CYBERSECURITY VIGILANCE FOR BDs AND IAs

Size: px
Start display at page:

Download "CYBERSECURITY VIGILANCE FOR BDs AND IAs"

Transcription

1 EARN UP TO 11 CPE CREDITS AT THIS MUST-ATTEND EVENT! FINANCIAL RESEARCH ASSOCIATES PRESENTS CYBERSECURITY VIGILANCE FOR BDs AND IAs Compliance and IT Collaboration on Data and Network Protection August 24-25, 2015 Princeton Club New York, NY What specific readiness steps should investment advisory firms and broker-dealers be taking to prepare for attacks that are no longer hypothetical, but assured? The new defense against cyberattacks must be flexible and able to react instantaneously and preemptively to breaches from hackers who represent an agile and unrelenting force seeking to expose vulnerabilities. Get the facts on cybersecurity resilience for IAs and BDs, including case studies and discussions from: Rich Hannibal, SEC Office of Compliance Inspections and Examinations Steven J. Randich, FINRA Andrew Hartnett, Missouri Secretary of State s Office Tate Jarrow, United States Secret Service Jay Leek, Blackstone Matthew Lehman, Cetera Financial Group Benjamin Eason, The Carlyle Group Melissa Soiefer, Barclays Jim Jones, PhD, George Mason University Cindy Donaldson, FS-ISAC SILVER SPONSOR BRONZE SPONSOR TO REGISTER: CALL OR VISIT US AT

2 Investment advisory firms and broker-dealers face stiff odds in the fight against cyberattacks. Across all industries, financial services were the most frequently targeted by hackers as well as the most vulnerable the average cost of an attack being upwards of 22 million dollars, a figure that also amounted the greatest average loss for any industry. The number of breaches represented an increase of almost 44 percent from the previous year. Obviously investment advisory firms and broker-dealers are a lucrative target for hackers an agile and diverse assortment of hacktavists, organized criminals, and nation states but what can IAs and BDs do when cybersecurity already attracts the highest level scrutiny from government and regulators? Join Financial Research Associates on August 24-25, at the Princeton Club in New York, for the Cybersecurity Vigilance for BDs and IAs, a collaborative event that will offer practical, implementable options for firms and brokerages of all sizes looking for protection against threats that are now both persistent, and all but assured. The event will bring together regulators, federal agents, top cyber experts, CISOs, and compliance professionals to collaborate on specific readiness steps to repel hackers determined to access clients data, personal information, and assets. This conference provides crucial new cybersecurity intelligence on topics such as: How to assemble a crisis management plan for firms of all sizes How to maintain a nimble, swift response protocol that balances the needs of employees and clients How to conduct adequate vendor due diligence, what questions to ask, what to require to ensure you re safe Cybersecurity Vigilance for BDs and IAs provides a high-value, comprehensive look at cybersecurity before, during, and after a breach. The event offers a mix of roundtable discussion and actionable strategy sessions; don t miss a chance to see how industry leaders from large and small firms are advancing their cyber defense systems. This event will give even the shrewdest firms implementable strategies worth millions compared with expensive cybersecurity lapses. Register today! Call or online at Sincerely, Ryan Matthews, Conference Director FINANCIAL RESEARCH ASSOCIATES, LLC P.S. This is the MOST COMPREHENSIVE event of its kind! Don t miss an unparalleled networking opportunity! Sponsorship and Exhibit Opportunities Enhance your marketing efforts through sponsoring a special event or exhibiting your product at this event. We can design custom sponsorship packages tailored to your marketing needs, such as a cocktail reception or a custom-designed networking event. To learn more about sponsorship opportunities, please contact Jennifer Clemence at (704) or her at [email protected]. Our Renowned Speaking Faculty: Rich Hannibal, Esq., Assistant Director, SEC Office of Compliance Inspections and Examinations Steven J. Randich, Executive Vice President, Chief Information Officer, FINRA Andrew Hartnett, Commissioner of Securities, Missouri Secretary of State s Office Laura L. Grossman, Assistant General Counsel, Investment Adviser Association Eric Hess, Founder and Managing Director, Hess Legal Counsel Jason Harrell, Corporate SIRO - Investment Management, BNY Mellon Glenn A. Siriano, Principal - Information Protection & Business Resiliency, KPMG Michelle Wraight, Vice President & Chief Privacy Officer, Pershing LLC, a BNY Mellon company Tate Jarrow, Special Agent, New York Electronic Crimes Task Force, United States Secret Service Jay Leek, Chief Information Security Officer, Information Technology, Blackstone Michael L Woodson, Information Systems Security Director, VP State Street Corporation Peter Keenan, Global Information Security, Head of Information Risk Governance, Citi Jim Jones, PhD, Associate Professor of Computer Forensics, George Mason University Matthew Lehman, CISO, Cetera Financial Group Benjamin Eason, CISO & Vice President Information Technology, The Carlyle Group Melissa Soiefer, Vice President Global Information Security, Barclays James Markakis, Security Analyst, Systems Engineer, Campbell and Company Adam J. Reback, Chief Compliance Officer, J. Goldman & Co Joseph V. DeMarco, Partner, DeVore & DeMarco Colleen Brown, Associate, Sidley Austin Cindy Donaldson, Vice President of Products and Services, FS-ISAC Merton E. Thompson IV, Partner, Burns & Levinson Eldon Sprickerhoff, Founder and Chief Security Strategies, esentire Inc. Who Should Attend This conference is designed for staff from Investment Advisory Firms and Broker-Dealers including (but not limited to): CISOs (Chief Information Security Officers) CCOs (Chief Compliance Officers) CPOs (Chief Privacy Officers) CTOs (Chief Technology Officers) CSIRO (Chief Security Information Risk Officer) General Counsel/In-house Legal Counsel AND: Tech providers (cybersecurity software, network protection, etc.) IT and Enterprise Risk Management Professionals/Consultants Law firms specializing in: Privacy Data Protection Information Security Consumer Finance Regulatory Compliance E-Commerce & Technology

