Fraud & Breach Prevention Summit: San Francisco

Dates:
March 22 & 23

Keynote:
Coming Soon!

Discounted rate for our San Francisco event will expire February 29th 2016.

The data stolen during a breach is used for many purposes, but especially for fraud. Security and fraud teams are working ever more closely together, both pre- and post-breach, to ensure that they are in the best possible position to defend, detect and respond. In this dual-track event intended for senior InfoSec and fraud professionals, we’ll focus on the latest fraud techniques and technologies, as well as a holistic, strategic approach to looking at the data breach problem that affects all industries. Feel free to switch between sessions in each track and network with your peers, as well as our speakers and sponsors, throughout the day.

Attendees also gain OnDemand access to all summit recordings and our curriculum of 400+ webinars after the Summit.

Additional Fraud and Breach Prevention Summits:

Miami* | DC* | Mumbai* | Chicago* | Boston* | New York* | Toronto | London

* OnDemand recordings available.

Healthcare Security Summit

Join us at our annual Healthcare Security Summit – New York City November 1st & 2nd.

2017 Summit Locations Announced

North America
Atlanta | San Francisco | Washington DC | Chicago | New York | Toronto

Eurasia & Oceania
London | Singapore | Dubai | Sydney | Mumbai | Bangalore | New Delhi

To learn more details and reserve your registration or sponsorship contact us here.
 

Tuesday – March 22

12:00pm – 1:00pm

Workshops Registration & Networking

1:00pm – 2:30pm

Et Tu, Brute? – Your Government Can Take You Down Too

After any significant breach, many parties, ranging from customers, clients, business partners and government agencies, will demand clarity as to how and what data was stolen.

The FTC, for example, will be acting to ensure that any given organization is not negligent or reckless with private information, but upon what information do they act?

In a number of cases, the FTC, has acted in good faith on information provided by third parties but whose agenda, as it transpires, was not so clear and perhaps, not so honorable.

In this session we’ll focus on exactly one such fight, where the FTC relied on highly suspect information, obtained by, for all intents and purposes, a “faux” breach of a cancer-screening service, resulting in a protracted legal fight and ultimately, the collapse of the organization, overwhelmed by litigation, fines and penalties. Michael Daugherty, Founder, President and CEO of LabMD and the author of the book “The Devil Inside the Beltway”, will share his story of what to expect when the federal government investigates you. He’ll then join in a discussion with Joseph Burton, Partner, Duane Morris LLC and with Mathew Schwartz, Executive Editor, ISMG, on the many issues raised by this fascinating story.

Presenters:
Mike Daugherty, President and CEO of LabMD and author of the book: “The Devil Inside the Beltway”; Joseph Burton, Partner, Duane Morris LLC; Mathew Schwartz, Executive Editor, ISMG

2:30pm – 3:00pm

Break & Networking

3:00pm – 4:30pm

The Future of Malware

Malware continues to be an extremely effective tool in the cybercrime arsenal. In this session, we’ll discuss how and why – and we’ll also examine the connection between fraud and malicious code. We’ll investigate how malware is designed to enrich cybercrime gangs and how to prevent intrusions, including:

  • How cybercrime economies work and why the malware used to commit fraud is getting easier to procure;
  • Future trends: the anticipated growth of malware technical capabilities, as well as evolving methods of procurement and distribution;
  • The latest in machine learning and artificial intelligence: how these technologies can be used to identify and block malware – what are the opportunities and what are the unanswered challenges?
  • Information risk strategies: as malware and related fraud evolves, infosec needs to evolve as well. What are the choke points (such as money mules) that might help law enforcement do a better job of cracking down?

Panelists:
Elvis Chan, Supervisory Special Agent, San Francisco Division, FBI; Malcolm Harkins, Global CISO, Cylance, Inc.; Mathew Schwartz, Executive Editor, ISMG

4:30pm – 5:00pm

Closing Remarks

Insight From Our Speakers

 

Wednesday – March 23

<

Fraud Track

The big picture problem, its implications and a strategy for defense, response and recovery.

