placeholder

Thursday, April 4, 2024

Breakfast
8:00AM - 8:30AM

8:30AM - 9:45AM

MAIN SESSION
A Conversation with Examiners
Ruth NorrisTexas DOB
Wayne TroutNCUA
Susan RobertsNCUA
Nayan PatelOCC
The regulatory environment for financial institutions is changing in response to evolving threats and technological challenges. Join our panel of federal and state examiners to discuss cybersecurity, regulatory expectations, and a how guidance is evolving to meet the changing demands of banking with technology. The session will begin with time to brainstorm crowd questions for the examiners to answer during the session.

10:00AM - 10:45AM

placeholder

TANDEM
Risk Assessment
Jonathan Garner, Software Specialist, Tandem
Savannah Richardson, Software Specialist, Tandem
As you manage your various types of information security related risk assessments, you may be wondering what threats and controls you should be considering for these assessments. Tandem’s Risk Assessment product provides templates for creating asset-based risk assessments, which include threats, controls, and the ability to create risk management plans. Join Tandem Software Specialists Jonathan and Savannah as they walk you through the best use of the Risk Assessment product and answer your questions!

Download Resources [PDF]

10:00AM - 10:45AM

placeholder

RISK & COMPLIANCE
Sprinting to the Future with Agile Auditing
Luke Deavenport, Audit and Security Consultant, CoNetrix Security
Andrew Hettick, Information Security Officer, CoNetrix
Are you curious to know more about agile auditing? Are you needing to create an IT audit risk assessment, but are not sure where to start? Are you unsure what an IT audit risk assessment has to do with agile auditing? Are you considering implementing an agile audit framework?

If you answered yes to any of these questions, then this is the session for you! Join Luke and Andrew as they go over what agile audit is, the process of going through “audit sprints”, how to incorporate an IT audit risk assessment, and the benefits of going to an agile auditing framework.

Download Slides [PDF]

10:00AM - 10:45AM

placeholder

CYBERSECURITY
Quantum Computing for Humans
Joseph Ellis, Boost Consulting Manager, CoNetrix Security
Quantum Computing is on the horizon. As with many new technologies, quantum computing promises exciting opportunities for growth and advancement, as well as potential challenges and threats to our current information security models.

Join this session to discuss:
- The Basics – Core concepts of quantum computing and how it’s different from what we have today.
- New Security Considerations – Some of the risks and pitfalls associated with quantum computing, and emerging security techniques and practices to keep data safe in a post-quantum world.
- Take Action – How to prepare your organization for the impacts of quantum computing now and in the future.

Download Slides [PDF]

11:00AM - 11:45AM

placeholder

TANDEM
Vendor Management
Cade Killough, Software Specialist, Tandem
Stephen Elwell, Software Specialist, Tandem
Oversight of your vendor relationships means you spend a lot of time gathering documents, reviewing contracts, and determining which relationships are most important to your organization. Tandem’s Vendor Management product provides you with helpful reminders, reports, and more to make this oversight process simpler. Join Tandem Software Specialists Cade and Stephen as they walk you through the best use of the Vendor Management product and answer your questions!

Download Resources [PDF]

11:00AM - 11:45AM

placeholder

RISK & COMPLIANCE
When Business is Personal: A Chat about MDM & BYOD
Chris Brewer , Lead Network Engineer, CoNetrix Technology
Alyssa Pugh , GRC Content Manager, 
Tandem
So, you have an employee who wants to use their personal mobile device for work. (Truth be told, you probably have several.) Mobile device management (MDM) looks very different today than it did five years ago, and a big part of that is due to bring your own device (BYOD). When it comes to MDM, where do you draw the line between efficiency and security?

Join this session to discuss the world of MDM, including tips and tricks for:
- Navigating the challenges of BYOD vs. company-owned devices.
- Implementing technical and administrative MDM safeguards.
- Complying with MDM regulatory requirements.
- Approaching MDM risk management from a holistic perspective.

Download Slides [PDF]

11:00AM - 11:45AM

placeholder

CYBERSECURITY
Social Engineering and Business Email Compromise
Benjamin Taylor, Training Manager, CoNetrix Security
We all know phishing is bad, but do we truly understand the impact it can have on our business. In this session we will dive into what Business Emal Compromise (BEC) is, how your email could be compromised, the psychology behind social engineering, and ways you can minimize the impact. This is an interactive session, so come ready to participate.

Download Slides [PDF]

Lunch & Prize Drawings
12:00PM - 1:00PM