Home » Agenda

Agenda

Printed agenda and registration

8:30 a.m.             
Registration, Continental Breakfast and Exhibitors
Sponsored by CyberAssurance

9:00 a.m.             
Welcome

9:05 a.m.             
Real World Use Cases for AI
Joshua Jacobs, Sawyers & Jacobs
Learn more about how you can leverage this new superpower. This session will show you how other financial institutions are using AI to improve operational efficiency, customer experience, and ultimately profitability.

10:15 a.m.           
Break with Exhibitors

10:45 a.m.           
Managing AI Risk in Community Banking
Paige Hembree, UFS
The future is now with the use of Artificial Intelligence (AI). In this presentation, UFS risk and compliance experts will explore the importance of taking a risk-based approach when considering any AI tool, feature or third-party component.  Key areas to consider include: data privacy and security, bias and fairness and operational risks. To be successful FIs must enhance their governance framework, conduct regulatory audits and assessments and consider how these tools affect existing procedures and processes.

11:45 a.m.          
Lunch 
Sponsored by SHAZAM              

12:45 pm            
Examiner Expectations for Cyber Risk Management
Randy Linberg, Rivial Data Security
Effective Cyber Risk Management is a challenge for banks of all sizes, because of the lack of specific guidance on how to manage these risks successfully. In this session, we’ll cover the core elements of an information security risk management program and look at advanced ways to improve risk measurement. Additionally, we will discuss examiner expectations and introduce a maturity matrix designed to help banks evolve toward more sophisticated risk management practices. The ultimate goal is to build a more efficient and effective cybersecurity program. Essential elements of cyber risk management; FDIC expectations for cyber risk; Defining a risk appetite; importance of quantifying risk; techniques for measuring and treating risk; actionable steps to enhance your risk management.

1:45 p.m.            
Refreshment Break & Exhibitor Time

2:15 p.m.            
Hot Topics in Bank Technology
Moderated by Randy Linberg, Rivial Data Security and John Moeller, CyberAssurance
This session is a great opportunity to talk with your peers about how they are addressing their bank’s tech needs. Get some ideas and share your own regarding best practices, budgeting, planning and more in this moderated forum.

3:15 p.m.            
Break

3:30 p.m.            
Banking Beyond 2026: Will Your IT Survive the Next Decade’s Tech Tsunami?
John Moeller, CyberAssurance
The future is rushing toward us—think blockchain wallets, quantum networks, and hyper-connected consumers. This presentation peers into 2026 and beyond, revealing the IT and cybersecurity trends that will redefine banking. We will unpack what is coming, how to adapt, and why starting now is non-negotiable. Perfect for forward-thinkers ready to turn uncertainty into opportunity.

4:30 p.m.            
Reception & Exhibit Time
Sponsored by Amplix

7:30 a.m.             
Full Breakfast

8:30 a.m.             
Be Prepared for What’s Now and Next with Cybercrime
James Carroll, Hacket Cyber
James Carroll, Co-Founder and Ethical Hacker at Hacket Cyber gives us a look under the hood of how it’s done by the pros. Carroll has been professionally hacking networks for more than a decade, protecting the data of clients ranging from NFL teams to advisory firms. Carroll will outline the most common ways attackers are breaching networks and cover critical components that advisory firms must know to protect their networks from attackers. This session will help you understand how modern hacks are occurring, learn how attackers pick and choose their targets, and understand how to protect your bank and your customers from hackers.

9:40 a.m.             
10 most common IT audit findings
Cody Delzer, SBS CyberSecurity
This session reveals the 10 most common IT audit findings from the past year and provides actionable insights to help strengthen your ISP. Learn how to address these findings proactively and position your organization for success in your next IT audit. You’ll leave ready to enhance your cybersecurity resilience.

10:40 a.m.           
Break

10:50 a.m.           
Think Like a Cybercriminal
Etay Maor, Cato Networks
We read about hacks and breaches daily, but what do we know about these cybercrime groups and how they conduct these attacks? In this session, we will keep diving into basic hacking techniques, demonstrate what types of tools hackers are using today, examine the scope of these attacks, and discuss best practices on how to protect ourselves and our businesses. Demonstrations will include a look into the Dark Web, hacking buildings, social engineering tactics and more. We cannot also ignore the recent advancements in AI and so will live demo of how AI tools can be used by both threat actors and defenders. It is only once you understand how the attacker operates that you can defend against these attacks.

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 100 other subscribers