Hot Topics in Dealing with Banking Cyber Security
Overview:
In a two hour live webcast, a panel of thought leaders and practitioners assembled by The Knowledge Group will discuss the significant and latest issues with respect to Hot Topics in Dealing with Banking Cyber Security.Key topics include:
- Digital Crime
- Threat Overload
- Case Studies
- Heightened Regulatory Oversight
- Threat Detection
- Cyber-Attack Triage
- Recent regulatory issues and updates
Agenda:
BAE Systems
- Digital Crime: Recent attacks suggest that fraud and financial crime have converged – requiring a different approach to cyber defense.
- Threat Overload: Cyber operations teams are overwhelmed with information and need to develop strategies for consuming and prioritizing threat intelligence in a way that is actionable and practical.
- Case Studies: Cyber attacks have many common characteristics and techniques, however based on our understanding of what criminals are after, they can mean different things to different institutions.
United States Department of Homeland Security
Threat Overload
- Threat information sharing must focus on the sharing of data that is “actionable” and meaningful to the recipient.
- Actionable threat information is a function of the recipient’s maturity and risk management processes.
- Recipients of threat information are not uniform and threat information sharing must contemplate a segmentation of recipients.
- Mapped against a segmented base of recipients, actionable threat information can be of several types.
- Actionable and relevant threat information can result in the actions of “awareness”, “basic mitigation”, “detection/prevention”, and “predictive”.
- Threat information sharing relationships and tools have to contemplate and implement standardized structured threat data profiles to get the right information to the right recipients.
- Briefly describe/outline examples of the latter in our contemporary threat data sharing landscape.
Kane Russell Coleman & Logan PC
Heightened Regulatory Oversight: Bank regulators have expressed concern about operational risks posed by increasingly sophisticated cyber threats.
Threat Detection: Best practices include maintaining a written information security policy; security education and training; risk management, including security audits, incident monitoring, and reporting.
Cyber-Attack Triage: Follow the steps in the security policy; consider timing and substance of notifications to board of directors, law enforcement, and the public; and implement damage mitigation as feasible.
Bryan Cave LLP
- Trends in Privacy & Security Class Actions
- Additional Litigation Statistics
Who Should Attend:
- Chief Security Officers
- Risk and Compliance Managers
- IT Security Officers
- Technology Attorneys
- Security Operations
- Compliance, Risk and IT Officers
- Risk Officers and Administrators
- Privacy and Data Security Lawyers and Consultants
- CIOs
- IT Heads
- And Other Interested/Related Professionals
Paul has worked with a wide range of public sector, global financial and commercial institutions to manage the fraud, compliance …
Carlos P. Kizzee is the Deputy Director of the Department of Homeland Security’s Stakeholder Engagement and Cyber Infrastructure Resilience Division …
Kenneth Johnston, a shareholder of Kane Russell Coleman & Logan PC, focuses his practice on class-action and general commercial litigation …
Maria Z. Vathis has a broad range of experience defending corporate clients in complex business litigation matters, insurance coverage, and …
Course Level:
Intermediate
Advance Preparation:
Print and review course materials
Method of Presentation:
On-demand Webcast (CLE)
Prerequisite:
NONE
Course Code:
134595
NASBA Field of Study:
Finance
NY Category of CLE credit:
Law Practice Management
Total Credits:
2.0 CLE
2.0 CPE (Not eligible for QAS (On-demand) CPE credits)
Login Instructions:
No Access
You are not logged in. Please Login or register to the event to gain access to the materials and login instructions.
Unlock All The Knowledge and Credit You Need
Leading Provider of Online Continuing Education
It's As Easy as 1, 2, 3
Get Your 1-Year All Access Pass For Only $199
SPEAKERS' FIRMS:
United States Department of Homeland Security
About BAE Systems
BAE Systems Applied Intelligence delivers solutions, which help clients to protect and enhance their critical assets in the intelligence age. Its intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration. The company operates in four key domains of expertise: cyber security, financial crime, communications intelligence and digital transformation.
Leading enterprises and government departments use the solutions to protect and enhance physical infrastructure, mission-critical systems, valuable intellectual property, corporate information, reputation and customer relationships, competitive advantage and financial success.
For more information, please visit www.baesystems.com/ai.
Website: https://www.baesystems.com/home
About United States Department of Homeland Security
About Kane Russell Coleman & Logan PC
Kane Russell Coleman & Logan PC is a full service law firm with offices in Dallas and Houston. Formed in 1992 with five lawyers, today KRCL has more than 80 attorneys. The firm provides professional services for clients ranging from Fortune 500 companies to medium-sized public and private companies to entrepreneurs. KRCL handles transactional, litigation and bankruptcy matters throughout the U.S. and China.
Website: https://www.krcl.com
About Bryan Cave LLP
Website: https://www.bryancave.com/