CIO/ CISO National Virtual Banking,
Finance & Insurance Summit
November 30, 2021
CIO/ CISO National Virtual Banking, Finance & Insurance Summit
Anyone can log in from anywhere. All you need is WiFi.
The Assembly will feature members from...
Agenda
* All Times In EST
12:00pm-12:05pm
Opening Remarks
12:05pm-12:50pm
Keynote Panel: “Drive Accountability with Cyber Risk Governance”
BNP Paribas CIB Americas |
CareFirst FEPOC |
Fifth Third Bank |
||
Chris Poulin Deputy CTO / Director of Technology and Strategy |
Cyril Korenbeusser Chief Resilience Officer |
Whitney Palacios Director Security Operations and Deputy CISO |
John Podboy SVP, Cybersecurity & Identity |
read more »
Cyber risk governance defines the guidelines for how the organization manages cyber security. Cyber risk management is the execution of the policies and procedures defined by the Governance team to implement controls, prioritize remediation, and respond to incidents. The two functions often work hand-in-hand, but in some extended businesses, the organizational hierarchy can be rather complex leading to numerous challenges for driving accountability across the business.
Many forward-thinking security leaders have opted to enforce cybersecurity performance standards across their business units, subsidiaries, or geographic teams. But what standard should be used? And how do you manage to this standard in an efficient way?
Join us for this executive roundtable discussion where we will explore the topic of driving accountability with cyber risk governance in more detail.
In this session we will discuss:
- Different options for setting standards, and ideas for implementing
- How Cyber Risk Quantification can be applied to drive accountability
- How to incorporate benchmarking and peer comparisons into your standards
Key takeaways include:
- Ideas for driving accountability across your extended organization
- Tips for utilizing cyber risk quantification as a performance metric
- An introduction to how Security Ratings can play a key role in your governance standards
« show less
12:55pm-1:20pm
Keynote Presenter: “Automating Governance, Risk, and Compliance: Security Differently””
John Willis Sr. Director, Global Transformation Office |
read more »
Finding a proper balance between classic IT governance, risk, and compliance (GRC) and modernization initiatives is a difficult process for most large organizations. Classic organizational risk policy profiles are often redundant, misaligned, or – in many cases – outdated. Join Red Hat for an informative discussion on automated governance and patterns, practices, and opportunities. This session should be useful to anyone working on DevOps, DevSecOps, or risk initiatives.
We’ll share key insight that will help you to:
- Identify your risks
- Define what matters
- Create a system for continuous monitoring
« show less
1:25pm-1:45pm
CXO Fireside: “Building and Maturing a TPRM Program”
Third Party Risk Association |
||||
Jonathan Ehret, CISSP, CISA, CRISC Vice President, Strategy& Risk |
Julie Gaiaschi Co-Founder and CEO |
read more »
These days it seems no organization or industry is adverse to cyber attacks. From open-source software tools to critical infrastructure, threats are coming in all shapes and sizes. It’s more critical than ever to understand the threats facing your organization from the inside and your vendor ecosystem.
Managing your digital supply chain risk does not have to be a cumbersome process. Firms can look beyond security assessments and questionnaires to ensure that their vendor network is operating securely and efficiently.
During this session, attendees will learn:
- New methods for managing supply chain risk
- What tools are most effective to combat vendor risk
- How to generate key data points to make effective third-party risk decisions
« show less
1:50pm-2:25pm
CXO Panel: “Protect Your Keys or Don’t Waste Your Time Encrypting Your Data”
American Family Insurance |
Mass Mutual |
|
|
|
Brad Beutlich VP, Western & LATAM Sales |
Kunal Bhattacharya Director, DevSecOps |
Anne Coulombe Head of Data Protection/Data Cybersecurity |
read more »
For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. We know that when dealing with new working environments, vulnerability risks and other issues, data protection is essential. Poor or inadequate key management can lead to a data breach more than a weak algorithm, and with the amount of data most businesses need to encrypt today, many keys and many encryption tools may be used. If your organization deals with confidential data – and most industries do – encryption is vital to security but key protection is even more important.
« show less
2:30pm-2:50pm
Disrupter Presenter: “Optimizing Financial Services Data Exchange | How to Leverage Your Most Strategic Asset”
|
|
|
||
Bill Fenick Vice President, Enterprise Verticals |
read more »
IT tech leaders within the financial services industry are positioned to influence how their organizations can succeed amidst many digital transformation challenges, such as the explosion of data growth and its implications on legacy IT architecture.
A data-centric IT infrastructure that optimizes data exchange is mission critical. Implementing this strategy will allow financial services firms to defy data gravity, secure data near the customer, enforce data compliance, overcome data infrastructure barriers and ultimately leverage massive data sets as their most strategic asset.