Data Breach Track

Focused discussions on specific major issues affecting our ability to defend against targeted attacks.

8:00am – 8:45am

Registration, Breakfast & Exhibit Browsing

8:45am – 9:00am

Opening and Welcoming Remarks

Tracy Kitten and Mat Schwartz, Executive Editors, ISMG

9:00am – 9:30am

Keynote Panel: Data Breach Outlook: Tracking the Next, Seemingly Inevitable Attack

It’s a boom time for cybercrime and cyber-espionage, aided by at least two factors. First, many organizations’ websites and databases sport well-known technical weaknesses, while employees remain all to susceptible to low-cost social-engineering attacks. Second, attackers can pummel these technical and human targets using an array of free or low-cost tools and services, until they can successfully access and steal what they’re targeting.

Join this panel session as we discuss the surge in data breaches, low-tech and high-tech attacks, and how we must adapt our defenses accordingly. Our panelists will share real-world insights into not only defense, but understanding the attacker mindset. The discussion will include:

  • What is the scale and scope of today’s targeted attacks and data breaches?
  • Who exactly is executing these attacks and what factors — including financial gain, stealing intellectual property, causing chaos — motivate them?
  • What types of valuable data and/or critical infrastructure are being targeted?
  • Which parts of the organization – website flaws, APIs, mobile devices — are most vulnerable?
  • What is the optimum way to deploy resources to defend against breaches?
  • What related, up-and-coming threats should enterprises beware?

Panelists:
Malcolm Harkins, Global CISO, Cylance, Inc.; Dr. Christopher Pierson, Chief Security Officer & General Counsel, Viewpost; Matthew Rosenquist, Cybersecurity Strategist and Evangelist at Intel Corporation; Dominque Shelton, Partner, Alston & Bird, LLP

Moderator:
Tracy Kitten, Executive Editor, ISMG

9:30am – 10:00am

Keynote: Et Tu, Brute? – Your Government Can Take You Down Too

After any significant breach, many parties, ranging from customers, clients, business partners and government agencies, will demand clarity as to how and what data was stolen.

The FTC, for example, will be acting to ensure that any given organization is not negligent or reckless with private information, but upon what information do they act?

In a number of cases, the FTC, has acted in good faith on information provided by third parties but whose agenda, as it transpires, was not so clear and perhaps, not so honorable.

In this session we’ll focus on exactly one such fight, where the FTC relied on highly suspect information, obtained by, for all intents and purposes, a “faux” breach of a cancer-screening service, resulting in a protracted legal fight and ultimately, the collapse of the organization, overwhelmed by litigation, fines and penalties. Michael Daugherty, Founder, President and CEO of LabMD and the author of the book “The Devil Inside the Beltway”, will share his story of what to expect when the federal government investigates you.

Presenter:
Mike Daugherty, President & CEO of LabMD and author of the book: “The Devil Inside the Beltway”

10:05am – 10:40am

Card-Not-Present: Fraud on the Move, Back to the Future

As fraudsters switch focus back to card-not-present (CNP) schemes, research from the Aite Group indicates that it will soon outpace card-present fraud in the U.S. by 3:1. Globally, payments provider ACI Worldwide saw a 30-percent increase in CNP fraud in the first half of 2015. In fact, ACI says that approximately 1.2 percent of all CNP transactions conducted between January 2015 and July 2015 were fraudulent.

While in-person payment technologies become increasingly sophisticated, CNP transactions still rely on decades-old security mechanisms that are relatively trivial to defeat. Attend this session, and we’ll discuss developments in CNP fraud detection and prevention via:

  • Multifactor, multichannel authentication mechanisms being applied across both the endpoint and call-center channels;
  • Real-time fraud monitoring systems and tools, such as the 3D messaging protocol;
  • The use of behavioral analytics tools to review purchase and payment trends across multiple channels;
  • Tokenization and what it can do to protect consumers and issuers.

