Event Agenda
Event Agenda
Agenda
Day 1 | 24th September
08:30
|
Registration and Refreshments
|
09:00
|
Cybersecurity and Capital Markets
- The evolution of cyber threats and variation in style and intent
- Immediate and future consequences
- The intersection of cybersecurity and banking
- Ecosphere of vulnerabilities
- Cross border aspects (investigation, evidence acquisition and preservation)
- Regulatory considerations
- 5G increasing third party risk
- Conducting risk assessments
Speaker: Jelana Matatone, Senior Op Risk Officer and ISM, European Stability Mechanism
|
10:30
|
Morning Break
|
11:00
|
Approaches to Building and Managing a Cybersecurity Operating Model
- Rethinking your organizational capabilities
- Differences for smaller vs large banks
- Should you focus on prevention?
- Putting systems in place
- Hiring the right people
- Strong third-party management
|
12:00
|
Lunch
|
13:30
|
Data Management and Governance
- Ensuring security of your data
- Potential impacts of compromised data for your business; case study
- Options for outsourcing
- Improving data lineage and metadata management
- Industry wide data governance
- Encryption and regulation
- APIs and central repositories
|
15:00
|
Afternoon Break
|
15:30
|
Big Data in Cybersecurity
- What is big data? How prevalent is it in FS firms at present?
- Big data to build predictive models
- Big data for incident reports
- Threat visualization
|
17:00
|
End of Day One
|
Day 2 | 25th September
08:30
|
Refreshments
|
09:00
|
Embracing the Cloud
- Discussing the current wave of cloud computing to improve business outcomes and reduce costs
- Threats and benefits
- BoE attention to cloud technology
- Advantages of cloud for cyber and operational resilience
- Regulatory progress of cloud migration
- Using cloud to collect data
|
10:30
|
Morning Break
|
11:00
|
Analytics and Blockchain
- Capital markets experiments with DLT
- Redistribution of risk across departments
- Risks and opportunities
- Blockchain models
- Volume and latency obstacles
- Blockchain scepticism
- Compatibility with processing or long-dated instruments
|
12:30
|
Lunch
|
13:30
|
Machine Learning and AI
- Machine learning and AI for cybersecurity
- The AI framework
- Deploying algorithms
- Where has machine learning worked?
- Steps for implementing
- The human aspect
- AI as assistance for hackers
|
15:00
|
Afternoon Break
|
15:30
|
Ethical Considerations
- Existing data sharing models
- Who owns the data?
- Privacy issues surrounding datalakes
- Data jurisdiction considerations
- Do you need a 3rd party?
- Considering the customer
|
17:00
|
End of Day Two
|