Securing Financial Services

SECURING FINANCIAL SERVICES
5th July 2022 • Park Plaza Victoria, London, UK

Solving the behaviour problem

How can we blend technology with behavioural science to build better security?

 

Psychology plus technology equals real security

Most approaches to cybersecurity focus on threats, not risk and they assume that the application of stacked technical solutions to a series of threat classes will deliver sufficient security to justify the resources devoted to that effort.

Unfortunately, the humans who develop cyber-threats continue to outrun the defenders and one reason for that is that the humans operating the increasingly digital tools businesses need to survive, whether employees or clients or third parties, can be easily tricked into undermining those technology-driven security solutions. The simplest attack vectors, such as email phishing, are still the most successful.
 

It is clear that the application of behavioural science to both sides of this equation is fundamental to improving cybersecurity. 
 

So, analytics focused on user behaviour can mitigate the impact of attackers’ social engineering and cognitive hacking methods; they can identify unusual patterns of user behaviour that indicate an attack at network, asset and user levels.
 

In addition, behavioural analysis can be applied more directly to employees to identify current research on psychological traits and individual differences among computer system users that explain vulnerabilities to cyber security attacks and crimes. Computer system users possess different cognitive capabilities which determine their ability to counter information security threats and this opens the way to possible psychological methods to help computer system users comply with security policies and thus increase network and information security.
 

At a more basic level, companies need to listen to employees when they say security protocols are hard to understand; they need to listen when they are told that security is imposing unacceptable frictions on critical workflows; they need to understand that the distractions and difficulties of hybrid working are real and enduring; and they need real education and training programmes not just a once a year video course.
 

So how can vendors and CISOs work together to build a better model for cybersecurity and empower employees to make better decisions? This is one of the key areas of discussion at Securing Financial Services.
 

Securing Financial Services will look at how we all need a new kind of security. Join our real-life case studies and in-depth technical sessions from the
security and privacy teams at some of the world’s most admired brands.

  • Behavioural analytics

    • If single point solutions are not the answer, then how about a holistic approach?
    • Instead of treating every threat type and actor or network anomaly as a separate variable or alert, step back and look at the whole landscape and apply behavioural analytics.
    • Is this a viable methodology?
  • Building-in security: from DevOps to SecDevOps?

    • As companies ramp up digital business models it is crucial that they build security in from the start.
    • But that is a big ask. And even before the crisis, security teams found it hard to gain leverage over the business.
    • How can cybersecurity teams help? Is this a CIO vs CISO battle?
  • Creating friction-free security tools

    • Putting security in the way of business-critical workflows, and cutting employees off from the applications and data they need to do their jobs, is a sure-fire way to introduce security problems – as well as damage the business.
    • But by definition surely security gets in the way?
    • Is AI or zero trust or something else the answer?
  • Building better Cloud security

    • Migrating to the cloud is a priority. But, if not properly managed, cloud migrations result in extra complexity and risk.
    • So how can firms efficiently assess cloud readiness, plan and execute migrations and establish comprehensive cloud governance?
    • Can you help companies transition smoothly and securely to the Cloud?
  • How end-user intelligence can improve cybersecurity

    • One of the big issues in cybersecurity is the confusion between threats and risks and the consequent problem of investing in security against the most relevant risks to the business.
    • As a key attack vector, employees are at the frontline of both risk and the business.
    • So how can we use their intel better?
  • Is zero trust really the answer?

    • Zero Trust / ZTNA / SASE – they promise solutions to key problems faced by CISOs today. But how realistic are they?
    • Do they take into account existing legacy technology and the ways in which real companies actually do business day-to-day?
    • Can you explain how a real-world implementation works?

Who Attends

Job titles

Head of Global IT Security
Managing Director Fraud Risk
CISO
Security Governance, Risk and Compliance Manager
Data Loss Prevention - EMEA Operations Lead
Group Head of ICT Risk (Tech. & Cyber) Controls
Strategic Cyber Threat Intelligence Lead
Head of Financial Crime, Info Sec & BCP
Head of Security Architecture
Head of Compliance & Financial Crime
Third Party Risk Consultant
IT Systems Continuity and Integration Manager
Head of Integration, Planning & Development, Compliance Assurance
Information Security Manager
Business Information Security Officer & Third Party Officer
Head of Information Security
CISO
Cyber Security Manager
Head of IT Governance, Risk and Compliance
Senior Information Security Consultant
Group Head of IT Infrastructure and Cybersecurity Audit
Chief Information Security Officer
Compliance Manager & MLRO - UK
Head of Information Security & Audit
Senior Information Reporting Officer
Manager - IT
Senior Server Engineer
Cloud Security Architect
IT Risk Manager
Cyber Security Manager
Senior Technology Risk Manager
Group Head of Risk Domains (Cyber & Tech) and Control Plans
Head of Operational & Technology Risk / CISO
Global Head of IT, Internal Audit
Head of Threat
Head of Security and IT Policy
Lead Information and Cyber Security Specialist (Assurance)
Information Security Programme Manager
Global Infrastructure Security Engineering Manager
VP, Cyber Investigations and Insider Threat Manager
Senior Information Security Consultant
Information Security and Resilience, Operational Risk Oversight Manager
Head of Risk
Global Head - Security Operations
Head of Payment Security
Senior Vice President, Head of Information Security
Cyber Security Manager
Information Security Manager
VP Investigation
PCI Coordinator
Threat Intelligence Manager
Senior Special Agent - Global Security
Vice President - Strategy, Cyber & Intelligence
Head of Investigations and Monitoring
Technology Compliance and Operational Risk Director
Principal Cyber Risk Engineer & Technology Industry Practitioner
Head of Information Security Advisory & Operations
Group Security Operations Manager
Head of Technology
Global CISO
Information Security Officer
Global CISO
Security Operations (SOC) Manager
IT Risk Manager
CISO
Divisional CISO UK, CGC IT, CFO Tech & Platforms IT
Vice President; Information Security Officer
Security Business Partner
Assistant Director of Risk
Group IT Manager
Leader of Network Security EMEA
Security Architect
Senior IT & Cybersecurity Risk Manager
EMEA Operational Security Manager & Business Line Security Officer
CISO
Senior Security Consultant
Technology Risk Management Director - GRC and Quantitative Risk Analysis
Financial Crime and Data Protection Consultant
UKI Cyber Operations Lead
Head of IT and Change
Future Fraud Strategy
Chief Risk Officer
Group Head of Cyber Risk Intelligence
Manager Information Security & Resilience | Operational Risk Oversight
Head of Group-wide Security Optimisation
Director of Cyber Security UK
Technology and Resilience Risk Manager
Leader Payment Systems
Head of IT Risk and Cyber Security
Chief Risk Officer
Acting Chief Information Security Officer, Europe
GRC Manager
Senior Advisor, Information Technology
Manager – Strategy & Intelligence; Investigations, Insider Risk and Data Loss Protection
Chief Information Security Officer
Chief Security Officer EMEA region
Risk Governance Manager (Technology and Cyber)
Head of Information Security
Head of Financial Crime & Compliance Management
Manager of Security Operations, Engineering & Administration
Information Security Strategy and Architecture
Principal Investigations Manager; Physical Security & Investigations
Head of IT Strategy, Governance and Reporting
Senior Specialist Digital Fraud Strategy
Global Head of Information Security
Information Security Officer
Vice President IT Risk - Security Architecture Risk Assessment
Director of IT Governance & Risk Manager