3 DAY ONE: Monday, August 24, :15 1:30 Welcome and Chair s Opening Remarks 1:30 2:30 Regulator Roundtable: Regulatory Perspectives on Cybersecurity and Beyond Having the right protective measures in place is critical and regulators are placing increased emphasis on cyber-readiness. In the first push of cybersecurity initiatives we ve seen pilot surveys, sweep exams, and risk alerts; the next phase will potentially include a focus on legislation and rulemaking. This panel of top regulators and cybersecurity experts will provide critical insights for firms of all sizes into the current and future threat landscape and best practices to consider in terms of where regulation and enforcement may be headed. Focuses of SEC and FINRA sweeps for the rest of 2015 and into 2016 How are institutions complying with cyber security frameworks? Suggestions on balancing regulatory and internal requirements The latest regulatory thoughts on vendor management How information sharing integrating cybersecurity, IT, fraud prevention, and security may be a way forward How to create an incident response plan that articulates regulatory and legal requirements Specific risks involving terminated employees, theft of hardware, and password sharing A look at the 47 state privacy notification laws Laura L. Grossman, Assistant General Counsel Investment Adviser Association Rich Hannibal, Esq., Assistant Director SEC Office of Compliance Inspections and Examinations Steven J. Randich, Executive Vice President, Chief Information Officer FINRA Andrew Hartnett, Commissioner of Securities Missouri Secretary of State s Office 2:30 2:50 Networking Break sponsored by 2:50 4:00 Effective Governance and Risk Management: Keys to Assessing and Reducing Risks in the Real World Establishing and improving your cybersecurity framework: advantages of incorporating a standard like NIST or ISO/IEC Providing meaningful metrics and cogent analysis to leadership and boards; the responsibility of boards and management in assessing risks and giving IT the tools it needs Framing cybersecurity in the same terms as other business risks Differing models firms can utilize to address the multitude of diverse and agile cyber threats The pitfalls of today s network assessments in terms of measuring risk Small firms and effectively dealing with cybersecurity on a budget Focusing on realistic questions like am I hacked?, rather than can I be hacked? Eldon Sprickerhoff, Founder & Chief Security Strategist esentire Inc. Eric Hess, Founder and Managing Director Hess Legal Counsel Jason Harrell, Corporate SIRO - Investment Management BNY Mellon Glenn A. Siriano, Principal - Information Protection & Business Resiliency KPMG 4:00 5:00 Code Blue: Developing and Implementing a Cyber- Response Plan What does an incident response plan look like? What written protocols need to be in place for a plan to be most effective? What are the must have elements of a breach response plan? Who should you contact and how to contact them? How to run effectual and efficient drills? How often should mock breach exercises be used AND updated? Cyber response for smaller firms How to maintain a nimble, swift response protocol that balances the needs of employees and clients in the face of a rapidly evolving threat landscape Is a uniform data breach response plan possible? Dianne Mattioli, Principal Regulatory Compliance Solutions Michelle Wraight, Vice President & Chief Privacy Officer Pershing LLC, a BNY Mellon company Tate Jarrow, Special Agent, New York Electronic Crimes Task Force United States Secret Service 5:00-6:00 Cocktail Reception Contact Jennifer Clemence for information on sponsoring this reception and/or more at or [email protected] DAY TWO: Tuesday, August 25, :00 8:45 Continental Breakfast 8:45 9:00 Welcome and Chair s Recap of Day One 9:00 10:00 What Hackers Don t Want You to Know: Monitoring, Testing, and the Detection of Threats Analysis of a breach in real-time what are they after and how long have they been inside A look at the types of monitoring available and the procedures, processes, and policies that support strong monitoring Making use of big data analytics for event and anomaly detection and maintaining strong detective controls Penetration tests, fire drills, and vulnerability assessments: best practices for white-hat hackers and some alternatives to standard network vulnerability detection tools Effectively analyzing tests: examining the forensic DNA of a breach to retool and better defend yourself in the future An effective cyber audit how often, and how thoroughly, should the protocol be reviewed and reassessed

