Trends that Impact - Jim Rechel, President, The Rechel Group & Dan Hadaway, infotex
Jim Rechel and Dan Hadaway will provide a look back on the year, not for nostalgia, but for the trends waiting in the shadows of the most important security issues facing banks. From the impact of evolving technology, to innovative ideas, the opening session will set the stage the year ahead.
Bank Robbery Risks - Steve Secor, FBI Agent
Steve Secor, FBI Agent, Bank Robbery Coordinator for Violent Crimes Task Force will speak on bank robbery activity and trends over the last 12 months will be analyzed, with a focus on bank robberies in the Midwest. Revealing the newest tactics and methods that today’s robbers are currently utilizing through real life examples.
Terror, Takeovers and Technology - Chris Allen, FifthThird Bank & Jim Rechel, The Rechel Group
Money is the lubricant of the engine of criminal organizations, some with ties to international terror, which prey up on banks and communities of all sizes. This session will highlight the operational aspects of a current fraud scheme that involves millions of dollars, phony merchants, retail bank accounts, debit cards, and small towns being used as the hiding place for international wide fraud.
Cyber-Attack Interactive Exercise - Tom Williams, Business Continuity/ Disaster Recovery Strategy Manager & Allen Eaves Jr., Gladiator Product Manager, Jack Henry and Associates
After all we have done to protect our customers, when we make “the mistake” it is Incident response that makes us or breaks us. Back by popular demand, Tom and his team will lead us through an incident response tabletop exercise. This year’s scenario: The Insider Threat. Be ready!!
Cyber Battle - Attacked vs. Defender - David Anderson, OSCP, Manager, Information Security, CLA & Jason Juntunen, OSCP, OSWP, Information Security Senior Consultant, CLA
This session will demonstrate “live” network attacks from two perspectives: the attacker and the defender. The attacker will demonstrate popular attack vectors that many organizations are vulnerable to. The defender will demonstrate how to defend against these attacks. The defensive solutions provided will focus on free tools or configurations.
Human Trafficking: Modern Day Slavery “Hidden in Plain Sight” - Kevin Gulledge, Abrigo
Human Trafficking, or modern-day slavery, is the fastest-growing crime in the world. In this session, we will discuss in-depth some common myths and misconceptions about human trafficking, who are the victims of these crimes and how are the victims are forced, coerced or fraudulently exploited into these situations by traffickers, terrorist groups and other criminal organizations and we will discuss how these victims are "hidden in plain sight" and some red flags to watch out for in order to prevent this from happening in your community.
The State of Cyber Breach Litigation: Murky Water that Continues to Swell - Molly A. Arranz, Partner, SmithAmundsen
With a trifecta of data privacy laws—found in industry regulations, federal statutes and state laws, getting a clear view of what is legally required for your company can be a challenge. At the same time, client, customer and contracting-partner expectations continue to rise, and the litigation that can ensue—with waves of varied findings and rules—make the law surrounding cybersecurity and cyber-breach hard to navigate. Join us as we consider the ever-changing area of data privacy and security litigation. How successful have the cyber breach lawsuits been? Can we delineate factors that courts consider for throwing these cases out? How do you avoid litigation hot water in the first place? In addition, we will attempt to forecast the next storms of potential litigation and enforcement actions.
Human Hijinks—Ways to Steal Your Data - Steve Stasiukonis, President, Secure Network Technologies
Pen Tester and Social Engineer Steve Stasiukonis will explain new Social Engineering techniques and how white-collar criminals leverage the use of common people, processes and technologies to infiltrate the internal workings of your bank. Steve will share real world experiences on how his company uses these techniques to breach the networks of numerous financial institutions (during tests, of course). The talk will focus on how malicious actors use publicly available Internet based information to defeat the Financial Institutions security controls. It will show us ways criminals are defeating physical and digital Financial Institution security by leveraging imposter access, and provide tips on training your employees to protect your Financial Institution.
Rethinking True Safety and Security - Surviving the Life or Death Gap - Terry Choate Jr., Blue U Defense & Joe Hileman, Blue U Defense
Developing a plan to survive a sudden unplanned incident of violence is impossible. What is required is the development of "thinkers". Those who understand both the problems and the solutions and have the ability to constantly adapt and develop reactionary skills that truly mean something and will work - in reality. Prepare to change the way that you think about safety and security!