placeholder

Wednesday, April 3, 2024

Breakfast with Exhibitors
8:00AM-8:30AM

8:30AM - 9:45AM

placeholder

MAIN SESSION
Creating a High-Performance Culture
Leticia Saiid, Chief of Staff & Chief Learning Officer, CoNetrix
Our workload seems to demand more, more, and more, while our resources feel like less, less, and less. Does having a high-performance culture mean we are a bunch of people carefully toeing the line of burnout? I hope not! Burnout is bad for individuals, their companies, the programs they are responsible for, and the people they serve. It can lead us to wonder... what’s in the “magic sauce” of a high-performing culture, one that experiences success without the looming risk of burnout? That’s what we will explore in this keynote session.

Functioning as a coach in a high-performing technology company, Leticia Saiid has observed, studied, and taught the values, habits, and systems that make teams thrive and the ones that take teams straight to burnout. Join this session to hear her findings across three pillars of a high-performing culture. And learn how you can play a part in inspiring and enjoying this kind of culture in any team you join.


Refreshment Break
9:45AM - 10:00AM

10:00AM - 10:45AM

placeholder

TANDEM
Incident Management
Savannah Richardson , Software Specialist, Tandem
Stephen Elwell , Software Specialist, Tandem
Your incident response plan and incident tracking system are an important part of your overall information security program. With Tandem’s Incident Management product, there are multiple options for what information you put in your incident response plan and for how you choose to track incidents. Join Tandem Software Specialists Savannah and Stephen as they walk you through the best use of the Incident Management product and answer your questions!

10:00AM - 10:45AM

placeholder

RISK & COMPLIANCE
Coming Soon

10:00AM - 10:45AM

placeholder

CYBERSECURITY
The State of Cybersecurity in the Financial Industry
Russ Horn , President, CoNetrix
Financial institutions are considered a highly regulated and mature sector, as it pertains to cybersecurity, but what does that look like in action? To find out, we surveyed more than 300 cybersecurity professionals who work for community financial institutions. In this session, we will review these survey results and compare them against three prior years of surveys, discuss key takeaways, and share tools and techniques to take your own cybersecurity program to the next level.

Takeaways:

  • Understand the value of Board of Director oversight and involvement.
  • Know what tools and frameworks are most valued by financial institutions.
  • Track key trends that can drive institutions towards or away from a stronger cybersecurity posture.
  • Recognize the types, frequency, and perceived values of testing and assurance being conducted across financial institutions.

11:00AM - 11:45AM

placeholder

TANDEM
Audit Management
Lindsey McReynolds , Support Manager, Tandem
Cory Faust , Development Lead, Tandem
Whether you are conducting the audit internally or follow-up on items that need your attention after an audit, you need an easy way to track findings, responses, and provide helpful reports. Tandem’s Audit Management product provides you with options for conducting your own audits, a simple way to follow-up on findings, and excellent reporting options to share that information. Join Cory and Lindsey, two members of the Tandem team, as they walk you through the best use of the Audit Management product and answer your questions!

11:00AM - 11:45AM

placeholder

RISK & COMPLIANCE
What to Expect When You're Expecting (An Auditor)
Robert Wells, Audit and Security Consultant, CoNetrix Security
Samantha Torrez-Hidalgo, Software Specialist, Tandem

The time has finally arrived for your organization to undergo its annual audit. How prepared are you, or do you plan to wing it, and rely on your memory from last year’s audit to get by? Rather than playing catch-up during an audit, join Rob and Samantha as they discuss best practices and share tips to help you prepare for your next auditor visit. Rob’s auditing expertise and Samantha’s Tandem knowledge will offer solutions to keep you on track and reframe annual audits as opportunities.

11:00AM - 11:45AM

placeholder

CYBERSECURITY
Quantum Computing for Humans
Joseph Ellis, Boost Consulting Manager, CoNetrix Security
Quantum Computing is on the horizon. As with many new technologies, quantum computing promises exciting opportunities for growth and advancement, as well as potential challenges and threats to our current information security models. 

Join this session to discuss:
The Basics – Core concepts of quantum computing and how it’s different from what we have today.
New Security Considerations – Some of the risks and pitfalls associated with quantum computing, and emerging        security techniques and practices to keep data safe in a post-quantum world. 
Take Action – How to prepare your organization for the impacts of quantum computing now and in the future.

Lunch
12:00PM - 1:00PM

1:00PM - 1:45PM

placeholder

TANDEM
Policies
Alexandria Fontana , Software Specialist, Tandem
Nicolas Crittenden , Software Specialist, Tandem
Crafting and overseeing your enterprise-wide policies can be a time-consuming and demanding task. The Tandem Policies product aims to simplify this process by offering suggested content, a robust version tracking system, and even the option to provide acceptable use policy training. Join Tandem Software Specialists Alexandria and Nicolas as they walk you through the best use of the Policies product and answer your questions!

1:00PM - 1:45PM

placeholder

RISK & COMPLIANCE
Third-Party Risk Management Panel
Alyssa Pugh, GRC Content Manager, Tandem
Joseph Ellis, Boost Consulting Manager, CoNetrix Security
Missy Oliver, Information Security & Compliance Consultant, CoNetrix Security
Join our vendor management specialists in a thought-provoking conversation about the intricate topic of Third-Party Risk Management (TPRM). They’ll discuss key areas such as guidance, third-party incidents, the impact of emerging technologies like Fintech and AI, and more. Our expert panelists will provide valuable insights and practical strategies to enhance your organization's Third-Party Risk Management program. Bring your thoughts and questions to join the conversation with the Tandem community.

1:00PM - 1:45PM

placeholder

CYBERSECURITY
1Phish, 2 Phish, Old Phish, New Phish
Kaua Pickett, Security Support Technician, CoNetrix Security
Whether you grew up not able to download a file until your sibling was off the phone, you bought the very first iPhone, or practiced TikTok dances with your friends after school, we are all available targets for phishing. As you prepare your work force against phishing attempts, it is important to know how threat actors are going to target your employees. We will dive into the research of how different generations are susceptible in unique ways and how to focus training with your employees in mind.

2:00PM - 2:45PM

placeholder

TANDEM
Phishing

Elizabeth Weathers , Software Specialist, Tandem
Cade Killough , Software Specialist, Tandem
Conducting phishing campaigns can be time-consuming and difficult if you’re unsure who to test or what type of test to create. With Tandem’s Phishing product, you can create and run multiple campaigns at once, ensure all your employees are tested, enroll them in follow-up training as needed, and choose from an ever-growing library of message templates and landing pages. Join Tandem Software Specialists Cade and Elizabeth as they walk you through the best use of the Phishing product and answer your questions!

2:00PM - 2:45PM

placeholder

RISK & COMPLIANCE
Coming Soon

2:00PM - 2:45PM

placeholder

CYBERSECURITY
To Cross the Bridge of Death You Must Answer These Questions Three!
Bret Mills, Audit & Security Consultant, CoNetrix Security
Yes, even the Monty Python group had to answer security questions to cross the Bridge of Death. Whether it be security questions, passwords, multi-factor authentication, and now passwordless authentication, it seems like we are destined to be thrown into the Gorge of Eternal Peril. In this session, we will look at the movement from password authentication into the realm of multi-factor and passwordless authentication. Come ready to figure out how to cross the bridge in search of the “Passwordless Grail.”

Refreshment Break
2:45PM - 3:00PM

3:00PM - 4:30PM

placeholder

MAIN SESSION
Interactive Session

TopGolf & Dinner
5:00PM - 7:00PM