Event Agenda

Event Agenda

Agenda

 

Day 1 | 24th September

08:30

Registration and Refreshments

09:00

Cybersecurity and Capital Markets     

  • The evolution of cyber threats and variation in style and intent
  • Immediate and future consequences
  • The intersection of cybersecurity and banking
  • Ecosphere of vulnerabilities
  • Cross border aspects (investigation, evidence acquisition and preservation)
  • Regulatory considerations 
  • 5G increasing third party risk
  • Conducting risk assessments

Speaker: Jelana Matatone, Senior Op Risk Officer and ISM, European Stability Mechanism 

10:30

Morning Break

11:00

Approaches to Building and Managing a Cybersecurity Operating Model

  • Rethinking your organizational capabilities
  • Differences for smaller vs large banks
  • Should you focus on prevention?
  • Putting systems in place
  • Hiring the right people
  • Strong third-party management

12:00

Lunch

13:30

Data Management and Governance

  • Ensuring security of your data
  • Potential impacts of compromised data for your business; case study
  • Options for outsourcing
  • Improving data lineage and metadata management
  • Industry wide data governance
  • Encryption and regulation
  • APIs and central repositories

15:00

Afternoon Break

15:30

Big Data in Cybersecurity

  • What is big data? How prevalent is it in FS firms at present?
  • Big data to build predictive models
  • Big data for incident reports
  • Threat visualization

17:00

End of Day One

Day 2 | 25th September

08:30

Refreshments

09:00

Embracing the Cloud 

  • Discussing the current wave of cloud computing to improve business outcomes and reduce costs
  • Threats and benefits
  • BoE attention to cloud technology
  • Advantages of cloud for cyber and operational resilience
  • Regulatory progress of cloud migration
  • Using cloud to collect data

10:30

Morning Break

11:00

Analytics and Blockchain 

  • Capital markets experiments with DLT
  • Redistribution of risk across departments
  • Risks and opportunities
  • Blockchain models
  • Volume and latency obstacles
  • Blockchain scepticism
  • Compatibility with processing or long-dated instruments 
     

12:30

Lunch

13:30

Machine Learning and AI 

  • Machine learning and AI for cybersecurity 
  • The AI framework
  • Deploying algorithms
  • Where has machine learning worked?
  • Steps for implementing 
  • The human aspect
  • AI as assistance for hackers
     

15:00

Afternoon Break

15:30

Ethical Considerations 

  • Existing data sharing models
  • Who owns the data?
  • Privacy issues surrounding datalakes 
  • Data jurisdiction considerations 
  • Do you need a 3rd party?
  • Considering the customer 
     

17:00

End of Day Two