Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
Learn about the new Directive on Payment Services (PSD2), and the impact it has on European banks and financial service providers. This new regulation is expected to change the way we interact and consume digital banking.
Are you going to check the box? Or are you going to leverage the directive to grow your...
In the last year, we've seen a significant increase in cyber activity, from propaganda through "information warfare" to mass-scale cybercrime. Increasing political tensions complicate an already complex international response. Differing approaches to cyber and privacy risk in Europe and the United States have caused...
Status check: With just several months to go until any organization that handles Europeans' personal data must comply with the EU's General Data Protection Regulation, or GPDR, how prepared are organizations? While the May 25, 2018, enforcement date is fast approaching, EU privacy watchdogs are continuing to issue...
Detective Chief Inspector Jason Tunn with the Metropolitan Police Service in London, who is the department's lead anti-fraud and cybercrime investigator, walks us through a high-profile case involving the arrest, and recent conviction leading to jail time, of two cybercriminals with connections to a Russian crime...
As payments instruments evolve and change, so, too, will the way we secure payments. While cards aren't likely to ever completely disappear, they are expected to be overtaken by emerging payments instruments, such as mobile devices and wearables. Contactless payments are fueling a lot of this change, and open new...
With new technologies appearing almost daily, attackers have a constant stream of potential new tools, tactics and practices to evaluate as offensive weapons. This constantly expanding attack surface forces defenders to assess new technologies, all while protecting themselves amid an ever-escalating arms race. The...
Consumer-serving industries are under continual attack, as cybercriminals find that the interface between the customer and the retail outlet is where the money is. The assault is occurring on all fronts, be it through the physical point-of-sale or ecommerce gateway, the enterprise and its supply chain, or the customer...
The landscape of corporate and retail payments across channels such as mobile and online, and across emerging products such as Apple Pay, provide customer convenience and satisfaction. But these new channels and technologies also create opportunities for fraudsters. This session offers lessons learned for creating a...
Cyber-extortion has reached new proportions, with a wide variety of methods, such as distributed-denial-of-service attacks and ransomware variants being used to extort individuals and organizations. Recently uncovered ransomware-DDoS hybrid attacks, like Cerber, showcased how attackers have added DDoS capabilities to...
This session will review a cyber-attack and subsequent data breach from beginning to end. What happens during an attack and how does it result in fraud? This session will dissect an attack, looking at real-world incidents, such as the attack waged against Bangladesh Bank that resulted in the theft of $81 million, and...
This session will review ransomware, exploring why it continues, how to battle it and what the future portends. Using real-world examples, Ralph Smith of the Financial Services Information Sharing and Analysis Center will walk through some recent ransomware campaigns that have been waged against FS-ISAC members, and...
Insider threats are fast becoming one of the greatest concerns to organizations. Whether it be a malicious insider wanting to cause harm, or unintentional insider making an error or being unknowingly coerced by an outsider, mitigating insider threats must be a priority for organizations of all shape and size.
This...
Data breaches feed the market for fraudsters to steal identities, which challenges traditional approaches to identifying the genuine from the fraudster. We hear that knowledge-based authentication is dead. But trust in any single defense is flawed. No single route to "trust" should be applied. We should never lose...
Business email compromise (BEC) attacks that impersonate executives and business partners to trick employees comprise the biggest cyberthreat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.