In this discussion, I'll be covering the automation landscape as it pertains to nefarious actions against hyper connected organizations. We'll begin by talking about what bots were initially designed for and what they've evolved to. My focus will be on the negative effects automation can have on organizations, their...
Creating a cybersecurity incident response plan is a fundamental requirement of any cybersecurity program - and a requirement of many global regulations, including GDPR and PCI DSS. During this workshop, Troutman Sanders' Sadia Mirza will discuss the benefits of table top exercises. She then will be joined by law...
Over the years, the Federal Reserve has worked alongside the industry to pursue real-time, safe, highly secure, efficient, broadly inclusive and ubiquitous payment services in the U.S. The U.S. payments and fraud landscape continues to shift as technology evolves and new risks emerge. During this session, attendees...
In today's digital environment, protecting sensitive information and sales transaction data is of critical importance. Technology and advanced loyalty programs are driving the collection of additional data, causing consumers to pay more attention to the types of data they are willing to share with merchants.
In...
Target. Home Depot. Starwood. These retail and hospitality giants have been among the top data breach headlines in recent years. And in response, the industry formed the Retail and Hospitality Information Sharing and Analysis Center to be a central hub for sharing sector-specific cyber security information and...
Tremendous technology changes in recent years have made exponential leaps in the way we will communicate, interact and transact with each other. The Internet of Things has brought about the potential for embedded low cost sensors on everything around us, on us and even in us. Blockchains and smart contracts with...
The CERT Insider Threat Center at Carnegie Mellon University is one of the world's leading authorities on detecting insider fraud, and it has just released Version 6 of its Best Practices to Mitigating Insider Threats.
As part of this research, the center addresses how to detect and prevent insider fraud, as well as...
In this session, Todd Carroll, former FBI Special Agent, will draw from his experience with the FBI and from his current role as CISO with Cybelangel to discuss:
Case studies showing exposure of sensitive data by trusted partners in airport operations
The increased risk of connected storage and exposure of data...
For at least half a decade, HSBC helped to wash hundreds of billions of dollars for drug mobs, including Mexico's Sinaloa drug cartel, as well as move money for terrorist organizations linked to Al Qaeda and Hezbollah and for Russian gangsters. Furthermore, HSBC helped countries like Iran, the Sudan and North Korea...
Fifty-four percent of survey respondents say their institutions' digital authentication measures are average or below when compared to their peers. And 55 percent rate themselves at average or below when it comes to their institution's current ability to apply the right amount of security to the right transactions at...
Numerous options exist for strong authentication but, each involves introducing some form of friction into the user experience. User testing shows consumers have extremely limited tolerance for disruptions introduced by security measures, even when those measures are designed to protect the consumer, personal...
U.S. organizations were barely GDPR compliant in 2018, when California unveiled its own privacy legislation, the California Consumer Privacy Act, which goes into effect on Jan. 1, 2020. Yet, this is but one of several privacy laws being enacted across the U.S., and it poses many questions about the role of security to...
Cybercrime has targeted bank and payments solutions for a long time, but in the past few years has expanded its target industries to airlines, insurance, travel, retail and others. CISOs and fraud leaders that have been focused on insider threats are finding they need to consider the fraud darknet eco-system and...
Stories, practical experiences, anecdotes and a bit of humor about creating and managing cloud security programs and the journey to devsecops. This will be an interactive session.
The session will cover:
Key components of cloud security programs and the basics of devsecops
Real world challenges and practical...
The bad guys are winning the war on identity-theft, with losses mounting for organizations across sectors. Increasingly organized criminals have plenty of weapons in their arsenal, including vast quantities of breached data and carefully cultivated synthetic identities. What are the top trends shaping the rising tide...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.