4 Peter Keenan, Chief Information Security Officer Lazard Jay Leek, Chief Information Security Officer, Information Technology Blackstone Michael L Woodson, Information Systems Security Director, VP State Street Corporation Peter Keenan, Global Information Security, Head of Information Risk Governance Citi Jim Jones, PhD, Associate Professor of Computer Forensics George Mason University 10:00 11:00 We re Hit: Minimizing Damage and Saving Face after an Attack From fear to acceptance: the philosophically necessary realization that you will be compromised and how anticipate the inevitable How to respond to, and recover from, security breaches large and small Restoring systems the keys to rebooting Lessons learned: implementing process improvements and making sure it doesn t happen again Communicating with clients, regulators, constituents, and the public about a cyber-attack Benjamin Eason, CISO & Vice President Information Technology The Carlyle Group Matthew Lehman, CISO Cetera Financial Group James Markakis, Security Analyst, Systems Engineer Campbell and Company 11:00 11:15 Morning Break 11:15 12:15 Protecting Against Vendor Vulnerability What risks do third-party vendors pose and how much vendor risk management is sufficient to cover financial and legal liabilities? How to conduct adequate vendor due diligence, what questions to ask, what to require in order to do business with them and ensure you re safe? What metrics are useful for effective vendor management? Would your vendors survive a data security audit and not expose the company to major risk? What are the indemnification issues and what happens if a vendor is responsible for a breach? Negotiating changes to contracts with vendors to ensure proper security What are the current regulatory requirements and how may they change in the near future? Melissa Soiefer, Vice President Global Information Security Barclays Adam J. Reback, Chief Compliance Officer J. Goldman & Co 12:15 1:30 Networking Luncheon 1:30 2:30 The Soft Skills of Communicating Cyber Threats: Getting Internal Buy-In Excelling at the business communication s side: shaping the message to organizational decision makers and C-Suite executives Understanding leadership s view of security and how best to present the cyber landscape from training to after a breach Tactical approaches to managing internal expectations Tips to foster a top-down focus on risk management the big picture versus the bottom line Changing the conversation communicating security as an enterprise risk rather than a tech department problem Hiring decisions crafting the best team through effective leadership that empowers while dealing with a dearth of IT talent Joseph V. DeMarco, Partner DeVore & DeMarco Colleen Brown, Associate Sidley Austin 2:30 3:00 Networking Break 3:00 4:00 Learning and Benefiting from Information Sharing What are the benefits to sharing information about attacks? What the threat landscape looks like today A look at information sharing examples How information sharing and threat intelligence can be automated Collecting and collaborating on intelligence in order to retool, rebuild, and redefine your cyber strategy Building partnerships within the industry and across other industries to support situational awareness of threats Cindy Donaldson, Vice President of Products and Services FS-ISAC 4:00 5:00 Cybersecurity Insurance: Protection from the Expected An analysis of the options and need for cybersecurity insurance What should your coverage be understanding your exposure from internal and external threats Preparing for insurance audits: making certain that systems are adequate for your coverage so that your claims aren t denied With such a diverse landscape of cyber need, and such complex systems, what is being covered? Merton E. Thompson IV, Partner Burns & Levinson 5:00 End of Forum