Presenter:
Randy Vanderhoof, Director – EMV Migration Forum

Enterprise Cloud Scenarios: How Intelligent Key Management Mitigates Risk in the Cloud

With today’s connected enterprise and broad use of mobile devices, organizations are looking to keep their staff productive from wherever they are, while keeping data secure – hence the rise of intelligent key management. Increasingly, organizations are adopting Enterprise File Sync and Share (EFSS) and are using client side encryption to add an advanced layer of security. Making sure that data stored in cloud-based storage services is securely managed, including using endpoint encryption before transferring documents, is one of the tools in the arsenal. But it can be a challenge for organizations to use these services while making sure they are in compliance with industry and governmental regulations. In this session, we will discuss:

  • The cloud security landscape today, and what is on the horizon;
  • EFSS adoption and how to prevent potential data leakage;
  • Evaluating risk and effective ways to secure data and provide an audit trail or secure reporting method;
  • The advantages of intelligent key management as a transformation tool for encryption;
  • Case studies of workplace scenarios for storing, managing and protecting data.

Presenter:
Mark Hickman, COO, WinMagic

10:45am – 11:15am

The DDoS Shakedown: Extortion is Alive and Well

DDoS as an extortion tactic continues to reinvent itself, and has replaced hacktavism as the leading driver of DDoS attacks during 2015. Whether shifting its target demographics from Bitcoin exchanges or more traditionally known financial services institutions, using DDoS tactics has never been easier, cheaper or more effective.

In this session, Arbor Networks will highlight global DDoS attack data and trends from the 11th Annual Arbor Worldwide Infrastructure Report, and provide insight into specific attack methodologies that have affected some of the largest financial institution through direct connectivity attacks. The increasing use of DDoS attacks as smoke-screening to divert attention from perimeter penetration efforts by persistent attackers during advanced attack campaigns will also be explored.

Presenter:
JP Blaho, Market Insights Leader, Arbor Networks

Role Based Behavior Analytics – Patterns and Anomalies in User Behavior as Indicators of Attack

Following two years of headline breaches at the likes of Target, JPMorgan Chase, Sony, Anthem and OPM, many industries are increasing regulations on cybersecurity. One of the more important requirements is detecting anomalous behavior within your company’s network. So how can your security team distinguish between legitimate user behavior and an unknown attacker within your network?

Machine learning algorithms are revolutionizing the way we do this. By analyzing event data across your entire network of users, apps and devices, and blending that with contextual reference points such as geo location, device type and time of day, distinct patterns emerge.

Learn firsthand how Live Oak Bank’s CISO, Thomas Hill, deployed anomaly detection to protect against unknown threats and comply with emerging cybersecurity requirements from the FFIEC. Then, Praesidio’s CTO, Sean Cassidy, dives into the seven models used for behavior pattern analysis and why guarding against these anomaly types is no longer a ‘nice to have.’

Presenters:
Sean Cassidy, CTO, Praesidio; Thomas Hill, CIO, Live Oak Bank

11:15am – 11:35am

Break & Networking

11:35am – 12:05pm

Federal Reserve Initiative: Faster Payments from End-to-End

Around the world, rapidly evolving technology, end-user expectations and system complexity are forcing payments stakeholders to reassess their strategies. Recognizing these shifts, the Federal Reserve released Strategies for Improving the U.S. Payment System, an ambitious, multi-year plan that focuses on improving the speed, efficiency, and security of the U.S. payment system from end-to-end. Over the past year, payments stakeholders have come together in support of these desired outcomes and committed significant energy and resources to pursuing the strategies outlined in the paper.

