Skip to main content

2024 Cybersecurity Conference Agenda

2024 Cybersecurity Conference

Tuesday, February 6

8:00 a.m. – 9:30 a.m.

General Breakfast

9:30 a.m. – 10:25 a.m.

Welcome Remarks and Keynote Speaker: Latest Trends in Cybersecurity
Learn more about the intersection between cybersecurity and emerging technologies such as generative artificial intelligence and how digital advancements will shape the future cyber threat landscape and industry response.

10:25 a.m. – 10:45 a.m.

Networking Break

10:45 a.m. – 11:30 a.m.

Cyber-Enabled Fraud in the Digital Age
This session explores the most recent cyber-enabled fraud incident trends, highlights key lessons learned from the incidents and explores effective practices and controls firms can employ to bolster preventative and response measures.

11:30 a.m. – 11:50 a.m.

Networking Break

11:50 a.m. – 12:35 p.m.

Emerging Cyber Threats: Technology, Innovation and Associated Risks
Hear insights from FINRA, law enforcement and industry practitioners on the cutting-edge and emerging cyber threats, technologies and impacts on the financial sector.

12:35 p.m. – 1:45 p.m.

Networking Lunch

1:45 p.m. – 2:30 p.m.

Cyber Tabletop Exercise
Join FINRA staff for an interactive session that simulates a realistic cyber-attack scenario. With active audience participation, we will navigate the steps involved in an emergency incident response as one community combatting the threat(s).

2:30 p.m. – 2:45 p.m.


2:45 p.m. – 3:30 p.m.

Establishing and Strengthening Your Cybersecurity Posture
Join for an engaging discussion among FINRA and industry practitioners as they share practical measures firms can employ to strengthen resiliency and protect against cyber threats throughout the lifecycle of developing a cybersecurity program from inception through optimization.

3:30 p.m. – 3:45 p.m.


3:45 p.m. – 4:30 p.m.

Success Stories in Mitigating Cyber Risks
Listen to industry members, FINRA staff and law enforcement as they share real-life cyber-intrusion events and the tactics that were employed to successfully mitigate the impact of the attacks and lessons learned that firms can consider to protect their organizations.