2022 Cybersecurity Conference Agenda
Tuesday, March 29
All times are listed in Eastern Time
8:30 a.m. – 4:30 p.m. Registration and Cybersecurity Solutions & Cloud Computing Exhibitors
8:30 a.m. – 10:00 a.m. Networking Breakfast
10:00 a.m. – 10:45 a.m. Welcome Remarks and Keynote Address
10:45 a.m. – 11:00 a.m. Break
11:00 a.m. – 12:00 p.m. Security Considerations in the Post-COVID World
Organizations are changing how they deliver and consume technology to adapt to the workforce’s evolving needs in the post-COVID world. This includes supporting a distributed workforce, enabling BYOD, onboarding new collaboration tools, and increasing reliance on mobile and cloud technology. This panel explores how security professionals can ensure the secure deployment and use of these technology changes.
12:00 p.m. – 1:00 p.m. Networking Lunch
1:00 p.m. –2:00 p.m. Broker-Dealer Cybersecurity Practices
With the increase of cyber events at member firms and recent high-profile data breaches, cybersecurity continues to be a frequent hot topic within the financial services industry. During this session, panelists answer your questions related to the cybersecurity issues affecting the broker-dealers. During the session, panelists share their perspectives on effective practices and helpful tips they have identified.
2:00 p.m. – 2:15 p.m. Break
2:15 p.m. – 3:15 p.m. Branch Cybersecurity Controls
Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every day to protect against cyber-crime, safeguard consumer data, and maintain the integrity and resilience of their systems in the face of countless cyber threats. During this session, panelists discuss defensive measures firms can take within branch locations. These measures include the development of cybersecurity policies and procedures specifically for branch locations, incorporating cyber and IT controls testing into the branch audit program, training employees, and ongoing monitoring of the controls at these locations.
3:15 p.m. – 3:30 p.m. Break
3:30 p.m. – 4:30 p.m. IT Supply Chain Risk Management and Closing Remarks
Most organizations depend on third parties, to at least some degree, to achieve their IT objectives. Dependencies range from simple use of off-the-shelf or open-source software, to custom developed IT systems, to data processing and IT support services, to operation of a substantially cloud-based IT program. During this session, FINRA staff and industry practitioners discuss the security risks inherent to various IT supply chain dependencies along with considerations and techniques for assessing and managing those risks across the IT supply chain lifecycle.
4:30 p.m. Conference Adjourns