Presenter:
Jon Jeswald, VP – Payment Strategy Executive, Federal Reserve Bank

The Growing Threat of SSL Traffic

The adoption of encrypted Internet traffic has exploded in recent years due to security and privacy concerns. Today, it is estimated that more than 65% of Internet traffic will be encrypted by the end of 2016. This increase in encrypted traffic has created a more secure exchange of data—but it has also created a space in which criminals can linger undetected. Increasingly, criminals are hiding their attacks within Secure Sockets Layer (SSL) or Transport Layer Security (TLS). The lack of security effectiveness has led to widespread breaches—resulting in customer costs, lost revenue, regulatory fines, and other issues. How should information security professionals handle this new set of problems?

In this session, we’ll discuss some real-world examples of how companies are dealing with this security challenge, as well as the following topics:

  • The state of SSL traffic and why it matters;
  • The security challenges that encryption can create;
  • How malicious actors are exploiting SSL traffic to hide their activity;
  • How to decide which traffic to decrypt, and how to go about decryption.

Presenter:
Paul Nicholson, Director of Product Marketing, A10 Networks

12:05pm – 12:35pm

The ABA Survey: Changing the Face of Fraud

The 2015 ABA Deposit Account Fraud Survey is the eleventh biennial industry study conducted by the American Bankers Association on the topic of deposit account fraud. For over two decades, this ABA survey series has collected detailed DDA fraud information across traditional and emerging banking channels. With payments innovations picking up speed and the push toward faster payments in the U.S., this survey report series offers a valuable insight into how the modernization of payment methods has changed and will continue to change the type of fraud perpetrated against bank deposit accounts, which hold the funds used to make payments by consumers and businesses. This session will reveal trends and actionable results organizations can use to develop and change their fraud prevention strategies while demonstrating how fraud is evolving.

Presenter:
Jane Yao, SVP – Benchmarking & Survey Research, Office of the Chief Economist, American Bankers Association

We Lost the Battle Against Intrusions — Are We Left to Raise Our Hands in Defeat?

Enterprises are pouring billions of dollars into preventing threat actors from infiltrating the organization. Yet, the rising level of breaches shows that dedicated threat actors will penetrate the organization. Perhaps then the problem is not a technological one, but is rather one of strategy in dealing with cyber-threats?

In this session, we’ll propose a new defense approach. This strategy assumes that the environment is already compromised and focuses on preventing the real risk to the enterprise: the actual exfiltration and hijacking of data. We’ll show how adopting such a strategy enables organizations to streamline security and align with the business operations as they investigate and remediate a threat.

This session will discuss:

  • New and effective strategies to combat today’s advanced threats;
  • Removing the OpEx associated with security solutions;
  • Real-life cases of successful enterprises challenging their security status quo.

Presenters:
Roy Katmor, CEO, enSilo; Bob Vail, enSilo

Insight From Our Speakers

 

12:35pm – 1:35pm

Lunch

1:35pm – 2:05pm

New Account Fraud: Still a Model of Success

Account origination fraud remains one of the fastest growing threats today for organizations ranging from banks to government entities. According to statistics from the Javelin Strategy & Research firm, this type of fraud has risen from $2 billion total loss in 2014 to $3 billion in 2015, while the number of victims has more than doubled during that period – and the damage continues to grow. With account origination fraud so difficult to detect and with the stakes so high, this session will discuss:

  • The products and services at the greatest risk of new account fraud and the factors motivating these events;
  • The customer experience and channel-specific challenges that confound efforts to ascertain the true identity of an applicant;
  • Strategies and technologies to gain a more accurate and holistic picture of account applicants and respond in real time to risk;
  • Ways to integrate solutions with your internal and consumer-facing systems in order to more quickly assess risk and to identify inconsistencies.

Presenter:
Al Pascual, SVP, Research Director Head of Fraud & Security, Javelin Research

Using Data Breach Analytics to Reduce Risk

When an organization suffers a data breach, how can it quantify the total of all the associated costs? The scope of costs goes way beyond a fixed dollar value per stolen record and extends to include legal fees, third-party forensic services, loss of reputation and defense improvement, as well as state and federal penalties. In this session, we will discuss a straightforward approach to quantifying and reporting on the potential financial liability and impact of a data breach. We will use real world experiences to show how to create actionable intelligence encompassing sensitive data and detected threads as well as the importance of producing reports and analytics showing:

  • Liability exposure for C-level executives and board members tied to financial reporting;
  • Clear prioritization of where to invest IT resources to prevent breaches and maintain shareholder value;
  • Metrics that substantiate and validate efforts to reduce and mitigate the impact of a breach;
  • Calculations to help evaluate cyber security insurance.

