Little known before 2014, ransomware is now one of the most popular methods used by hackers to attack corporations. The recent attacks on government entities are more publicized but private corporations have been struggling with ransomware for a few years now. Join Neal Colon to learn more about recent attacks, how ...
For at least half a decade, HSBC helped to wash hundreds of billions of dollars for drug mobs, including Mexico's Sinaloa drug cartel, as well as move money for terrorist organizations linked to Al Qaeda and Hezbollah and for Russian gangsters. Furthermore, HSBC helped countries like Iran, the Sudan and North Korea ...
Teaming-up the public and private sectors to address cybercrime and cooperating with law enforcement is critical in reporting cybercrime to law enforcement agencies.
This expert panel of InfraGard Members and FBI Agents share how they have worked together on cybercrime investigations that affected both ...
Google's Android is the most popular mobile operating system in the world, powering over 2.5 billion devices.
In this exclusive session, Eugene Liderman, Director of Mobile Security Strategy, Google, outlines Android's multi-layered security strategy, which includes hardware and software protections, as well as ...
U.S. organizations were barely GDPR compliant in 2018, when California unveiled its own privacy legislation, the California Consumer Privacy Act, which goes into effect on Jan. 1, 2020. Yet, this is but one of several privacy laws being enacted across the U.S., and it poses many questions about the role of security to ...
As cyber defenders position themselves to support the strategic business directions of their organizations' consumption of cloud technologies, it is critical to have:
Appropriate end-to-end visibility and monitoring;
Threat detection for anomalous user or entity behaviors;
Ability to detect risky configurations, ...
Strong, reliable infrastructure is key to the nation's high standard of living, security, and strong economy. This includes systems like water and power, financial transactions, telecommunications, and so on. In short, critical infrastructure security and resilience is an integral to all of the systems that make our ...
The media continues to report that the threat landscape is evolving. But this is a common cliché that can smokescreen reality. In fact, significant security events tend to share notable commonalities. Regardless of whether the attack is a widely distributed banking Trojan extracted from a phishing email or a targeted ...
From ransomware to infected devices and assaults on the critical infrastructure, organizations are increasingly encroached by advanced threats and threat actors. And security leaders are tasked with taking their traditional cyber defenses to the next level to mitigate the emerging risks. What are the defenses and ...
CISOs, CIOs, CROs are all being asked to measure the effectiveness of their information security programs often overlooking their greatest risk: third party resources. For every company this risk manifests in different forms: third party developed software; vendors/suppliers with access to their data; contractors ...
As email threats become more advanced, machine learning is being used to detect these attacks. Learn the latest about machine learning & how it is changing the threat landscape.
This session discusses:
How machine learning is being used to detect threats
Latest advancements in machine learning for cyber ...
Security professionals are facing today a reality where the balance between attackers and defenders in the Cyber arena has broken. Attackers have attained a significant advantage, unmatched to the means and security controls that the cyber defenders have developed.
In this session, you will learn:
How to stay ...
An overwhelming 92% of businesses are experiencing identity challenges, from lack of resources to lack of security experience. The biggest challenge? Balancing ease of use for employees with increased security for the business. These two goals are critical, yet always at odds. How can IT securely manage users - their ...
Attacks on card-not-present (CNP) merchants are escalating rapidly globally, fueled by rampant breaches, automated credential stuffing attacks, and the rapid growth of the CNP transactional category as a whole. The trend line is concerning for merchants, issuers, and the payment networks alike, as the industry seeks ...
AI will enable breakthrough advances in areas like healthcare, agriculture, education and transportation; it's already happening in many ways. But new technology also inevitably raises complex questions and broad societal concerns. As we look to a future powered by a partnership between computers and humans, it's ...
Senior Vice President of Business Development, AppGuard
Neal Conlon currently serves as Senior Vice President of Business Development for AppGuard. He is dedicated to ensuring clients and partners are successful in protecting their business, mitigating risk, and doing it in a meaningful way. Before Appguard, Conlon was Sales Director at Plurilock, a behavioral monitoring startup with a focus on insider threat. In addition, he has worked for companies that include Morgan Stanley, Guggenheim Partners, and Cushman Wakefield.
Everett Stern currently serves as CEO and Intelligence Director of Tactical Rabbit, a private intelligence agency that provides clients with actionable business intelligence. He made international headlines as a government whistle-blower who helped uncover one of the largest banking scandals of all time. When Stern joined HSBC Bank in 2012, he discovered that the bank was facilitating the transfer of hundreds of millions of dollars by terrorist organizations and major drug dealers, in clear violation of U.S. law. Stern quit HSBC and filed a whistle-blower claim with the SEC. In late 2012, in part as a result of Stern's efforts, HSBC agreed to pay a record $1.9 billion in fines to U.S. authorities. Stern later founded Rabbit Capital Management, a hedge fund, dedicated to uncovering fraud and money laundering activity that feeds the financial needs of terrorist organizations and drug cartels. He has been featured in dozens of news articles and broadcasts, and appeared in a Netflix documentary, "Dirty Money," on Wall Street and corporate greed.
