Public and hybrid cloud adoption is exploding, but so are cloud hacks and breaches. Cloud assets are at risk from the same types of threats targeting physical networks, but traditional security protecting premises-based networks doesn't work in dynamic and elastic cloud environments.
What's more, cybercriminals are...
Brett Johnson, referred to by the United States Secret Service as "The Original Internet Godfather" has been a central figure in the cybercrime world for almost 20 years. He founded and was the leader of Counterfeitlibrary.com and Shadowcrew.com. Working alongside the top cyber criminals of our time, he helped design,...
During this workshop, Troutman Sanders partner Ron Raether will discuss the benefits of table top exercises. He then will explain how to conduct an effective exercise walking through mock incidents and explaining the process. Participants will:
Walk through several common incident scenarios and observe lessons to be...
With the adoption of the EMV standard for payment cards, the associated card fraud has increasingly gone down. This has resulted in cyber criminals shifting focus to other forms of fraud such as gift card fraud and fraud related to online retail purchases which are processed as Card Not Present (CNP) transactions....
When it comes to fraud prevention, many organizations overlook the insider threat - both the malicious actor who intends to commit fraud, as well as the accidental insider who makes a mistake or is taken advantage of by an external entity? The CERT Insider Threat Center at Carnegie Mellon University is one of the...
During this session, we walk through applied use of indicators of compromise for several recent malware campaigns. The presentation starts with weak/tactical indicators, which are low cost for attackers to change and build, to strong/strategic indicators, which significantly increase costs to attackers.
This...
"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation states, cybercrime gangs or lone actors. Join...
Businesses that use industrial control systems, such as the oil & gas industry, have the same cybersecurity exposures that are found in non-industrial businesses: theft of intellectual property, exposure of customer and employee information, exposure of financial information, etc. However, these businesses have the...
"Cyber" has been treated as "just an IT issue" for far too long. It is not "just an IT issue"-cyber is an overall business risk issue that must be properly managed to comply with many laws and regulations, meaning it is also a legal issue. In this session we will examine:
The most impactful recent legal and...
DDoS, enterprise IoT, cyber fraud, industrial controls. Summit attendees over the course of the past two days have been educated on many of the bleeding-edge threats and threat actors, and they have gained insight on the latest tools to detect and respond to attacks. But how do they act upon this information? How do...
Security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in the past year. Learning to onboard new data at the speed of the business will ensure your fraud team can...
Many models of security still have their roots in older infrastructure. But with the death of the network perimeter and the rapidly approaching end to passwords, there has to be a new view of the security landscape to prepare for this future - especially with new devices coming in ever-changing forms.
This...
What is the state of DDoS, as observed by network and security professionals directly responsible for operating and securing global networks?
This session covers a range of issues, from threat detection and incident response to managed services, staffing and budgets. Hear about the daily operational challenges, as...
Financial fraud can be notoriously hard to detect and easy to cover up. But does blockchain technology with its distributed digital ledger now offer a new tool to help organizations reduce risk and prevent fraud?
This session describes:
More about blockchain and its uses beyond digital currencies;
The value of...
What does a targeted attack really look like? How can you effectively defend your organization? What does it take to recover from a headline-grabbing breach and rebuild trust with your customers?
Join Matthew Maglieri, CISO of Ashley Madison's parent company Ruby Life Inc. and ex-Mandiant consultant, as he presents...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.