5 Venue Details The Princeton Club 15 West 43rd Street, New York, NY (212) If you require overnight accommodation for this conference, please contact any of the following nearby hotels to check their best available corporate rate over this time frame, or consult your local travel agent. Please note that FRA has not negotiated rates with any of these hotels. Area Hotels: InterContinental Times Square Westin Times Square Millennium Broadway Hotel Hotel Sofitel New York Team Discounts Three people will receive 10% off Four people will receive 15% off Five people or more will receive 20% off In order to secure a group discount, all delegates must place their registrations at the same time. Group discounts cannot be issued retroactively. For more information, please contact Whitney Betts at or [email protected]. Refunds and Cancellations For information regarding refund, complaint and/or program cancellation policies, please visit our website: thefineprint.aspx CPE CREDITS Financial Research Associates, LLC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: Top Reasons to Attend Identify the focus of SEC, FINRA, and possible FCA sweeps for the rest of 2015 and into 2016 Learn how to create a crisis management plan for firms of all sizes that articulates regulatory and legal requirements Hear how to maintain a nimble, swift response protocol that balances the needs of employees and clients in the face of a rapidly evolving threat landscape Uncover the best penetration tests, fire drills, and vulnerability assessments and best practices for white-hat hackers, as well as some alternatives to standard network vulnerability detection tools Understand the philosophically necessary realization that you will be compromised and how to anticipate the inevitable Network with peers and industry thought leaders! The Conference Organizer Financial Research Associates provides the financial community with access to business information and networking opportunities. Offering highly targeted conferences, FRA is a preferred resource for executives and managers seeking cutting-edge information on the next wave of business opportunities. Please visit for more information on upcoming events. Silver Sponsor 3Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats. esentire s flagship offering, Network Interceptor, challenges legacy security approaches, combining behavior-based analytics, immediate mitigation and actionable intelligence on a 24x7x365 basis. The company s dedicated team of security experts continuously monitors customer networks to detect and block cyber attacks in real-time. For more information visit and on Twitter. Bronze Sponsor The recommended CPE credit for this course is 11 credits in the following field(s) of study: Specialized Knowledge and Applications For more information, visit our website: Media Partners

6 tttb CYBERSECURITY VIGILANCE FOR BDs AND IAs Four Ways to Register Fax Call Web Mail FRA NE Cedar Drive Battle Ground, WA Please Mention This Priority Code When Registering FINANCIAL RESEARCH ASSOCIATES 200 WASHINGTON ST. SUITE 201 SANTA CRUZ, CA ATTENTION MAILROOM: If undeliverable, please forward to the CHIEF COMPLIANCE OFFICER OR CHIEF INFORMATION SECURITY OFFICER Standard Conference $2095 Early Bird Rate - on and before July 17, 2015 $1895 Payment Method: Payments must be received no later than (insert August date 17, one 2015 week before conference start date) Please bill my: MC VISA AMEX DISCOVER Card Holder s Name: Name Company Address City Phone Title State INCORRECT MAILING INFORMATION: If you are receiving multiple mailings, have updated information or would like to be removed from our database, please fax our database team at or call Please keep in mind that amendments can take up to 8 weeks. Zip Exp. Date: Signature: Check enclosed: Please bill me later: Make checks payable to Wilmington Financial Research Associates, and write B973 on your check Conference Code: B973 (tax i.d ). EARN UP TO 11 CPE CREDITS AT THIS MUST ATTEND EVENT! FINANCIAL RESEARCH ASSOCIATES PRESENTS CYBERSECURITY VIGILANCE FOR BDs AND IAs Compliance and IT Collaboration on Data and Network Protection August 24-25, 2015 Princeton Club New York, NY It s time to take your information security programs to the next level with this event featuring the thought-leadership of the industry! TO REGISTER: CALL OR VISIT US AT

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP 2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf

More information

Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down

Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Program Organizer: Please join us for a NEW Invitation Only Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Role of Firm Leadership, IT, COO, General Counsel Data Breaches Identification

More information

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:

More information

CYBERSECURITY EXAMINATION SWEEP SUMMARY

CYBERSECURITY EXAMINATION SWEEP SUMMARY This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Don t Get Left in the Dust: How to Evolve from CISO to CIRO

