BEGIN:VCALENDAR VERSION:2.0 PRODID:-//jEvents 2.0 for Joomla//EN CALSCALE:GREGORIAN METHOD:PUBLISH BEGIN:VTIMEZONE TZID:America/Chicago X-LIC-LOCATION:America/Chicago BEGIN:DAYLIGHT TZOFFSETFROM:-0600 TZOFFSETTO:-0500 TZNAME:CDT DTSTART:19700308T020000 RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:-0500 TZOFFSETTO:-0600 TZNAME:CST DTSTART:19701101T020000 RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU END:STANDARD END:VTIMEZONE BEGIN:VEVENT UID:b579f740d8ec1904d29b3f2ea9054586170 CATEGORIES:SDBA Events SUMMARY:SDBA 2019 Bank Technology Conference LOCATION:Hilton Garden Inn Sioux Falls South\, 5300 S Grand Cir\, Sioux Falls, SD 57 108\, US DESCRIPTION:
T he role of an IT professional is ever-changing, especially in today’s envir onment. The SDBA Bank Technology Conference is designed to provide support as you keep on top of technology trends and scams, navigate the business of banking, and build and sustain your bank’s technology strategy. This confe rence will provide you with an opportunity to learn from industry experts, network with other IT colleagues, and visit with exhibitors to see and expe rience the latest in products and services.
Fee includes the program, electronic handouts, breaks and meals.
Member: $400 per person (includes members
of out-of state banking organizations)
Non-Member: $550 per person
After Sept. 4: add $30 per person
for members; $50 per person for non-members
On Site:
add $40 per person for members; $60 per person for non-members
Hilton Garden Inn Sioux Falls South, 5300 South Grand Circle, Siou
x Falls
Phone: 605.444.4500
Ask for a r
oom from the SDBA block to receive the special rate of $129 per room. The b
lock will be released Aug. 20.
5:30–7:00 p.m. Netwo
rking Reception
If you are in Sioux Falls the night before th
e conference, stop by the Hilton Garden Inn lounge to connect with other at
tendees.
7:30–8:00 a.m.Regi stration & Continental Breakfast
AttireCasual wear is recommended for all sessions. Meeting room temperatures and personal comfort zones vary. It is recommended you bring a sweater or jacket to sessions. |
8:00 a.m. strong> Welcome
Steve Stasiukonis, President, Secure Network Technologies, Syracuse
, N.Y.
Steve Stasiukonis will explain the numerous ways a network ca n be compromised and how social engineering techniques and white-collar cri minals leverage the use of common people, processes and technologies to inf iltrate the internal workings of banks. He will share real world experience s on how his company used these techniques to breach the networks of numero us financial institutions and explain how social engineering is used to def eat digital and physical controls. Stasiukonis serves as president of Secur e Network Technologies, focusing on penetration testing, information securi ty risk assessments, incident response and digital investigations. He speci alizes in the use of technology to identify information security vulnerabil ities, assessing risk and the collection and interpretation of digital netw ork intelligence.
8:45–9:30 a.m
. How to Get Great Results on Your Next IT Audit
9:30–10:00 a.m. Break with Exhibitors
10:00–10:45 a.m. Why C
ybersecurity Matters and How FS-ISAC Helps Community Financial Institutions
Jeffrey Korte, Director, Community Institut
ion & Association Council, FS-ISAC, Vancouver, Wa.
Keeping up wit h the latest exploits and cyber threats can be a challenge for even the lar gest financial institution. Learn why cybersecurity matters more than ever; the current methods used by cybercriminals to attack institutions; how com munity institutions across the U.S. leverage and benefit from sharing infor mation; and examine a case study that shows the return-on-investment by par ticipating with the Financial Services Information Sharing Analysis and Cen ter (FS-ISAC). Jeffrey Korte is a writer, security evangelist, leader and p ractitioner possessing more than 29 years of experience in the financial se rvices sector developing loss prevention and security programs with an emph asis on data and monetary loss. He has certifications in fraud and forgery investigations and enhanced interrogation techniques.
10:45–11:30 a.m. Weathering the Storm of Clou
d Security
Steve Stasiukonis, President, Sec
ure Network Technologies, Syracuse, N.Y.