In this presentation by Bill Fenick, Vice President, Enterprise Verticals at Digital Realty, you’ll gain:
- A deeper understanding of why it’s important to re-think your IT architecture
- Expert insights about the industry’s push toward data-driven digital transformation
- Strategies designed to yield greater competitive advantages and new growth opportunities
This session will also feature Digital Realty’s Pervasive Datacenter Architecture (PDx™) Optimizing Financial Services Data Exchange Strategy and Solution models that address industry-specific business challenges for banking, securities, trading & investment banking, wealth management and insurance lines of business.
Key takeaways:
- See why data gravity forces a shift to a data-centric IT architecture, where data is at the center of the architecture and integration is the challenge
- Learn about solutions to overcome the implications of accelerated data growth and increasing data gravity intensity globally
- Understand how our codified strategy and solution approach to data-driven digital transformation – across all channels, business functions and points of business presence – can defy gravity, secure data near the customer, enforce data compliance and achieve AI capabilities
« show less
2:55pm-3:35pm
CXO Panel: “How can we stay cyber-insured?”
TIAA |
Snap Finance |
|||
Nik Whitfield Chairman and Chief Seer |
Robert Serena Senior Director Risk Modeling & Analytics |
Upendra Mardikar Chief Security Officer |
read more »
How do we know our controls are fully protecting us at all times?
That’s the killer question in a ransomware-ridden world where cyber moves towards becoming an uninsurable risk for some.
Measuring, comprehending and attesting to cybersecurity posture is taking over our lives as teams spend more than a 30% of their time on reporting. There are ever more interested stakeholders who demand more detailed, more regular insight into security – execs, audit, insurers, customers, the list grows.
Data quality typically falls short on completeness, timeliness, and accuracy, as teams are drowning in manual workloads and disputes.
« show less
3:40pm-4:30pm
Closing CXO Panel: “The War on Talent: Scaling the Security Team through Developers“
US Bank/Elavon |
Curinos |
TransUnion |
||
Simon Maple Field CTO |
Steve Kinman Field CISO |
Mark Gelhardt SVP, Global Technology Governance |
Anand Pandya Chief Data Officer |
TJ Bowling Information Security Officer |
read more »
In today’s Fintech (e.g., digital lending and credit, mobile banking and payments, cryptocurrency and blockchain, and insurance), there is a need to remain compliant, yet innovative, and to still be able to deliver new products to market without losing speed. How are CISOs balancing emerging regulatory concerns while also taking risks to win market share? Join this panel discussion to learn how Snyk and Mark Gelhardt SVP, Global Technology Governance with US Bank/Elavon, Anand Pandya, Chief Data Officer with Curinos and TJ Bowling, Information Security Officer with TransUnion are tackling new security requirements to do business and the challenges of talent shortages by empowering developers and shifting security left through developer first security.
We’ll discuss:
- How compliance can still be achieved through the governance and tracking of developer adoption and activity
- How security champions programs can formally bridge a gap across organizations
- How to find a balance between regulation and innovation
« show less
* All Times In EST
Media Partners
Got questions? We've got answers!
Why should I attend?
Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.
Where is the event taking place?
The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed.
What is the dress code?
We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.
Can I bring a colleague with me?
Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.
What if I have dietary restrictions?
No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.
What if I want to speak at an assembly?
Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.
I plan on being in attendance, but what if something comes up and I have to cancel?
We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.
In today’s digital landscape, the role of the CIO and CISO within Banking, Finance and Insurance has become the most dynamic amongst their peers. Executives are focused on finding the most transformative technologies that enable them to bring value to their enterprise and their customers.
Adopting an enterprise wide transformation strategy is driven by fundamental shifts in internal and external forces that impact the business and how it operates. Disruptive technologies are being introduced to the market faster than ever and executives must have the ability to align and address the enterprise-wide transformation challenges. These changes will ultimately influence strategic planning, business operations and the overall trajectory of the operating model moving forward. With unceasing demands, technology has become more complex and solution providers more difficult to decipher.
Apex Assembly will unite visionary leaders and industry experts for a half day of content and discussion, where we will examine the challenges of 2021 and concentrate on the most pressing issues of 2022 in the information technology sector.
Through collaboration with our executive community, we have discovered key industry challenges and trends. These topics form the foundation of the Summit and will be addressed through Panels, Disrupter sessions, and Fireside chats.
Hosted using video conferencing technology, our Virtual Summit gives executives and service providers the opportunity to engage with like-minded executives and industry leaders without having to leave their office or home.