Organisations

Rothschild & Co
Citigroup
Sumitomo Mitsui Banking Corporation
Aldermore Bank PLC
BNY Mellon
BNP Paribas
Refinitiv
Together Money
Travelex Holdings
Gravity Bank
Vanquis Bank
AmTrust International
HSBC
e-finance
Citigroup
Unum
Koine
AerCap
Brewin Dolphin
Phoenix Group
HSBC
LV= Liverpool Victoria
EMQ Inc.
Paragon Customer Communications
PRIMIS Mortgage Network
Activ Trades
SCS Europe
Aviva
Newcastle Building Society
Lloyds Banking Group
Credit Suisse
BNP Paribas
BlueBay Asset Management plc
Travelex Holdings
Quilter plc
Aldermore Bank PLC
Metro Bank
Schroders
London Stock Exchange
Barclays
Fidelity International
TSB Bank
XPS Pensions Group
QBE Insurance
Barclaycard
Redington Limited
Tesco Bank
Yorkshire Building Society
Barclays
Anderson Zaks
Royal Bank of Scotland
American Express
MasterCard
Bank of England
Bank of America Merrill Lynch
Chubb
Quilter plc
Quilter plc
DNA Payments Ltd
First Sentier Investors
GAM Investments
Uphold Inc.
Brewin Dolphin
Brewin Dolphin
Volkswagen Financial Services AG
Credit Suisse
Bank of America
NatWest Group
NS&I (National Savings and Investments)
International Currency Exchange Plc (ICE Plc)
FIS Global
Bank of Ireland
Scotiabank
Société Générale Corporate and Investment Banking - SGCIB
B89
Co-operative Bank plc
AIG Europe
Royal London Group
Aviva
Ipswich Building Society
Santander
Credit Suisse
BNP Paribas
TSB Bank
Prudential
UBS
Close Brothers Group
HSBC
ICBC Standard Bank
thinkmoney
Great-West Lifeco Europe
NEST Corporation (National Employment Savings Trust)
Redwood Bank
Lloyds Banking Group
Man Group Plc
Mapfre Abraxas
BNP Paribas
Jaja Finance
NEST Corporation (National Employment Savings Trust)
Great-West Lifeco Europe
AIB
Barclays
MUFG - Mitsubishi UFJ Financial Group
NewDay
VISTRA
Zenith Bank (UK) Ltd.
MSCI Inc
Commerzbank

Company headcount

1000-1999
10,000+
5000-9999
500-999
10,000+
10,000+
10,000+
500-999
5000-9999
500-999
1000-1999
2000-2999
10,000+
2000-2999
10,000+
10,000+
1-99
100-499
2000-2999
5000-9999
10,000+
5000-9999
100-499
1000-1999
500-999
100-499
1-99
10,000+
1000-1999
10,000+
10,000+
10,000+
100-499
5000-9999
3000-4999
500-999
3000-4999
3000-4999
3000-4999
10,000+
5000-9999
5000-9999
1000-1999
10,000+
10,000+
100-499
3000-4999
3000-4999
10,000+
1-99
10,000+
10,000+
10,000+
2000-2999
10,000+
10,000+
3000-4999
3000-4999
1-99
100-499
500-999
100-499
2000-2999
2000-2999
10,000+
10,000+
10,000+
10,000+
100-499
3000-4999
10,000+
10,000+
10,000+
10,000+
1-99
3000-4999
2000-2999
2000-2999
10,000+
100-499
10,000+
10,000+
10,000+
5000-9999
3000-4999
10,000+
2000-2999
10,000+
1000-1999
1-99
10,000+
100-499
1-99
10,000+
1000-1999
100-499
10,000+
1-99
100-499
10,000+
10,000+
10,000+
10,000+
1000-1999
3000-4999
100-499
3000-4999
10,000+


Venue

Park Plaza Victoria, London

vpp

Location:
Park Plaza Victoria
239 Vauxhall Bridge Road, London, UK, SW1V 1EQ
Telephone: 0844 415 6752
 

Directions:
Please click here