Security Program Drivers and Wish Lists: SANS Financial Services Survey Results Part II
- Thursday, March 27th, 2014 at 1:00 PM (13:00:00 EDT/US Eastern)
- G. Mark Hardy, John Pescatore (moderator), John Vecchi, Marc Blackmer and Michael Crouse
You can now attend the webcast using your mobile device!
Many types of organizations (not just financial) indicated that they are in the business of processing and storing financial information and are subject to compliance with multiple regulations, according to the recently-conducted SANS Survey on Financial Service Security.
This has resulted in an inordinate amount of spending on compliance. Yet, as we share in Part I of this series, only 16% of SANS Financial Services Security Survey takers feel "very prepared" to fend off an attack against their accounts.
In this second installment of our two-part series on the SANS Financial Services Security Survey results, moderated by John Pescatore, we will uncover the drivers behind financial security programs, where those programs need improvement and what's on organizational wish lists.
To attend our other webcast for this series, Part I on March 26 at 1PM EST, which focuses on risks, threats, and preparedness, follow this link:www.sans.org/webcasts/survey-financial-services-security-practices-97645
Those who register for this webcast will also receive access to the associated whitepaper developed by SANS Analyst G. Mark Hardy with advice from John Pescatore.
Click here to view the associated whitepaper.
G. Mark Hardy
G. Mark Hardy is the lead certified instructor for The SANS Institute's flagship leadership class, Security Leadership Essentials for Managers (MGT512), and teaches several other management and technical courses. He holds the GSLC, CISSP, CISM, and CISA certifications. As founder and president of National Security Corporation, he has been providing cybersecurity expertise to government, military and commercial clients for over 30 years. An internationally recognized expert, he has spoken at over 250 events worldwide. Hardy serves on the advisory board of CyberWATCH, an Information Assurance/Information Security Advanced Technology Education Center of the National Science Foundation. A retired U.S. Navy Captain, Hardy is a graduate of Northwestern University and holds bachelor's degrees in computer science and mathematics and master's degrees in business administration and strategic studies.
John Pescatore (moderator) is the director emerging security trends for the SANS Institute. A former vice president and distinguished analyst at Gartner, Pescatore has over 30 years of experience in computer, network and information security. Prior to joining Gartner, he was senior consultant for Entrust Technologies and Trusted Information Systems and a security engineer for the U.S. Secret Service and the National Security Agency.
John Vecchi, vice president of product strategy and marking, advanced threat protection group for Solera Networks, has more than 16 years of experience in high-tech marketing, product marketing, product management and consulting. Prior to joining Solera, John was with Zscaler, Inc., where he was responsible for global market expansion initiative, and Check Point Software, where he oversaw the enterprise and SMB solution portfolios and served as a primary spokesperson and visionary, as well as other technology companies.
Marc Blackmer has spent more than fifteen years assisting some of the world's top energy producers, financial institutions, and governments worldwide defend their critical assets from cyberthreats. His technical background in information technology engineering, security operations and IT governance, risk, and compliance brings a unique perspective to addressing the threats facing critical infrastructure today.
Michael Crouse is director of insider threat strategies for Raytheon. In this role Mr. Crouse oversees the execution of existing federal and commercial cyber audits/antimalware requirements programs, while identifying new, global growth opportunities within the Department of Defense (DoD)/Intelligence Community (IC) and the private sector. He works closely with top government decision makers and lends key influence in helping them develop new network security policies, specifically with regard to audit requirements and the detection and mitigation of insider threats.