FSISACEUSummit 2014 Nov. 3, 2014 to Nov. 5, 2014, London,England
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
EC3’s Role in Countering Cybercrime | Troels Oerting | The presentation will elaborate on the efforts of EC3 in strengthening the law enforcement response ... | |
Actionable Security Intelligence | Etay Maor | The financial services sector continues to be a target of evolving distributed denial of service ... | |
The Growing Problem of Defending Your Brand, Your Customers and Your Business Online | Lou Manousos | The proliferation of Web properties and mobile apps is occurring rapidly among financial institutions and ... | |
CISO Panel Intelligence and Information Sharing in the EU | Claus Norup , Teresa Walsh , Isabel Gonzalez , Marko Hartwig | This panel of CISOs will discuss the current state and strategic vision they have for ... | |
Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning, and BGP Hijacks | Mohit Lad | The network is a key component in application delivery and is often a direct or ... | |
Adventures in Threat Intelligence | James Chappell | The security technology community has been evolving threat intelligence capabilities in an attempt to understand ... | |
Introduction to the FS-ISAC’s Federated Cyber Intelligence Repository | Aharon Chernin | The presentation will begin by describing the need for cyber intelligence standardization. Once the audience ... | |
Using Cyber Defences to Counter Cyber-Enabled Crime | David Bailey | The world of crime is changing, morphing and evolving into something far more dangerous than ... | |
Aggressive Defence Against Account Takeover Malware | Don Jackson | With a thriving market for criminal-to-criminal (C2C) services and a flourishing underground ecosystem of tools ... | |
(Part 1) Information Sharing in Europe and in the Netherlands | Michael Samson | N/A | |
(Part 2) Responsible Disclosure in the EU | Eelco Stofbergen , Jan Joris Vereijken | N/A | |
Moar Malware, Less Malware | Marshall Heilman | This highly technical talk will explore the in-depth functionality of malware leveraged by attackers over ... | |
Need for Speed: The Faster You Resolve Cyber Threats, the Better Your Outcomes --It is that Simple | Peter Clay | The faster you resolve cyber threats, the better your outcomes. It is that simple. Speed ... | |
Improving Third-Party Security at European Financial Institutions | Veracode | According to research by IDG, UK enterprises tend to leverage more third-party applications that US ... | |
Community Structure and Context of International Hacker Community | Battelle Memorial Institute | Battelle has examined the community structure and context of international hackivists via enriching traditional cyber ... | |
Best Practices for Privileged Access | Hitachi Id Systems | In an organization with thousands of IT assets, it can be difficult to securely manage ... | |
Cross Channel, Cross Enterprise Fraud and the Need for Collaboration | Pindrop Security | Account takeover fraud is increasing as organized fraudsters use a combination of phone and online ... | |
Akamai Cloud Security Solutions: Protecting Banks Worldwide | Akamai Technologies | In this Showcase, Akamai will demonstrate an attack against two banking web sites – one ... | |
Innovative Authentication Techniques for Beating RATs and Men-in-the-Middle | Authentify | Remote Access Trojans (RATs), man-in-the-middle (MITM) exploits, and purloined credentials are still persistent threats that ... | |
The Ever Changing Global Threat Landscape | Tim Hind | During his talk, Mr. Hind will outline the contours of the current global threat environment, ... | |
Cyber Attack Against the Payment Processes EU and US | Chalres Bretz , John Salomon , Ralph Smith | A review of the 2014 CAPP, (Cyber Attack Against the Payment Processes) exercise will start ... | |
The Role of Big Data in Cyber Fraud Detection | Eric Thompson | Mobile and online services sit at a nexus characterized by pressure to grow business across ... | |
Security Architecture at the Speed of Business | Morgan Stanley , Charles Clarke | Keeping systems secure across thousands of software developers and hundreds of projects all running at ... |