Session Abstracts - October 6th, 2022
The conference features educational talks and a panel to expand your knowledge and foster security discussions.
The Fraudster, The Con, and The Liar: How Elders are Targeted for their Wealth
Dora Gomez, FinCrime, Fraud, and Compliance Leader, EY

There is a global pandemic and it is not what you think. The world is tackling many scams, fraudsters, and con artists. The 50+ age population owns over 67% of deposits in the U.S. which unfortunately makes them vulnerable targets. In less than 14 years, Seniors will out number children and fraudsters are well aware of this. Sadly, Elders are victims of the people they trust the most. If you are not familiar with the financial exploitation of vulnerable persons, you will learn about some of the cyber crimes, scams, con artists, and fraudsters that are perpetrating these frauds. What are financial institutions and the professional community doing about this and how can elders/seniors protect themselves? Are there enough laws and regulations to protect the most vulnerable and elders from financial exploitation?

We need to get ahead of this risk before more Elders become victims, and before WE eventually become targeted victims ourselves.
How To Fix The Most Critical API Security Risks
Niloufer Tamboly, Co-Founder, (ISC)2 New Jersey Chapter

Businesses are constantly looking for ways to improve their operations. One way to do this is by using APIs. APIs allow businesses to automate workflows, systems and applications. This can be helpful in many ways, but it can also be a source of security risks. If your business uses APIs, it is important to take precautions to protect them from cyberattacks. Learning Objectives:
  • Importance of APIs in the digital ecosystem.
  • Understand the top API Security risks.
  • Practical tips to effectively secure APIs and workloads.
Building a Cyber Risk Register
Kathy Braun, Director/Business Information Security Advisor for Cyber Security & Information Technology, WheelsUp

The Enterprise Risk Management (ERM) solution must address the firm's broader mission and business objectives. This includes the necessity to integrate threat intelligence to identify, assess, and manage risk.

The focus is on the use of Risk Registers to manage and measure security and privacy controls, introduce threat modeling, set risk appetite thresholds, and include business stakeholders in the ERM operating model. Key Risk Indicators as opposed to relying on Performance Risk Indicators move a company toward a security posture where risks are identified, prioritized, and communicated resulting in a proactive ERM program.
The Most Common Root Causes of Breaches
Mary Frantz, Managing Partner, Enterprise Knowledge Partners, LLC

Coming Soon!
An Overview of the Cyber Security Framework Frenzy
John C. Checco, President, ISSA NY Metro Chapter

From DoD's CMMC to MITRE ATT&CK, frameworks come in all shapes and sizes. Many cyber security practicioners rely on a single framework promoted by their organization; but it is okay to utilize more than one framework in an organization. The reality is that every framework has a distinct purpose. We'll delve into the nuances and origination of several frameworks, providing a "tower of babel" toalign a specific need to the proper level of framework.
Enabling Trust and Embedding Security
Sandip Dholakia, Principal Information Security Architect, SAP Trust Office
Paul Greif, Global Cloud Security, SAP Trust Office

The world is entering a new phase in the digital age and protecting integrated systems will become a higher priority. Balancing the needs of security, privacy and the customer experience will be a growing challenge. As demand for issues around trust grow in the marketplace, SAP Trust Office aims to drive core leadership in shaping this narrative, join this session to learn more on the lessons we have learned, hurdles we have overcome for enabling trust and embedding security.
The Face We See in the Digital Mirror
Richard Thieme, Professional Author/Speaker, ThiemeWorks

One danger of knowing a great deal about our areas of expertise is that we might neglect other areas and miss the big picture. Feedback loops from the big picture profoundly influence how we design our technological work. Cross-disciplinary learning is essential to including what we know in a larger matrix of understanding.

The face in the digital mirror refers to the transformation of identity from "individuals" up to geopolitical structures as a result of technological revolutions. Richard Thieme presented his insights into the ways the digital revolution would change everything thirty years ago when he began writing "Islands in the Clickstream," one of which had the title of this talk. At first he was told he was crazy, then that he was a prophet, and now, "well, yers, we all knew that." But we didn't all know it, nor do we all know the visionary landscape he sees in the light of new transformational engines that will once again alter "the face in the digital mirror."

As part of our educational mission as a coalition of non-profit organizations, registration fees are only to cover the costs of the logistics.

[ Home ]