James Bernard currently serves as a Vice President/Investments with Stifel and an active Secure Member of InfraGard's New York Metro Chapter, (affiliated with the FBI), as well as an active member in ISACA and OWASP. He is a mentor for iQ4's centralized applied learning platform as a subject matter expert on The Insider Threat, helping students in the Cyber Security programs at Brooklyn College, SUNY Albany and CUNY. Bernard has 25 years of experience in financial services as a New York City-based financial advisor to high net-worth individuals, retirement plans, and corporations, analyzing market trends and managing all aspects of goals-based wealth planning and asset management through a comprehensive full service platform. Governance, Risk and Compliance training includes risk, fraud and ethics issues, anti-money laundering, OFAC & Economic Sanctions, as well as cyber security best practices and risk mitigation approaches, among others.
Paul Ferrillo currently serves as a partner and shareholder at Greenberg Traurig, LLP. He focuses his practice on cybersecurity corporate governance issues, complex securities and business litigation, and internal investigations. Ferrillo assists clients with governance, disclosure, and regulatory matters relating to their cybersecurity postures and the regulatory requirements which govern them. He represents public companies and their directors and officers in shareholder class and derivative actions, as well as in internal investigations. In particular, Ferrillo has coordinated numerous internal investigations on behalf of audit committees and special committees, and handled the defense of securities class actions alleging accounting irregularities and/or financial fraud.
Dora Gomez is a Director on the Boards of the Association of Certified Fraud Examiners New York Chapter and InfraGard's New York Metro Chapter (affiliated with the FBI). She is additionally the current Northeast Chapter President for the High Technology Crime Investigation Association and a member of their International Board of Directors. She actively manages and plans the chapter meetings and conferences for these organizations and is part of the steering committee for the annual New York Metro Joint Cyber Security Conference. Gomez has over 25 years of experience in insurance and financial services and spent most of her career in the AXA Group in various leadership roles in Audit, Anti-Fraud, Risk Management and IT Security, including significant international experience and perspectives. Most recently she was a Divisional Director of Internal Controls at Wolters Kluwer.
SSA Kachhia-Patel has over 14 years of experience as an FBI Special Agent. During his first seven years, SSA Kachhia-Patel handled foreign counterinlliegence and insider threat matters. SSA Kachhia-Patel, intimately worked Operation Ghost Stories and was responsible for the arrest of the Russian Illegal Anna Chapman. Over the last seven years, SSA Kachhia-Patel has focused his efforts on nation state hacking efforts through field work and program management from FBI Headquarters. Notably, SSA Kachhia-Patel helped to manage large intrusions including the Sony Pictures destructive malware attack and healthcare PII intrusions to name a few. Currently, SSA Kachhia-Patel manages a team investigating nation state sponsored computer network exploitation and attacks.
Eugene Liderman recently joined Google as a Director of Mobile Security Strategy. In this role, he leads efforts around android security evangelism, certifications, and other special programs. Liderman has over 18 years of experience in the Information Technology field specifically around mobile security, directory services, and enterprise email. Prior to Google, he was a Director of Product Management at VMware. Previously, he worked on mobile security product offerings at Good Technology.
Mike La Marca advises multinational clients on compliance with all federal, state and international privacy and data security laws, and managing privacy and cybersecurity risks and policy issues. He also regularly assists companies with developing and implementing their information security programs and addressing related governance issues. La Marca has managed several large-scale cybersecurity incidents, including advising on data breach response and notification obligations. He also regularly assist clients with negotiating and drafting privacy and data security terms in commercial contracts and M&A transactions. Mike is a certified information privacy professional (CIPP/US) by the International Association of Privacy Professionals (IAPP).
Kristen Mathews currently serves as a partner in Morrison & Foerster's Global Privacy + Data Security Group. For more than 20 years, her practice has focused on advising clients on the full spectrum of the most complex privacy and cybersecurity issues, including regulatory and compliance matters. An early leader in the privacy sphere, Mathews has developed comprehensive knowledge and long-term perspective, cultivated a client base across a broad range of industries, and established herself as one of the top lawyers in her field.