Don t Get Left in the Dust: How to Evolve from CISO to CIRO SESSION ID: CXO-W04 Don t Get Left in the Dust: How to Evolve from CISO to CIRO JC-JC James Christiansen VP Information Risk Management Accuvant [email protected] Bradley J. Schaufenbuel, CISSP

More information

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

CYBER & PRIVACY LIABILITY INSURANCE GUIDE CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information

PROPOSED INTERPRETIVE NOTICE

PROPOSED INTERPRETIVE NOTICE August 28, 2015 Via Federal Express Mr. Christopher J. Kirkpatrick Secretary Office of the Secretariat Commodity Futures Trading Commission Three Lafayette Centre 1155 21st Street, N.W. Washington, DC

More information

Click to edit Master title style

Click to edit Master title style EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity

More information

Anticipating Tomorrow: A Symposium on Emerging Legal Issues in Life Insurance

Anticipating Tomorrow: A Symposium on Emerging Legal Issues in Life Insurance Anticipating Tomorrow: A Symposium on Emerging Legal Issues in Life Insurance December 5-6, 2011 Philadelphia, PA The Westin Philadelphia CO-CHAIRS Stephen C. Baker, Esq. Drinker Biddle & Reath LLP, Philadelphia,

More information

www.pwc.com Cybersecurity and Privacy Hot Topics 2015

www.pwc.com Cybersecurity and Privacy Hot Topics 2015 www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

Client Servicing for Institutional Asset Managers AND Mastering RFPs & Consultant Databases

Client Servicing for Institutional Asset Managers AND Mastering RFPs & Consultant Databases Attend One Conference or Both! Proudly Presents Hear Directly from Plan Sponsors and Consultants! Client Servicing for Institutional Asset Managers AND Mastering RFPs & Consultant Databases Effective Strategies

More information

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

FINRA Publishes its 2015 Report on Cybersecurity Practices

FINRA Publishes its 2015 Report on Cybersecurity Practices Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February

More information

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

London Business Interruption Association Technology new risks and opportunities for the Insurance industry London Business Interruption Association Technology new risks and opportunities for the Insurance industry Kiran Nagaraj Senior Manager, KPMG LLP February 2014 Agenda Introduction The world we live in

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

BECAUSE CYBERSECURITY RISKS ARE ENTERPRISE RISKS. www.blankrome.com/cybersecurity

BECAUSE CYBERSECURITY RISKS ARE ENTERPRISE RISKS. www.blankrome.com/cybersecurity Working together, Blank Rome LLP and Good Harbor Security Risk Management LLC, haved teamed to provide a comprehensive solution for protecting your company s property and reputation from the unprecedented

More information

Enterprise Risk Management Conference

Enterprise Risk Management Conference Updated Program The 2008 Enterprise Risk Management Conference Integrating Risk and Performance October 22 23, 2008, InterContinental Hotel, Chicago Don t Miss Out One Location Only! Pre-Conference Workshops

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

Corporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m.

Corporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m. The Healthcare Financial Management Association of Northeastern New York is pleased to present the following education session: Event Forum: Where: When: Corporate Compliance Programs - Industry Best Practices

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,

More information

Cyber Risk to Help Shape Industry Trends in 2014

Cyber Risk to Help Shape Industry Trends in 2014 Cyber Risk to Help Shape Industry Trends in 2014 Rigzone Staff 12/18/2013 URL: http://www.rigzone.com/news/oil_gas/a/130621/cyber_risk_to_help_shape_industry_trends_i n_2014 The oil and gas industry s

More information

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing

More information

TRANSATLANTIC CYBER SECURITY SUMMIT

TRANSATLANTIC CYBER SECURITY SUMMIT TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:

More information

Cyber Security Risks for Banking Institutions.

Cyber Security Risks for Banking Institutions. Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions

More information

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events

More information

Research & Due Diligence for Wealth Management

Research & Due Diligence for Wealth Management Financial Research Associates Proudly Presents 11 CPE Credits Available Research & Due Diligence for Wealth Management Platforms Explore the Art and Science of, Risk Management, Outsourcing and Resource

More information

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson

More information

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year.