Presenter:
Billy Austin, VP of Security, LogicNow

2:10pm – 2:40pm

The Future of Fraud

The rollout of EMV technology has changed the face of fraud for restaurants, retailers and merchants. While card-present fraud will likely decrease as the rollout continues, it will remain a major problem, especially for restaurants and food retailers, despite the new chip technology. In this session, we’ll examine the continuing problem of point-of-sale fraud and the solutions on the horizon to mitigate it.

Presenter:
Malcolm Harkins, Global CISO, Cylance, Inc.

The True Cost of Data Breaches – Not Just a Dollar per Record

When an organization suffers a data breach, a number of challenges, impacts, and business decisions contribute to the total of all the associated costs. The scope extends beyond a fixed dollar-per-stolen-record calculation, as it invariably includes expenditures for new security measures, legal fees, third-party forensic services, changes to business processes, as well as a loss of reputation and customer goodwill.

There is a complex set of chain reactions which occur after every significant data breach, each adding its own contribution to the overall cost and business impact.

In this session we’ll discuss some real-world experiences regarding data breaches, how the costs exceed the typical dollar-per-record measure, and how organizations are adapting to learn from their experiences. We will also examine what the future holds, as attackers adapt and shift towards new data manipulation methods.

Presenter:
Matthew Rosenquist, Cybersecurity Strategist and Evangelist at Intel Corp.

2:40pm – 3:00pm

Break & Networking

3:00pm – 3:30pm

Blockchain Tech: A New Hyper-Secure Transaction Fabric

Although developed as a core technology underlying the infamous Bitcoin, the blockchain ledger mechanism is proving to have a multitude of potential use cases, from IoT micropayments to capital market trading, retail banking and even voting.

The bitcoin blockchain is, in effect, a distributed ledger, shared with hundreds of thousands of automated machine auditors all running the bitcoin open source code; they verify the authenticity of every transaction, drastically reducing, if not completely eliminating, fraudulent entries.

Many current transaction mechanisms are vulnerable to fraud, and in this session we’ll walk through the potential impact of broader blockchain deployment.

Presenter:
Robert Schwentker, Co-Founder and President, Blockchain University

Authentication Challenge: The “Dark Side” of SSN Randomization

While the Social Security Administration’s 2011 decision to randomize Social Security Number (SSN) issuance made the identifier less susceptible to fraudsters, it also caused a series of unintended consequences for organizations that rely on the number’s sequencing as a key part of identity-verification and fraud defense. Nearly three years later, what impact has SSN randomization had on enterprises? How can fraud managers better respond to the challenges it presents going forward? In this session, you’ll learn:

  • How SSNs were issued prior to randomization, how they’re being issued today, and why it matters;
  • Common risk management practices affected by SSN randomization;
  • Proprietary research on how the policy change may be impacting risk strategies for new-account acquisition and ongoing authentication;
  • Best practices for uncovering and solutions for addressing the challenges SSN randomization has introduced at your organization.

Presenter:
Ken Meiser, VP, Identity Solutions, ID Analytics

3:35pm – 4:05pm

If Data Has No Value, Its Theft Is Pointless

Consumer and merchant confidence in the payment network requires constant vigilance, investments and cross-industry collaboration. As more consumers shop and pay with connected devices, and commerce increasingly migrates to digital channels, the industry must invest in new standards, technologies and products. One of the best defenses is removing sensitive account data from the payment environment, putting it into a form that cannot be used by criminals for fraud. In this session we’ll discuss the use of chip, tokenization and encryption technologies and how they work in tandem to secure payments.

