February 24, 2017 - Florida Hotel, Orlando, Florida
February 24, 2017 - Live Streaming Video (see below)
February 24, 2017 - Virtual Campus, TCC Ghazvini Learning Center (see below)

As cyber attacks on retail, technology and industrial companies increase so does the importance of cyber security. From attacks on networks to malware compromising credit card information to disgruntled employees sabotaging their companies’ networks from the inside, companies and their customers need to secure their data.

The recent increases in the rate and the severity of cyber attacks on U.S. companies indicate a clear threat to businesses and customers. As businesses come to terms with the increasing threat of hackers, instituting the right policies is critical to maintaining their solvency.

This symposium will help you understand the dangers and challenges and give you guidance on how to implement your own cyber security policy.

If your company is interested in a table top exhibit at this event please click here to download more information.

Who should attend? Those who should attend this engaging event include executive management, IT directors, board of directors, as well as security and operation officers.

Who Should Attend?
Those who should attend this event include executive management, IT directors, board of directors, security/operations officers.

Registration Prior to 2/10/17
FBA Member: $325.00/person
Non-Member: $650.00/person
FBA Member Video: $725.00/site
Non-Member Video: $1,450.00/site
FBA Member Virtual: $285.00/person
Non-Member Virtual: $570.00/person

Registration After 2/10/17
FBA Member: $375.00/per person
Non-Member: $750.00/per person
FBA Member Video: $775.00/site
Non-Member Video: $1,550.00/site
FBA Member Virtual: $315.00/person
Non-Member Virtual: $630.00/person

Schedule of Events

8:00 -   8:30 a.m. - Registration

8:30 - 10:30 a.m. - Opening Remarks and Session 1
Navigating A Digital World: Key Considerations For Directors and Executives
Trent Fleming, President, Trent Fleming Consulting
Cyber security, as a business issue, will be increasingly important to banks and their customers from now on. This session will provide insight for Board members and other executives as they strive to understand the issues well enough to provide regulatory mandated oversight of bank technology and operations. Topics will include regulatory guidance, PR and crisis management considerations, and technology trends that executives need to understand.

10:30 - 10:45 a.m. - Refreshment Break

10:45 - 12:00 p.m. - Session 2 - Regulator Panel
Moderated by Trent Fleming, President, Trent Fleming Consulting
Anthony H. Womack, IT Assistant Regional Director, FDIC
Robert Hurd, Lead IT Expert, OCC
Marcel Cottman, Manager of Examinations, Federal Reserve Bank of Atlanta

12:00 - 1:00 p.m. - Lunch

1:00 - 2:00 p.m. - Session 3 
EFT Fraud Trends
Matt Herren, Product Manager, Payment Analytics, CSI
Today’s world is fraught with fraud risks and huge dollar losses. While the industry is moving toward a more secure payment channel in EMV, that’s really only the start. We must still deal with the ecommerce channel and static card credentials from a risk perspective. In this session, we will discuss the transition to a more secure payment card ecosystem – from EMV and tokenization to digital wallets and beyond. It is imperative that all institutions understand the challenges currently faced in the payment card world, and more importantly, where we are headed in the coming years.

2:00 - 2:15 p.m. - Refreshment Break

2:15 - 3:15 p.m. - Session 4
Building Your Cyber Security Program
Dr. Kevin Streff, Founder, SBS CyberSecurity
Completing your FFIEC Cyber security Assessment Tool was only the beginning. Next, you must transform your risk assessment into a management process, which leverages the assessment, to make decisions regarding proper risk mitigation. These assessment decisions must then be captured in the appropriate policies and procedures of your Information Security Program. Essentially bolstering your existing program to address the emerging, more sophisticated cyber security threats.  The last critical component of strengthening your program is auditing people, process and technology to ensure it is effectively managing your risk. We will help your institution ensure its Information Security Program is ready to address today’s cyber security challenges. 

3:15 - 3:30 p.m. - Refreshment Break

3:30 - 4:30 p.m. - Session 5
State of the Threat Landscape
Alex Hernandez, Vice President of Customer Solutions, DefenseStorm
This session will shed light on the steps the sophisticated attacker takes to gain a foothold inside your organization and remain embedded there to steal your data – undetected and successfully. Prepare for an inside look at the mind of a cyber criminal. Walk through a factious attack step by step and learn the anatomy of a targeted Advanced Persistent Threat (APT). The session will explore methods of reconnaissance, social engineering techniques, detection avoidance methods, and command and control communications.

4:30 p.m. - Adjourn


No content found

No content found

No content found

No content found