Andy Roth is a long-time privacy rights advocate, the Founder of venture-backed payments startup Privacy.com and former Chief Privacy Officer of American Express (voted "Most Trusted Company for Privacy" five years in a row under his leadership). He served as a panelist on the SEC Cybersecurity Roundtable and is a trusted advisor to senior management and boards of directors adhering to the highest standards of ethics and integrity. Roth advises clients on a wide range of technology-driven issues including global privacy and security laws, data strategy, crisis management, fintech, blockchain and diligence in M&A, IPSs, private equity and venture deals.
Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP
A former NSA crypto-engineer, Sabett brings to Cooley LLP his extensive experience in data security, privacy, licensing and IP. Sabett has managed numerous data breach responses involving major retailers, financial and healthcare organizations, and on-line service providers. He served on the Commission on Cybersecurity for the 44th Presidency and has been recognized as a leader in privacy and data security in the 2007-2014 editions of Chambers USA. Sabett is a member of the board for the Georgetown Cybersecurity Law Institute and the Northern Virginia chapter of ISSA. He also is a frequent lecturer and author, and has appeared on or been quoted by a variety of national media sources.
Executive Vice President & CISO, Federal Reserve System
Devon Bryan currently serves as Executive Vice President and Chief Information Security Officer for the National IT Organization of the Federal Reserve System. As the System-level CISO since 2016, he is responsible for ensuring the Fed's information security policies, architecture, programs and incident response team remain effective and efficient. Bryan joined the Federal Reserve from Fortune 500 outsourced payroll and human resources provider ADP, where he served as Global Chief Information Security Officer (CISO). He led ADP's information security strategy, collaborating across the company's geographically dispersed business operations to ensure coordination, consensus, and effective cybersecurity protections across global operations. Prior to joining ADP in 2011, Bryan served as the Deputy Chief Information Security Officer (CISO) for the Internal Revenue Service (IRS) after directing the IRS's FISMA-compliant information security program and leading the IRS's incident response team. His information security career began in the U.S. Air Force, where he served as a Captain and lead network security engineer working on systems and programs to protect the critical network and communications networks of the Air Force's Air Combat Command. Bryan is Co-founder of ICMCP (International Consortium of Minority Cybersecurity Professionals), a 501c3 non-profit which he launched in 2014 and geared toward improving the underrepresentation of women (11%) and minorities (13%) in the field of cybersecurity through academic scholarships, certifications, mentoring and networking opportunities.
Assistant Director for Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency
Brian Harrell was appointed by the President of the United States in December 2018 to serve as the Department of Homeland Security's Assistant Secretary for Infrastructure Protection. He now serves as the first Assistant Director for Infrastructure Security within the newly renamed Cybersecurity and Infrastructure Security Agency (CISA). Harrell is the former Managing Director of Enterprise Security at the Duke Energy Corporation. He is also the former Director of the Electricity Information Sharing and Analysis Center (E-ISAC) and Director of Critical Infrastructure Protection Programs at the North American Electric Reliability Corporation (NERC), where he was charged with helping protect North America's electric grid from physical and cyber attacks. Harrell has spent time during his career in the US Marine Corps and various private sector agencies with the goal of protecting the United States from security threats.
Chris Hallenbeck is CISO for the Americas at Tanium. He provides security leadership and operational insight gained from over 20 years in both public and private sector. Hallenbeck came to Tanium after almost 7 years of government service at the U.S. Computer Emergency Readiness Team (US-CERT). At US-CERT he designed and built their incident response capabilities, and restructured the team's focus toward strategic remediation with a goal of building more resilient organizations. Over countless IR engagements both with government and private sector victims a common theme emerged: a lack of emphasis on IT security hygiene. Prior to joining US-CERT, Chris worked for RSA Security/EMC as a security engineer and with AOL/Time Warner on their global incident response team. He started his career as a Unix sys-admin at Binghamton University.
Craig Harber currently serves as Chief Technology Officer at Fidelis Cybersecurity. He is responsible for directing the product strategy for the organization, ensuring that the technology developments align and compliment the frameworks at the forefront of the industry. Prior to joining Fidelis, Harber held senior technical roles at USCYBERCOM, driving major initiatives in cybersecurity and information assurance, having far reaching strategic impact across the Department of Defense (DOD) and Intelligence Community (IC). His distinguished career began at the National Security Agency (NSA), where he invented the threat-based cybersecurity strategy known as NIPRNet SIPRNet Cyber Security Architecture Review (NSCSAR) that provided DOD policymakers a framework to objectively measure the expected value of cybersecurity investments. Harber transformed Active Cyber Defense concepts into capability pilots, commercial product improvements, industry standards, and operational solutions. He also directed the Integrated Global Information Grid (GIG) IA Architecture; raising the importance of IA to all warfighting platforms resulting in multi-billion dollar increase in DOD IA investments.
