Seminar
$245 Thursday, May 16, 2019 9:00 AM 45 Hillman Road, Wisconsin Dells, WI 53965 Register

This seminar was planned to help you and your bank keep up with the latest in IT Risk Management and potential threats to your bank. This program will also help you maintain an effective and comprehensive IT Risk Management Program. A number of emerging risks will be covered, as well as a number of tools you can use to make your duties a little easier.

This seminar was designed for IT Officers, security officers, risk managers, and bank management who are responsible for bank technologies and information security programs.

Seminar Agenda:

9:00 AM

Blindsided – How to Respond When a Vendor Gets Hacked
Michael Carpenter, Ncontracts
It’s easy to forget that vendors store and transmit a tremendous amount of sensitive financial institution data. If you get notified that your vendor has been breached, naturally you’d be blindsided by the event, having to deal with lost staff time, organizational focus, or worse – sensitive customer data. Which would you rather be: Prepared to handle the situation or floundering and worrying about what to do? This session will help you have a game plan with how to incorporate a vendor incident management plan into the vendor management program.

10:00 AM

Break

10:10 AM

Cyber Money Laundering: AML Goes Cyber
Ben Hayden, SHAZAM, Inc.
The world of money laundering has grown far more sophisticated with the introduction of technologies such as high-speed connectivity, virtual currencies, and the Internet of Things. This session will look at some high-profile cases where money launderers utilized the internet to launder money, and will address the future of money laundering and what your institution can do to stop it before it happens.

11:10 AM 

Break

11:20 AM

Cyber Security Landscape: Hackers vs. You
Art Corallo, RMM Solutions
Description available soon.

12:20 PM

Lunch

1:15 PM

Social Engineering, Cyber Security and Hacking
Ben Hayden, SHAZAM, Inc.
The many ways your employees are connected to people and industries outside the bank are growing exponentially. As email, social media, and other technologies expand our personal and professional networks, potential threats to your financial institution increase. An attacker can use these tools to manipulate their victims into divulging crucial, confidential information and it’s one of the main components in every cyberattack. These methods come under a variety of names — phishing, smishing, vishing, and more. We’ll study the anatomy of a cyberattack using real-life tools and examples and provide ways to reduce your risk.

2:15 PM

Break

2:30 PM

Darkest Day or Finest Hour? How to Communicate Essential Information During a Business Disaster
Michael Carpenter, Ncontracts
Picture a debris-strewn field. The injured struggle as news media begins to storm the area. The hero swings into action, swiftly following protocol to save lives and restore as much normalcy as possible. It’s not Hollywood’s latest blockbuster, but it is a situation that could surprise any financial institution. Are you ready to be the director in this scenario? This session will take you beyond phone trees to find out what it really takes to save the day and clearly communicate business continuity plans in times of disaster when lives are in danger and business interruptions loom.

3:30 PM

Adjourn

Registration: 

The registration fee includes all conference materials, lunch and refreshment breaks. Registration is $245 per person.

Refund Policy: Refunds, less a $25 administrative fee, will be provided for written cancellations received via email on or before Friday, May 10, 2019.


$245 Thursday, May 16, 2019 9:00 AM 45 Hillman Road, Wisconsin Dells, WI 53965 Register