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year. October 1, 2015 Office of the Attorney General Attn: Security Breach Notification 200 St. Paul Place Baltimore, MD 21202 [email protected] To Whom It May Concern: I am writing on behalf of Scottrade

More information

CyberSecurity for Law Firms

CyberSecurity for Law Firms CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a

More information

Project Management for Results

Project Management for Results Presented by: Project Management for Results March 31 - April 3, 2009 Las Vegas, NV Project Management for Results Learn How to Finish Your Project on Time, on Budget and within Scope You Will Learn How

More information

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity

More information

Client Update SEC Releases Updated Cybersecurity Examination Guidelines

Client Update SEC Releases Updated Cybersecurity Examination Guidelines Client Update September 18, 2015 1 Client Update SEC Releases Updated Cybersecurity Examination Guidelines NEW YORK Jeremy Feigelson [email protected] Jim Pastore [email protected] David Sarratt

More information

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14 www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the

More information

Managing cyber risks with insurance

Managing cyber risks with insurance www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive

More information

CYBERSECURITY INVESTIGATIONS

CYBERSECURITY INVESTIGATIONS CYBERSECURITY INVESTIGATIONS Planning & Best Practices May 4, 2016 Lanny Morrow, EnCE Managing Consultant [email protected] Cy Sturdivant, CISA Managing Consultant [email protected] Michal Ploskonka, CPA

More information

Overcoming Five Critical Cybersecurity Gaps

Overcoming Five Critical Cybersecurity Gaps Overcoming Five Critical Cybersecurity Gaps How Active Threat Protection Addresses the Problems that Security Technology Doesn t Solve An esentire White Paper Copyright 2015 esentire, Inc. All rights reserved.

More information

Security and Privacy Trends 2014

Security and Privacy Trends 2014 2014 Agenda Today s cyber threats 3 You could be under cyber attack now! Improve 6 Awareness of cyber threats propels improvements Expand 11 Leading practices to combat cyber threats Innovate 20 To survive,

More information

THE EVOLUTION OF CYBERSECURITY

THE EVOLUTION OF CYBERSECURITY THE EVOLUTION OF CYBERSECURITY Identifying Best Practices June 2, 2015 Cerone F. Cy Sturdivant Managing Consultant Nashville, TN 1 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when

More information

Cybersecurity For Brokers: 'Only The Paranoid Survive'

Cybersecurity For Brokers: 'Only The Paranoid Survive' Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Cybersecurity For Brokers: 'Only The Paranoid Survive'

More information

OCIE CYBERSECURITY INITIATIVE

OCIE CYBERSECURITY INITIATIVE Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.

More information

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS Hyatt Regency Phoenix is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 11.0 credits for the course. 1 OVERVIEW

More information

HEALTH CARE AND CYBER SECURITY:

HEALTH CARE AND CYBER SECURITY: HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers

More information

Strengthening Utility Critical

Strengthening Utility Critical WEBINAR Strengthening Utility Critical Infrastructure Cybersecurity Under June 4, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview The White

More information

Cybersecurity and Insurance Companies

Cybersecurity and Insurance Companies Cybersecurity and Insurance Companies ACLI Forum 500 CEO Leadership Retreat Timothy J. Nagle Vice President & Chief Privacy Counsel Prudential Financial 1 May 13, 2015 What is cybersecurity? Protecting

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

INFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE

INFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE promontory.com INFOCUS JUNE 3, 2015 BY EARL CRANE Five Questions to Guide Cybersecurity Risk Management The quick transformation of cybersecurity risk management from obscure specialty to top-of-thehouse

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

OCIE Technology Controls Program

OCIE Technology Controls Program OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview

More information

IDENTITY THEFT AND DATA BREACH CONFERENCE 2016

IDENTITY THEFT AND DATA BREACH CONFERENCE 2016 IDENTITY THEFT AND DATA BREACH CONFERENCE 2016 Day 1 Thursday January 28, 2016 INTERNATIONAL DATA PRIVACY DAY 7:30am 8:30am Registration 8:30am 9:00am Opening Remarks Conference Chair Kevin M. Scott, President

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

Cybersecurity Awareness for Executives

Cybersecurity Awareness for Executives SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Cybersecurity y Managing g the Risks

Cybersecurity y Managing g the Risks Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Attribution: The Holy Grail or Waste of Time? Billy Leonard Google Should this be the end, our Holy Grail? How s that picture going to help you now? But, the pictures make me safer! We can do better. Our

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Rogers Insurance Client Presentation

Rogers Insurance Client Presentation Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada [email protected]

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential

More information

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed

More information

Cyber security: Are consumer companies up to the challenge?

Cyber security: Are consumer companies up to the challenge? Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies

More information

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations

More information