Mike Krygier currently serves as the Deputy Chief Information Security Officer responsible for Urban Technology at New York City Cyber Command. He oversees the cybersecurity programs for Smart City initiatives and IoT, Elections and Critical Infrastructure, Mobility, Cloud Computing, Connected Vehicles, and Next Generation 9-1-1, amongst others. With more than 19 years of information technology and security expertise, Krygier came to the City of New York from a position as a Principal Consultant at Mandiant where he advised Government, Financial, Energy, Mining, Software and other industry clients on Cybersecurity strategy. He has previously held security leadership roles at a Fortune 500 global human resources company, a leading national law firm in Canada, and Accenture.
Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP
A former NSA crypto-engineer, Sabett brings to Cooley LLP his extensive experience in data security, privacy, licensing and IP. Sabett has managed numerous data breach responses involving major retailers, financial and healthcare organizations, and on-line service providers. He served on the Commission on Cybersecurity for the 44th Presidency and has been recognized as a leader in privacy and data security in the 2007-2014 editions of Chambers USA. Sabett is a member of the board for the Georgetown Cybersecurity Law Institute and the Northern Virginia chapter of ISSA. He also is a frequent lecturer and author, and has appeared on or been quoted by a variety of national media sources.
Ryan Davis currently serves as the Chief Information Security Officer for Vearcode. He is responsible for ensuring the security and compliance of thousands of assets in a highly scalable SasS environment. Davis has more than 15 years of experience in information technology and security in various industries. Prior to joining Veracode, Davis supported a number of different Department of Defense customers at MIT Lincoln Laboratory in various Information Assurance roles.
Dena Bauckman currently serves as the VP of Product Management for Zix, a leader in email security. She has more than 20 years of experience in defining and executing product strategy and has direct experience with cloud and security solutions. Bauckman joined Zix twelve years ago and has since spoken to numerous industry and security forums on the need for privacy in email communications, industry specific legislation requiring such protection, and technical/business solutions for deploying and operating such services.
Moshe Ishai currently serves as Co-Founder & General Manager HolistiCyber. A world class expert in cybersecurity, he is a senior advisor to several National Cyber CERT nation level committees. Ishai has over 20 years of broad experience and knowledge in Cybersecurity and Information Systems and has played a major role in helping global clients in the financial, high technology, telecommunications and defense sectors successfully implement cybersecurity defense strategies. Before co-founding HolistiCyber, Ishai served as the CEO of COMSEC - the first and largest Information Security and cybersecurity consulting group in Israel. Before being appointed CEO of COMSEC, he filled roles as a Division Director, CTO, and VP Services & Projects, as well as leading the development teams at Malam systems.
GM of Identity & Access Management at LastPass by LogMeIn
John Bennett serves as General Manager of LastPass by LogMeIn's Identity and Access Management business unit. In this role, he is responsible for the general management and business development of all LogMeIn IAM products including, market-leading password manager and identity solution, LastPass, and remote access and management solutions, LogMeIn Pro, GoToMyPc and LogMeIn Central. With more than 25 years of experience driving growth and leading change for communications and SaaS companies, he joined the company in 2017. Prior to joining LogMeIn, Bennett held several product leadership roles at GetGo, a once wholly-owned subsidiary of Citrix that merged with LogMeIn in early 2017.
As Research Director of Aite Group's Retail Banking & Payments team, Julie covers fraud and authentication issues. She has more than a decade of product management experience working with banks, payment processors, and risk management companies, including a number of years leading the product team at Early Warning Services. Julie is fluent in Spanish, holds an M.A. from the Monterey Institute of International Studies and a B.A. from the Michigan State University Honors College.
Diana Kelley is the Cybersecurity Field CTO for Microsoft and a cybersecurity architect, practitioner, executive advisor and author. At Microsoft, she leverages her 25+ years of cyber risk and security experience to provide advice and guidance to CSOs, CIOs and CISOs at some of the world's largest companies and is a contributor the Microsoft Security Intelligence Report (SIR). She was the Global Executive Security Advisor at IBM Security where she built and managed the IBM Security Research Community Newsroom process and was a regular contributor to IBM X-Force research. Kelley is a faculty member with IANS Research, an Industry Mentor at the CyberSecurity Factory and a guest lecturer at Boston College's Master of Science in Cybersecurity program. She serves on the Board of Directors at the non-profit Sightline Security, was an IEEE "Rock Star of Risk" in 2016, speaks frequently at major conferences and co-authored the book Cryptographic Libraries for Developers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.