from, security breaches large and small Restoring systems the keys to rebooting Lessons learned: implementing process improvements and making sure it doesn t happen again Communicating with clients, regulators, constituents, and the public about a cyber-attack Benjamin Eason, CISO & Vice President Information Technology The Carlyle Group Matthew Lehman, CISO Cetera Financial Group James Markakis, Security Analyst, Systems Engineer Campbell and Company 11:00 11:15 Morning Break 11:15 12:15 Protecting Against Vendor Vulnerability What risks do third-party vendors pose and how much vendor risk management is sufficient to cover financial and legal liabilities? How to conduct adequate vendor due diligence, what questions to ask, what to require in order to do business with them and ensure you re safe? What metrics are useful for effective vendor management? Would your vendors survive a data security audit and not expose the company to major risk? What are the indemnification issues and what happens if a vendor is responsible for a breach? Negotiating changes to contracts with vendors to ensure proper security What are the current regulatory requirements and how may they change in the near future? Melissa Soiefer, Vice President Global Information Security Barclays Adam J. Reback, Chief Compliance Officer J. Goldman & Co 12:15 1:30 Networking Luncheon 1:30 2:30 The Soft Skills of Communicating Cyber Threats: Getting Internal Buy-In Excelling at the business communication s side: shaping the message to organizational decision makers and C-Suite executives Understanding leadership s view of security and how best to present the cyber landscape from training to after a breach Tactical approaches to managing internal expectations Tips to foster a top-down focus on risk management the big picture versus the bottom line Changing the conversation communicating security as an enterprise risk rather than a tech department problem Hiring decisions crafting the best team through effective leadership that empowers while dealing with a dearth of IT talent Joseph V. DeMarco, Partner DeVore & DeMarco Colleen Brown, Associate Sidley Austin 2:30 3:00 Networking Break 3:00 4:00 Learning and Benefiting from Information Sharing What are the benefits to sharing information about attacks? What the threat landscape looks like today A look at information sharing examples How information sharing and threat intelligence can be automated Collecting and collaborating on intelligence in order to retool, rebuild, and redefine your cyber strategy Building partnerships within the industry and across other industries to support situational awareness of threats Cindy Donaldson, Vice President of Products and Services FS-ISAC 4:00 5:00 Cybersecurity Insurance: Protection from the Expected An analysis of the options and need for cybersecurity insurance What should your coverage be understanding your exposure from internal and external threats Preparing for insurance audits: making certain that systems are adequate for your coverage so that your claims aren t denied With such a diverse landscape of cyber need, and such complex systems, what is being covered? Merton E. Thompson IV, Partner Burns & Levinson 5:00 End of Forum
5 Venue Details The Princeton Club 15 West 43rd Street, New York, NY (212) If you require overnight accommodation for this conference, please contact any of the following nearby hotels to check their best available corporate rate over this time frame, or consult your local travel agent. Please note that FRA has not negotiated rates with any of these hotels. Area Hotels: InterContinental Times Square Westin Times Square Millennium Broadway Hotel Hotel Sofitel New York Team Discounts Three people will receive 10% off Four people will receive 15% off Five people or more will receive 20% off In order to secure a group discount, all delegates must place their registrations at the same time. Group discounts cannot be issued retroactively. For more information, please contact Whitney Betts at or [email protected]. Refunds and Cancellations For information regarding refund, complaint and/or program cancellation policies, please visit our website: thefineprint.aspx CPE CREDITS Financial Research Associates, LLC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: Top Reasons to Attend Identify the focus of SEC, FINRA, and possible FCA sweeps for the rest of 2015 and into 2016 Learn how to create a crisis management plan for firms of all sizes that articulates regulatory and legal requirements Hear how to maintain a nimble, swift response protocol that balances the needs of employees and clients in the face of a rapidly evolving threat landscape Uncover the best penetration tests, fire drills, and vulnerability assessments and best practices for white-hat hackers, as well as some alternatives to standard network vulnerability detection tools Understand the philosophically necessary realization that you will be compromised and how to anticipate the inevitable Network with peers and industry thought leaders! The Conference Organizer Financial Research Associates provides the financial community with access to business information and networking opportunities. Offering highly targeted conferences, FRA is a preferred resource for executives and managers seeking cutting-edge information on the next wave of business opportunities. Please visit for more information on upcoming events. Silver Sponsor 3Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats. esentire s flagship offering, Network Interceptor, challenges legacy security approaches, combining behavior-based analytics, immediate mitigation and actionable intelligence on a 24x7x365 basis. The company s dedicated team of security experts continuously monitors customer networks to detect and block cyber attacks in real-time. For more information visit and on Twitter. Bronze Sponsor The recommended CPE credit for this course is 11 credits in the following field(s) of study: Specialized Knowledge and Applications For more information, visit our website: Media Partners
