FSISACEUSummit 2014 Nov. 3, 2014 to Nov. 5, 2014, London,England

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
EC3’s Role in Countering Cybercrime Troels Oerting The presentation will elaborate on the efforts of EC3 in strengthening the law enforcement response ...
Actionable Security Intelligence Etay Maor The financial services sector continues to be a target of evolving distributed denial of service ...
The Growing Problem of Defending Your Brand, Your Customers and Your Business Online Lou Manousos The proliferation of Web properties and mobile apps is occurring rapidly among financial institutions and ...
CISO Panel Intelligence and Information Sharing in the EU Claus Norup , Teresa Walsh , Isabel Gonzalez , Marko Hartwig This panel of CISOs will discuss the current state and strategic vision they have for ...
Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning, and BGP Hijacks Mohit Lad The network is a key component in application delivery and is often a direct or ...
Adventures in Threat Intelligence James Chappell The security technology community has been evolving threat intelligence capabilities in an attempt to understand ...
Introduction to the FS-ISAC’s Federated Cyber Intelligence Repository Aharon Chernin The presentation will begin by describing the need for cyber intelligence standardization. Once the audience ...
Using Cyber Defences to Counter Cyber-Enabled Crime David Bailey The world of crime is changing, morphing and evolving into something far more dangerous than ...
Aggressive Defence Against Account Takeover Malware Don Jackson With a thriving market for criminal-to-criminal (C2C) services and a flourishing underground ecosystem of tools ...
(Part 1) Information Sharing in Europe and in the Netherlands Michael Samson N/A
(Part 2) Responsible Disclosure in the EU Eelco Stofbergen , Jan Joris Vereijken N/A
Moar Malware, Less Malware Marshall Heilman This highly technical talk will explore the in-depth functionality of malware leveraged by attackers over ...
Need for Speed: The Faster You Resolve Cyber Threats, the Better Your Outcomes --It is that Simple Peter Clay The faster you resolve cyber threats, the better your outcomes. It is that simple. Speed ...
Improving Third-Party Security at European Financial Institutions Veracode According to research by IDG, UK enterprises tend to leverage more third-party applications that US ...
Community Structure and Context of International Hacker Community Battelle Memorial Institute Battelle has examined the community structure and context of international hackivists via enriching traditional cyber ...
Best Practices for Privileged Access Hitachi Id Systems In an organization with thousands of IT assets, it can be difficult to securely manage ...
Cross Channel, Cross Enterprise Fraud and the Need for Collaboration Pindrop Security Account takeover fraud is increasing as organized fraudsters use a combination of phone and online ...
Akamai Cloud Security Solutions: Protecting Banks Worldwide Akamai Technologies In this Showcase, Akamai will demonstrate an attack against two banking web sites – one ...
Innovative Authentication Techniques for Beating RATs and Men-in-the-Middle Authentify Remote Access Trojans (RATs), man-in-the-middle (MITM) exploits, and purloined credentials are still persistent threats that ...
The Ever Changing Global Threat Landscape Tim Hind During his talk, Mr. Hind will outline the contours of the current global threat environment, ...
Cyber Attack Against the Payment Processes EU and US Chalres Bretz , John Salomon , Ralph Smith A review of the 2014 CAPP, (Cyber Attack Against the Payment Processes) exercise will start ...
The Role of Big Data in Cyber Fraud Detection Eric Thompson Mobile and online services sit at a nexus characterized by pressure to grow business across ...
Security Architecture at the Speed of Business Morgan Stanley , Charles Clarke Keeping systems secure across thousands of software developers and hundreds of projects all running at ...