Companies are realizing the benefits of cloud computing but are equally deterred by the security threat s. It’s hard to wrap your head around something that exists somewhere betwe en amorphous resources sent through the Internet and a physical server. It’ s a dynamic environment where things are always changing—like security thre ats. The thing is that, for the most part, cloud security is IT security. U sing a cloud maintained by someone else doesn’t mean you can—or should—sit back and relax. Insufficient due diligence, complacency and lack of attenti on is a major cause of security failures. Cloud security is everyone’s resp onsibility. This program explains the concerns of cloud security and what y ou should be doing to protect your data.
11:30–11:45 a.m. Break with Exhibitors
Cody Delzer, CISA, VP Information
Security Consultant, SBS CyberSecurity, Madison, S.D.
Criminals loo king to buy or sell their illegal items have long depended on the black mar ket to conduct their trades. With the evolution of technology, they have br ought these markets to the Internet. We will explore the different aspects of the Internet, including the Surface Web, Deep Web and Dark Web. Understa nding how the Internet is leveraged for crime gives us a better understandi ng of how to protect our institutions. It also tells us the value of protec ting our data, as criminals find ways to monetize stolen credit card, Socia l Security or financial data. We will also explore the types of cybercrime affecting financial intuitions and how to counter these risks. Cody Delzer has a degree in computer and network security and nine years of experience in IT and IT security, two years in systems operations and seven years in i nformation assurance.
12:30–1:3 0 p.m. Lunch with Exhibitors
1:30–2:15 p.m. Roundtable Discussion
Thi
s session will allow conference attendees to discuss hot button bank techno
logy issues and share best practices, ideas, what works and what doesn’t. Y
ou won’t want to miss this opportunity to learn from your colleagues.
2:15–3:00 p.m. Building a Rig
ht-Sized Cyber Governance Program
David Carter, Manager, Secu
rity, Privacy and Risk, RSM, Houston, Texas
Financial institutions fac
e a variety of cybersecurity regulatory requirements and must balance compl
iance with these requirements with actually addressing security risks. This
session will discuss industry trends in financial cybersecurity regulation
s and guidance, common challenges in security compliance and risk managemen
t. Then, we will cover how organizations can build and implement a right-si
zed cybersecurity governance program that addresses compliance requirements
while appropriately managing cybersecurity risk. David Carter has more tha
n 10 years of experience working in security governance, compliance and ris
k management. He has helped companies evaluating their cybersecurity maturi
ty and risk posture as well as building security control frameworks, govern
ance programs and security implementation strategies.
3:00–3:15 p.m. Break with Exhibitors
3:15–4:00 p.m. Skimming
/Card Cloning
Michael Burke, Robbery & Crisis Management
Consultant, SHAZAM, Des Moines, Iowa
This training will prepare attend
ees to identify internal and external skimmers at the ATM, POS and fuel dis
pensers along with cameras that capture PINs. Real-life photos show you exa
ctly what to look for while videos highlight how thieves set up these devic
es and steal from financial institutions, accountholders and merchants. A l
ive demonstration will emphasize just how quick and easy it is to clone a c
ard and make an immediate transaction. From teaching criminal justice class
es, investigating bank robberies and embezzlement as a sergeant detective,
and serving as the founding director of the Iowa Central Homeland Security
Training Center, Mike Burke is an invaluable resource for organizations loo
king to improve their understanding and training in robbery and crisis mana
gement
4:00 p.m. Wrap Up & Adjourn
If you are interested in becoming a partner to our Technolog y Conference, please complete this form and let us know how you would like to participate whether you would like to exhibit, spons or or both!
Tabletop displ ay is $400 for members or $550 for non-members, which includes one full con ference registration*, a 6’ display table, tablecloth and two chairs. No ba ckdrop or siderails.
EXHIBIT HOURS
Must be pre sent or near your booth at the following times:
Wednesday, September 11, 2019
7:00-7:30 a.m. Exhibitor Setup
7:30 – 8:00 a.m. Breakfast
9:30—10:00 a.m. Break
11:30-11:45 a.m. Break
12:30-1:30 p.m. Lu
nch
3:00—3:15 p.m. Break