6 tttb CYBERSECURITY VIGILANCE FOR BDs AND IAs Four Ways to Register Fax Call Web Mail FRA NE Cedar Drive Battle Ground, WA Please Mention This Priority Code When Registering FINANCIAL RESEARCH ASSOCIATES 200 WASHINGTON ST. SUITE 201 SANTA CRUZ, CA ATTENTION MAILROOM: If undeliverable, please forward to the CHIEF COMPLIANCE OFFICER OR CHIEF INFORMATION SECURITY OFFICER Standard Conference $2095 Early Bird Rate - on and before July 17, 2015 $1895 Payment Method: Payments must be received no later than (insert August date 17, one 2015 week before conference start date) Please bill my: MC VISA AMEX DISCOVER Card Holder s Name: Name Company Address City Phone Title State INCORRECT MAILING INFORMATION: If you are receiving multiple mailings, have updated information or would like to be removed from our database, please fax our database team at or call Please keep in mind that amendments can take up to 8 weeks. Zip Exp. Date: Signature: Check enclosed: Please bill me later: Make checks payable to Wilmington Financial Research Associates, and write B973 on your check Conference Code: B973 (tax i.d ). EARN UP TO 11 CPE CREDITS AT THIS MUST ATTEND EVENT! FINANCIAL RESEARCH ASSOCIATES PRESENTS CYBERSECURITY VIGILANCE FOR BDs AND IAs Compliance and IT Collaboration on Data and Network Protection August 24-25, 2015 Princeton Club New York, NY It s time to take your information security programs to the next level with this event featuring the thought-leadership of the industry! TO REGISTER: CALL OR VISIT US AT
2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP
2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf
Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down
Program Organizer: Please join us for a NEW Invitation Only Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Role of Firm Leadership, IT, COO, General Counsel Data Breaches Identification
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
CYBERSECURITY EXAMINATION SWEEP SUMMARY
This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,
Oil & Gas Cybersecurity
COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Don t Get Left in the Dust: How to Evolve from CISO to CIRO
SESSION ID: CXO-W04 Don t Get Left in the Dust: How to Evolve from CISO to CIRO JC-JC James Christiansen VP Information Risk Management Accuvant [email protected] Bradley J. Schaufenbuel, CISSP
CYBER & PRIVACY LIABILITY INSURANCE GUIDE
CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
PROPOSED INTERPRETIVE NOTICE
August 28, 2015 Via Federal Express Mr. Christopher J. Kirkpatrick Secretary Office of the Secretariat Commodity Futures Trading Commission Three Lafayette Centre 1155 21st Street, N.W. Washington, DC
Click to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
Anticipating Tomorrow: A Symposium on Emerging Legal Issues in Life Insurance
Anticipating Tomorrow: A Symposium on Emerging Legal Issues in Life Insurance December 5-6, 2011 Philadelphia, PA The Westin Philadelphia CO-CHAIRS Stephen C. Baker, Esq. Drinker Biddle & Reath LLP, Philadelphia,
www.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
Client Servicing for Institutional Asset Managers AND Mastering RFPs & Consultant Databases
Attend One Conference or Both! Proudly Presents Hear Directly from Plan Sponsors and Consultants! Client Servicing for Institutional Asset Managers AND Mastering RFPs & Consultant Databases Effective Strategies
October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
FINRA Publishes its 2015 Report on Cybersecurity Practices
Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February
London Business Interruption Association Technology new risks and opportunities for the Insurance industry
London Business Interruption Association Technology new risks and opportunities for the Insurance industry Kiran Nagaraj Senior Manager, KPMG LLP February 2014 Agenda Introduction The world we live in
Cyber crime risk management protecting your business 4 November 2015
Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC
BECAUSE CYBERSECURITY RISKS ARE ENTERPRISE RISKS. www.blankrome.com/cybersecurity
Working together, Blank Rome LLP and Good Harbor Security Risk Management LLC, haved teamed to provide a comprehensive solution for protecting your company s property and reputation from the unprecedented
Enterprise Risk Management Conference
Updated Program The 2008 Enterprise Risk Management Conference Integrating Risk and Performance October 22 23, 2008, InterContinental Hotel, Chicago Don t Miss Out One Location Only! Pre-Conference Workshops
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
Corporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m.