Presenter:
Eduardo Perez, SVP, Payment System Risk, Visa Inc.

4:05pm – 4:45pm

Keynote Panel: The Apple vs. FBI Crypto Debate

We’ve all heard about Apple’s refusal to comply with a court order to assist the FBI in bypassing security features built into an iPhone that was issued to a San Bernardino shooter. The resulting debate — and the implications for law enforcement, national security, privacy and personal freedom — have led to serious, important and overdue discussions in our post-Snowden era. In this panel discussion, we will continue this healthy debate and examine such questions as whether federal investigators should be able to circumvent security features and encryption, and the potential resulting downsides. Hear new insights from a broad spectrum of panelists with legal and security expertise, but also bring your own opinions to what promises to be a lively session of give and take between panelists, as well as with attendees.

Panelists:
Joseph Burton, Partner, Duane Morris LLC; Elvis Chan, Supervisory Special Agent, San Francisco Division, FBI; Mark Mao, Partner Troutman Sanders LLP; Jim Pflaging, Global Lead – Technology & Business Strategy, Chertoff Group; Contributor, SecurityRoundtable.org; Scott Swantner, Director for Global Security (Western Union Digital Ventures), Western Union

Moderator:
Mathew Schwartz, Executive Editor, ISMG

4:45pm – 5:00pm

Closing Remarks

Panelists:
Tracy Kitten, Executive Editor, BankInfoSecurity & CUInfoSecurity; Mathew Schwartz, Executive Editor, ISMG;

5:00pm – 6:00pm

Cocktails & Networking

Venue

Hilton Financial District

750 Kearny Street
San Francisco, California, USA, 94108
Tel: +1 415 433 6600

Visit hotel website

2016 Speakers

speaker
Eduardo Perez
SVP Payment System Risk, Visa Inc.
 
speaker
Joseph Burton
Managing Partner, Duane Morris LLP
 
speaker
Tracy Kitten
Executive Editor, BankInfoSecurity & CUInfoSecurity
speaker
Mathew J. Schwartz
Executive Editor, DataBreachToday & Europe
speaker
Al Pascual
SVP, Research Director Head of Fraud & Security, Javelin Research
speaker
David Matthews
General Counsel, National Restaurant Association
speaker
Robert Schwentker
President, Blockchain University
speaker
Scott Swantner
Director for Global Security (Western Union Digital Ventures), Western Union
speaker
Matthew Rosenquist
Cyber Security Strategist, Intel Corporation
speaker
Randy Vanderhoof
Executive Director, Smart Card Alliance & Director, EMV Migration Forum
speaker
Sean Cassidy
CTO, Praesidio
speaker
Paul Nicholson
Director of Product Marketing, A10 Networks
speaker
Mark Hickman
COO, WinMagic
speaker
Dr. Chris Pierson
EVP, Chief Security Officer & General Counsel, Viewpost
speaker
Jon Jeswald
VP, Faster Payments Improvement Initiatives, Federal Reserve System
speaker
Mike Daugherty
Founder, CEO & President, LabMD
speaker
Dominique Shelton
Partner, Alston & Bird LLP
speaker
Malcolm Harkins
Global CISO, Cylance
speaker
Billy Austin
VP of Security, LogicNow
speaker
Jane Yao
SVP, Benchmarking & Survey Research - Office of the Chief Economist, American Bankers Association
speaker
Jim Pflaging
Technology & Business Strategy, Chertoff Group; Contributor, SecurityRoundtable.org
speaker
Mark Mao
Partner, Troutman Sanders LLP
speaker
Elvis Chan
Supervisory Special Agent, FBI
speaker
Ken Meiser
VP, Identity Solutions, ID Analytics
speaker
Thomas Hill
CIO, Live Oak Bank
speaker
JP Blaho
Market Insights Leader, Arbor Networks

