Skip to main content

For updates and guidance related to COVID-19 / Coronavirus, click here.

2022 Cybersecurity Conference Agenda

Tuesday, March 29

All times are listed in Eastern Time

8:30 a.m. – 4:30 p.m.                        Registration and Cybersecurity Solutions & Cloud Computing Exhibitors

8:30 a.m. – 10:00 a.m.                      Networking Breakfast

10:00 a.m. – 10:45 a.m.                  Welcome Remarks and Keynote Address      

10:45 a.m. – 11:00 a.m.                     Break

11:00 a.m. – 12:00 p.m.                  Security Considerations in the Post-COVID World

Organizations are changing how they deliver and consume technology to adapt to the workforce’s evolving needs in the post-COVID world. This includes supporting a distributed workforce, enabling BYOD, onboarding new collaboration tools, and increasing reliance on mobile and cloud technology.  This panel explores how security professionals can ensure the secure deployment and use of these technology changes.

12:00 p.m. – 1:00 p.m.                     Networking Lunch

1:00 p.m. –2:00 p.m.                      Broker-Dealer Cybersecurity Practices

With the increase of cyber events at member firms and recent high-profile data breaches, cybersecurity continues to be a frequent hot topic within the financial services industry. During this session, panelists answer your questions related to the cybersecurity issues affecting the broker-dealers. During the session, panelists share their perspectives on effective practices and helpful tips they have identified.

2:00 p.m. – 2:15 p.m.                       Break

2:15 p.m. – 3:15 p.m.                     Branch Cybersecurity Controls

Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every day to protect against cyber-crime, safeguard consumer data, and maintain the integrity and resilience of their systems in the face of countless cyber threats. During this session, panelists discuss defensive measures firms can take within branch locations. These measures include the development of cybersecurity policies and procedures specifically for branch locations, incorporating cyber and IT controls testing into the branch audit program, training employees, and ongoing monitoring of the controls at these locations.

3:15 p.m. – 3:30 p.m.                       Break

3:30 p.m. – 4:30 p.m.                     IT Supply Chain Risk Management and Closing Remarks

Most organizations depend on third parties, to at least some degree, to achieve their IT objectives. Dependencies range from simple use of off-the-shelf or open-source software, to custom developed IT systems, to data processing and IT support services, to operation of a substantially cloud-based IT program. During this session, FINRA staff and industry practitioners discuss the security risks inherent to various IT supply chain dependencies along with considerations and techniques for assessing and managing those risks across the IT supply chain lifecycle.

4:30 p.m.                                           Conference Adjourns