The Healthcare Financial Management Association of Northeastern New York is pleased to present the following education session: Event Forum: Where: When: Corporate Compliance Programs - Industry Best Practices
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Presidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,
Cyber Risk to Help Shape Industry Trends in 2014
Cyber Risk to Help Shape Industry Trends in 2014 Rigzone Staff 12/18/2013 URL: http://www.rigzone.com/news/oil_gas/a/130621/cyber_risk_to_help_shape_industry_trends_i n_2014 The oil and gas industry s
How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised
ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing
TRANSATLANTIC CYBER SECURITY SUMMIT
TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:
Cyber Security Risks for Banking Institutions.
Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions
SITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
Research & Due Diligence for Wealth Management
Financial Research Associates Proudly Presents 11 CPE Credits Available Research & Due Diligence for Wealth Management Platforms Explore the Art and Science of, Risk Management, Outsourcing and Resource
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson
As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year.
October 1, 2015 Office of the Attorney General Attn: Security Breach Notification 200 St. Paul Place Baltimore, MD 21202 [email protected] To Whom It May Concern: I am writing on behalf of Scottrade
CyberSecurity for Law Firms
CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a
Project Management for Results
Presented by: Project Management for Results March 31 - April 3, 2009 Las Vegas, NV Project Management for Results Learn How to Finish Your Project on Time, on Budget and within Scope You Will Learn How
CYBERSECURITY IN HEALTHCARE: A TIME TO ACT
share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity
Client Update SEC Releases Updated Cybersecurity Examination Guidelines
Client Update September 18, 2015 1 Client Update SEC Releases Updated Cybersecurity Examination Guidelines NEW YORK Jeremy Feigelson [email protected] Jim Pastore [email protected] David Sarratt
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
CYBERSECURITY INVESTIGATIONS
CYBERSECURITY INVESTIGATIONS Planning & Best Practices May 4, 2016 Lanny Morrow, EnCE Managing Consultant [email protected] Cy Sturdivant, CISA Managing Consultant [email protected] Michal Ploskonka, CPA
Overcoming Five Critical Cybersecurity Gaps
Overcoming Five Critical Cybersecurity Gaps How Active Threat Protection Addresses the Problems that Security Technology Doesn t Solve An esentire White Paper Copyright 2015 esentire, Inc. All rights reserved.
Security and Privacy Trends 2014
2014 Agenda Today s cyber threats 3 You could be under cyber attack now! Improve 6 Awareness of cyber threats propels improvements Expand 11 Leading practices to combat cyber threats Innovate 20 To survive,
THE EVOLUTION OF CYBERSECURITY
THE EVOLUTION OF CYBERSECURITY Identifying Best Practices June 2, 2015 Cerone F. Cy Sturdivant Managing Consultant Nashville, TN 1 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when
Cybersecurity For Brokers: 'Only The Paranoid Survive'
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Cybersecurity For Brokers: 'Only The Paranoid Survive'
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS
COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS Hyatt Regency Phoenix is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 11.0 credits for the course. 1 OVERVIEW
HEALTH CARE AND CYBER SECURITY:
HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers
Strengthening Utility Critical
WEBINAR Strengthening Utility Critical Infrastructure Cybersecurity Under June 4, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview The White
Cybersecurity and Insurance Companies
Cybersecurity and Insurance Companies ACLI Forum 500 CEO Leadership Retreat Timothy J. Nagle Vice President & Chief Privacy Counsel Prudential Financial 1 May 13, 2015 What is cybersecurity? Protecting
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
INFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE
promontory.com INFOCUS JUNE 3, 2015 BY EARL CRANE Five Questions to Guide Cybersecurity Risk Management The quick transformation of cybersecurity risk management from obscure specialty to top-of-thehouse
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
IDENTITY THEFT AND DATA BREACH CONFERENCE 2016
IDENTITY THEFT AND DATA BREACH CONFERENCE 2016 Day 1 Thursday January 28, 2016 INTERNATIONAL DATA PRIVACY DAY 7:30am 8:30am Registration 8:30am 9:00am Opening Remarks Conference Chair Kevin M. Scott, President
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
Cybersecurity Awareness for Executives
SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity
Cyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Cybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Attribution: The Holy Grail or Waste of Time? Billy Leonard Google Should this be the end, our Holy Grail? How s that picture going to help you now? But, the pictures make me safer! We can do better. Our
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Rogers Insurance Client Presentation
Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada [email protected]
Why you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Cyber security: Are consumer companies up to the challenge?
Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
