July 22, 2020
Virtual Event
8:25-1:30PM ET
This event will focus on how cybersecurity must evolve to continue to effectively protect financial services firms.
Agenda | Location

We’re live! If you’re having trouble logging in from your work computer, please try using a personal device.

Please click here to view important system requirements & troubleshooting tips, and click here to perform a tech tech to ensure that your computer settings are compatible with today’s event platform.
Are You Ready for the Next Generation of Cybersecurity?

Financial firms are well on the path towards zero-trust security, the emerging paradigm in which a distributed network of highly granular trust replaces yesterday’s binary (outside = bad; inside = good) architectures.

But where do we go from here?

Seminar Objectives
This seminar is jam-packed with deep insight into the future of cybersecurity and how it must evolve to continue to effectively protect firms.

Panel Discussion Objectives
The accompanying panel session will share war stories and best practices from CISOs at leading firms, as well as from our industry experts. We’ll provide practical guidance on how to prepare for the coming threat environment.

Topics covered will include:

  • Zero trust architecture and its implications
  • Cyber-security protections at the infrastructure, application, and device level
  • Cloud and cloud security: best practices
  • Effectively managing and mitigating risk (third-party, internal, and other)
  • Ensuring continuity, uptime, resilience, BCP/DR in the cloud era
  • Security in a device-proliferation world
  • Infrastructure security
  • Identity and Access Management for financial services
  • Best practices for Incident Response Policies (IRP) in the cloud era
  • Securing DevOps: container security, orchestrator security
  • Mobile application and device security
  • Measuring risk mitigation for cybersecurity
  • Known vs unknown patterns in cybersecurity and advanced threat detection/threat hunting
  • Edge to core modeling
  • Insider threat and digital ethics
  • Digital fraud
  • Security dashboards
  • How to communicate about cybersecurity to the board

Agenda

8:25AM-8:30AM WSTA Introductions: Thomas Doughty, VP-Chief Information Security Officer, Prudential Financial and a WSTA Vice President

8:30AM-8:55AM Keynote Presentation: “Securing the Externalized Enterprise: Best Practices”

8:55AM-9:15AM Premier Sponsor Presentation: “Delivering on the Fusion Center Promise”

9:15AM-9:35AM Secondary Sponsor Presentation: “Establishing Secure Multi-Cloud Data Control by Modernizing Data Management”

9:35AM-9:45AM Break and Virtual Tabletop Rooms Open (Remain Open Until 1:30PM)

9:45AM-10:05AM Presentation: “The Revolution of Policy Based Access Control: Controlling who can Access your Data”

10:05AM-10:25AM Presentation: “The Intersection of Connectivity and Security”

10:25AM-10:45AM Presentation: “The CISO Reinvented”

10:45AM-11:05AM Presentation: “Implementation of Scalable Identity Control”

11:05AM-11:25AM Presentation: “Evolving Access"

11:25AM-11:35AM Break and Entertainment on the Main Stage

11:35AM-12:35PM Panel Discussion | CISO's at leading firms will provide practical guidance on how to prepare for the coming threat environment

12:35PM-1:30PM Virtual Tabletop and Entertainment Rooms Remain Open

1:30PM- Event Concludes


Eligible for CPE Credits
Earn up to 4.5 CPE Credits at this event! Click here for more details.

Cancellation
To Cancel your Registration, click here.

Address:
WSTAnywhere
Virtual Event
Join from a computer, tablet or mobile device