June 5-6

Westin Gaslamp Quarter Hotel, San Diego

Agenda

Agenda*

Monday, June 5 (registration opens at 8:15 a.m., continental breakfast available; lunch at noon; reception, 6 p.m.):

9 -- 9:15 a.m.

Opening Remarks and Welcome (Brian Knight, NASCUS & Tracy Blaske, CUNA; Randall Romes, CliftonLarsonAllen (CLA))

9:15 -- 9:30 a.m.

NCUA’s Commitment to Cybersecurity (The Hon. Rick Metsger)

9:30 -- 10:30 a.m.

Keynote Address (Jim Stickley, Stickley on Security)

Jim Stickley is proof that cybersecurity education can be entertaining. Over a long career, Jim has stolen credit cards, breached bank security, broken into government facilities protected by armed guards and stolen countless identities. Lucky for everyone that Jim is not a criminal, but one of the good guys, testing security measures and finding the weakness before the bad guys do.

10:30 -- 10:45 a.m.

Break

10:45 -- Noon

The Current State of Cybersecurity and Survey of the Threat Landscape(Randall Romes, CLA)

From the IoT attacks to expanded ransomware and phishing, threat vectors facing financial institutions continue to evolve. This session will survey the state of cybersecurity in 2017.

Noon -- 1:30 p.m.

Lunch & Introduction to Cyber Threat Intelligence Sharing (Gene Fredriksen, Director, NCU-ISAO)

 

1:30 -- 2:15 p.m.

Cybersecurity on the World Stage: International Trends (Mike Hepple, Cyber Security Consultant, BAE Systems Applied Intelligence)

BAE Systems’ Threat Intelligence team has been busy since reverse engineering the SWIFT malware in April of last year. Join Mike Hepple for an overview of several recent financial crime investigations and a look into recent trends seen by BAE Systems security staff.

2:15 -- 3 p.m.

Beyond Fraud: Combating Cyber-Enabled Financial Crimes(Mau Castanheiro, Director of Fraud Analytics, Verafin)

Industry expert Mauriceo Castaneiro will discuss advisories from FinCEN on Cybercrime and Email Compromise Fraud, the impact of cyber-enabled crimes on financial institutions and their customers, and best practices to detect, investigate and report cyber-related financial crimes.

3:15 -- 4 p.m.

View from the Trenches: Panel Discussion (Chad Carrington, Golden 1 CU; Robert Lipot, California DBO; presentation here)

Our panel of practitioners, both security officers and examiners, will lead a discussion of their views on cybersecurity.

4 -- 4:45 p.m.

View from Trace Security (Jerry Beasley, Security Services Manager, Trace Security)

 

4:45 -- 6 p.m.

Breaches – Incident Response-Forensic and Crisis Communication(Chad Nordstrom – IT/Forensics (CLA); Jon Cohen, Esq., Partner, Joseph & Cohen, PC; Remi Gonzalez, Senior Vice President, Public Communications Inc.)

After a cyber intrusion, IT is mitigating the breach while the legal and marketing/media/communication department prepares for the aftermath. IT, Legal, and Communications should understand how to work together to best protect the institution.

6 p.m. Reception


Tuesday, June 6 (Continental breakfast at 8 a.m.; working lunch at noon):

8:30 -- 9:30 a.m.

The View From NCUA (Patrick Truett, Information Systems Officer, Office of E&I, NCUA)

NCUA shares its views on cybersecurity preparedness and supervision and will provide insights into regulatory initiatives

9:30 -- 9:45 a.m.

Break

9:45 -- 10:45 a.m.

Ethical Hackers Perspective – 10 Things that Make a Hacker's Job Easy(David Anderson, CLA)

Hackers and organized crime have monetized their activities and created a lucrative and robust black market industry for stolen personal financial information and personal identifiable information.  The session will include “live demonstrations” of email phishing and social engineering attacks.

11 -- Noon

Is it Safe? Understanding the Vulnerabilities of the Cloud (Chad Carrington, Golden 1 CU; Pete Sedgwick, BIG, Best Innovation Group Inc.; presentation here)

This session will focus on cloud computing, exploring the benefits and vulnerabilities of moving processing and data to the cloud.

Noon -- 1:15 p.m.

Lunch & Threat Intelligence(Jeffery Korte, Director, FS-ISAC)

 

1:15 -- 2:15 p.m.

Cyber Risk Rating an Institution (Jim Brahm, Security Compliance Associates Inc.)

A cybersecurity risk assessment is critical to understanding the vulnerabilities of an institution. This session will focus on practical lessons on conducting a risk assessment, including what mitigating factors to consider and how to calculate an overall rating.

2:15 -- 3 p.m.

Understanding Cybersecurity Vulnerabilities and Protections (Rob Fraser, Senior Corporate P&C Sales Specialist, CUNA Mutual Group)

Cybersecurity trends are continuously evolving and incident response planning can help ensure the entire organization is prepared for a breach. Join this session to learn what constitutes a data breach, as well as breach trends and credit union specific statistics. Participants will also learn how to leverage robust risk management services and coverage that come with the Beazley policy.

3 p.m. -- 3:15 p.m.

Break

3:15 -- 3:45 p.m.

What’s New in Cybersecurity Litigation and Enforcement? (Patrick Sickels, CU Answers) See also bonus material: What's new in litigation (white paper)

This session will focus on notable cyber litigation and enforcement actions, focusing on what important lessons should be learned from the mistakes of others

3:45 -- 4:45 p.m.

Do You Know Who you are Dealing With: How Authentication Affects Prevention, Detection, and Response (Scott Koller, Partner, BakerHostetler; Eric Scales, Mandiant)

Attackers often leverage “legitimate” credentials during an attack. Almost all breaches require the investigation of credential usage, & unless you are prepared it may be difficult to distinguish between legitimate and unauthorized activity. This session will review real-life examples of authentication failures & provide practical advice to prevent, detect & investigate credential misuse.

4:45 p.m.

Symposium Adjournment

*Subject to change

6/5/17