Featured Past Speakers

speaker
Ron Ross
Fellow, National Institute of Standards and Technology (NIST)
speaker
Art Coviello
former CEO, RSA Security; Venture Partner, Rally Ventures
speaker
Glen Jones
Head of Payment System Cyber Intelligence, Visa
speaker
Lovell Hodge
VP North American Fraud Analytics, TD Bank
speaker
Eduardo Perez
SVP Payment System Risk, Visa Inc.
 
speaker
Ben Knieff
Senior Analyst, Aite Group
 
speaker
Jessica Corley
Partner, Chair of the Securities Litigation Group, Alston & Bird LLP
speaker
George Tubin
Sr. Director, Product Strategy & Innovation, ThreatMetrix
speaker
Mark Sullivan
Head, Fraud Risk Programs, Interac, Acxsys Corporation
speaker
Liz Garner
Vice President, Merchant Advisory Group
speaker
Todd G. Shean
Assistant Commissioner, Federal Policing Special Services, RCMP
speaker
Robert Carr
Founder, Heartland Payment Systems
speaker
Steve Durbin
Managing Director, Information Security Forum (ISF)
speaker
Christopher Ipsen
CIO, Desert Research Institute and Former CISO, State of Nevada
speaker
David Pollino
SVP, Enterprise Fraud Prevention Officer, Bank of the West
speaker
John Walp
Managing Director Forensic Technology, KPMG
speaker
Barbara Pacheco
SVP, Federal Reserve Bank of Kansas City
 
speaker
Joseph Burton
Managing Partner, Duane Morris LLP
 
speaker
Malcolm Palmore
Assistant Special Agent in Charge, FBI San Francisco Cyber Division
speaker
Doug Johnson
SVP & Chief Advisor - Payments and Cybersecurity Policy, American Bankers Association
speaker
Gray Taylor
Executive Director, Conexxus
speaker
Mitch Parker
CISO, Temple University Health System
speaker
Joseph Johnson
CISO, Premise Health
speaker
Al Pascual
SVP, Research Director Head of Fraud & Security, Javelin Research
speaker
David Matthews
General Counsel, National Restaurant Association
speaker
Scott Swantner
Director for Global Security (Western Union Digital Ventures), Western Union
speaker
Matthew Rosenquist
Cyber Security Strategist, Intel Corporation
speaker
Randy Vanderhoof
Executive Director, Smart Card Alliance & Director, EMV Migration Forum
speaker
Jon Jeswald
VP, Faster Payments Improvement Initiatives, Federal Reserve System
speaker
Mike Daugherty
Founder, CEO & President, LabMD
speaker
Malcolm Harkins
Global CISO, Cylance
speaker
Mark Mao
Partner, Troutman Sanders LLP
speaker
Elvis Chan
Supervisory Special Agent, FBI
speaker
Ken Meiser
VP, Identity Solutions, ID Analytics
speaker
Thomas Hill
CIO, Live Oak Bank
speaker
Dr. Yair Levy
Professor - Information Systems & Cybersecurity; Director, Center for e-Learning Security Research (CeLSR), Nova Southeastern University
speaker
Hal Pomeranz
Independent Digital Forensic Analyst & Expert Witness, SANS Institute Faculty Fellow
speaker
Jeremy Hayes
Professional Development & Fraud-Net Coordinator, Florida Bankers Association
speaker
Robert Villanueva
Assistant to the Special Agent in Charge, US Secret Service - Miami Electronic Crimes Task Force
speaker
Jacinto Cofino
VP Risk Services - Latin America and the Caribbean, Visa, Inc.
speaker
Larry Clinton
President, Internet Security Alliance
speaker
Karen Jackson
Secretary of Technology, Commonwealth of Virginia
speaker
Dr. Phyllis Schneck
Deputy Undersecretary - Cybersecurity, National Protection & Programs Directorate, Department of Homeland Security (DHS)

2016 ISMG Summits

Cost

$595

With $100 discount code "EARLY BIRD"

    

Summits Sponsors



































































































































































Association Partners