Webcast: COVID-19 and Cyber Heists – Financial System Under Attack

July 23, 2020
Webcast , Countries

Over four years since the now-infamous Bangladesh Bank cyber heist, where hackers attempted to transfer close to $1 billion from the NY FED account belonging to Bangladesh Bank before walking away with over $60 million, and cyber threats against the financial sector have only grown in volume and sophistication worldwide. With the forcedly hurried shift towards remote working due to COVID-19, hackers are enjoying a much larger attack surface against financial service institutions with alarming success rates. How can security professionals better prepare against cyber heists?

Leading technical and legal experts will lead a webcast anchored in real-world cases, covering the most successful attacks, why they worked, and immediate steps security teams must consider to keep pace with cybercriminals. Our panelists merge large enterprise, federal government and regulatory backgrounds to address issues from various perspectives, covering cyber terrorism, ransomware, access mining and more. 

Schedule: 1:00 p.m. – 2:00 p.m. (ET)

Key Takeaways

  • How cybercriminals are capitalizing on COVID-19 and pooling resources to attack financial service companies 
  • The latest TTPs of sophisticated actors to bypass response efforts and maintain persistence
  • Examples of counter-incident response efforts
  • Important legal considerations for financial service companies responding to these incidents
  • Email thread hijacking and the latest advancements in phishing attacks leading to business email compromise, ransomware, SWIFT fraud and more
  • Risks posed by third parties and ways to monitor vendors effectively
  • Why early detection remains crucial and ways to maximize detection investments

Speakers

  • Tom Kellermann, Head of Cybersecurity Strategy for VMWare Carbon Black, former Deputy CISO for the World Bank Treasury and Commissioner on the Commission on Cyber Security for Pres. Obama
  • Will Daugherty, Partner, Data Protection, Privacy and Cybersecurity Group, Norton Rose Fulbright
  • Keith Wojcieszek, Managing Director in Kroll’s Cyber Risk practice and former USSS Cyber Intelligence Section, Criminal Investigation Division Leader

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.

24x7 Incident Response

Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.

Malware and Advanced Persistent Threat Detection

Our expertise allows us to identify and analyze the scope and intent of advanced persistent threats to launch a targeted and effective response.


Optimized Third-Party Cyber Risk Management Programs

Manage risk, not spreadsheets. Identify and remediate cybersecurity risks inherent in third-party relationships, helping achieve compliance with regulations such as NYDFS, FARS, GDPR, etc.

Incident Response Plan Development

You learn today that your organization is facing some kind of cyber incident. Could be ransomware, highjacked O365 email account, PII or PHI exfiltrated, misconfigured network settings exposing data, etc. What do you do first?

Over four years since the now-infamous Bangladesh Bank cyber heist, where hackers attempted to transfer close to $1 billion from the NY FED account belonging to Bangladesh Bank before walking away with over $60 million, and cyber threats against the financial sector have only grown in volume and sophistication worldwide. With the forcedly hurried shift towards remote working due to COVID-19, hackers are enjoying a much larger attack surface against financial service institutions with alarming success rates. How can security professionals better prepare against cyber heists?

Leading technical and legal experts will lead a webcast anchored in real-world cases, covering the most successful attacks, why they worked, and immediate steps security teams must consider to keep pace with cybercriminals. Our panelists merge large enterprise, federal government and regulatory backgrounds to address issues from various perspectives, covering cyber terrorism, ransomware, access mining and more. 

Schedule: 1:00 p.m. – 2:00 p.m. (ET)

Key Takeaways

  • How cybercriminals are capitalizing on COVID-19 and pooling resources to attack financial service companies 
  • The latest TTPs of sophisticated actors to bypass response efforts and maintain persistence
  • Examples of counter-incident response efforts
  • Important legal considerations for financial service companies responding to these incidents
  • Email thread hijacking and the latest advancements in phishing attacks leading to business email compromise, ransomware, SWIFT fraud and more
  • Risks posed by third parties and ways to monitor vendors effectively
  • Why early detection remains crucial and ways to maximize detection investments

Speakers

  • Tom Kellermann, Head of Cybersecurity Strategy for VMWare Carbon Black, former Deputy CISO for the World Bank Treasury and Commissioner on the Commission on Cyber Security for Pres. Obama
  • Will Daugherty, Partner, Data Protection, Privacy and Cybersecurity Group, Norton Rose Fulbright
  • Keith Wojcieszek, Managing Director in Kroll’s Cyber Risk practice and former USSS Cyber Intelligence Section, Criminal Investigation Division Leader

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.

24x7 Incident Response

Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.

Malware and Advanced Persistent Threat Detection

Our expertise allows us to identify and analyze the scope and intent of advanced persistent threats to launch a targeted and effective response.


Optimized Third-Party Cyber Risk Management Programs

Manage risk, not spreadsheets. Identify and remediate cybersecurity risks inherent in third-party relationships, helping achieve compliance with regulations such as NYDFS, FARS, GDPR, etc.

Incident Response Plan Development

You learn today that your organization is facing some kind of cyber incident. Could be ransomware, highjacked O365 email account, PII or PHI exfiltrated, misconfigured network settings exposing data, etc. What do you do first?