<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=6226337&amp;fmt=gif">
  • Overview
  • Call For Presentations
  • Program
  • Sponsors

Developed for members, by members, our 2024 FinCyber Today UK convenes our UK and European community members for a day of interactive workshops, demonstrations, discussions, and expert panels with some networking thrown in. The goal for the event is for every attendee to leave with key takeaways that they can immediately apply to protecting their firms and customers.

Learn from your fellow practitioners through sessions dedicated to specific issues, such as third party risk management, AI, and resilience, as well as industry verticals such as insurance and securities.

Meet our Global Intelligence and Member Services teams who can help you maximise the value of FS-ISAC's offerings to gain a critical edge over threat actors.

Attendance is open and free for FS-ISAC members.

We will be hosting an in-person, insider threat tabletop exercise on Monday, 23 September. This exercise is hosted in conjunction with 2024 FinCyber Today UK but registration is separate. Find out more about the exercise here.

 

Call for Presentations

2024 FinCyber Today UK

The theme for 2024 FinCyber Today UK is Community. Engagement. Resilience. 
The call for presentations is now closed. 

FinCyber Today UK is a one-day event with content developed to bring learning and networking together in problem-solving, solution-building sessions with a high focus on innovation.

The theme of the day is Community. Engagement. Resilience. It defines what members will take home with them. This is a dedicated day for our greater United Kingdom community, which is our second largest in the world. The day brings together an estimated 250-300 cyber and security executives, spending the day sharing, learning, and bringing our mutual challenges to the table for sector-level resilience.

Consider including stories and best practices from the work you do to protect the sector today and build long-term resilience. Our industry is interested in all aspects of cybersecurity that will make their businesses safe and more resilient: recent discussions have included AI, supplier risk, and fraud.

View CFP overview here.

There are no third-party sponsors for this event. FS-ISAC completely runs the CAPS exercises.

  1. September 23 Monday
  2. 1:00 - 5:00 PM

    FS-ISAC Insider Threat Tabletop Exercise | Sponsored by Immersive Labs

    Event Toggle Arrow

    Join us on Monday, 23 September for an in-person, insider threat tabletop exercise. This exercise is hosted in conjunction with 2024 FinCyber Today UK but registration is separate. Register here.

  3. 4:00 - 5:30 PM

    Member Registration

  4. 5:00 - 6:00 PM

    Welcome Reception | Sponsored by ThreatConnect

  5. September 24 Tuesday
  6. 8:00 - 4:30 PM

    Registration

  7. 8:00 - 9:00 AM

    Breakfast

  8. 9:00 - 11:00 AM

    End-to-End Cyber Threat Intelligence Analysis Workflow | Sponsored by Cyware
    Avkash Kathiriya, Cyware

    Event Toggle Arrow
    This session will guide attendees in setting up a honeypot swarm connected to Elastic SIEM for intelligence ingestion. We'll also connect a source machine forwarding logs to the same SIEM instance. Cyware will simulate attacks on both source and honeypot machines to generate intelligence, which will be detected by a rule on the source machine. Participants will log into an EC2 machine to analyze a malicious file and generate a threat report. This end-to-end process demonstrates the intel lifecycle from creation to ingestion, analysis, and report generation. Understanding the Complete Intelligence Lifecycle: Creation, Ingestion, Analysis, and Report Generation
  9. 9:00 - 11:00 AM

    Zero Trust and Cyber Resilience in the Era of AI | Sponsored by Illumio
    Trevor Dearing & Raghu Nandakumara, Illumio

    Event Toggle Arrow

    As we transform our business models to deliver more agile services, the increasing threat of ransomware can potentially disrupt those services, causing an impact on society. Shifting to Zero Trust thinking will be more effective and cost-saving than traditional security approaches. By examining real-world incidents, will learn how the integration of Zero Trust into your business continuity and disaster recovery plan is an effective way to mitigate damage. Addressing topics such as identifying and defining risks, reducing attack surfaces; containing a ransomware attack, and responding to and restoring services during an attack.  The workshop will focus on cyber and operational resilience by engaging participants in breakout groups and an interactive style game designed to simulate key business continuity and resilience decision making.

  10. 9:00 - 11:00 AM

    Breaking Silos Between the SOC and Executives in Cyber Crises | Sponsored by Cyberbit
    Allison Ritter & Erno Doorenspleet, Cyberbit

    Event Toggle Arrow
    One in four organizations face cyber attacks, but a well-practiced response can save an average of $1.49 million and mitigate reputational damage. In this interactive workshop, Allison Ritter from Cyberbit, a cybersecurity expert and former head of IBM's global cyber detection and response unit, will enable SOC and C-suite teams to hone collaborative response strategies. Through core principles, educational breakouts, and real-world challenges, participants will sharpen their situational awareness, strategic planning, risk assessment, communication, decision-making, and crisis leadership. Attendees will leave equipped to measure their cyber readiness, identify gaps, and ensure compliance with regulations like DORA and GDPR.
  11. 11:00 - 11:30 AM

    Coffee Break

  12. 11:30 - 12:15 PM

    Man-in-the-Middle Phishing Attacks: Mechanics Fueling the Surge
    Frank Teruel, Arkose Labs

    Event Toggle Arrow
    The session will provide new information, like AI's impact, on Man-in-the-Middle phishing, aiming at banks.The topic is relevant because reverse proxy attacks are surging; they're lucrative & hard for banks to detect. Unlike non-proxying phishing sites, MITM attacks bypass 2FA or OTP steps at login flow. Attackers steal logged-in sessions (not just credentials) via session cookies, allowing them to bypass other protections. The attacks enable a one-size-fits-all phishing solution, requiring less site-specific knowledge & adaptation from the attacker. Takeaways: Details about new MITM attacks, their Achilles Heel; Limitations of traditional MFA against MITM attacks; Effectiveness of real-time threat detection protecting bank operations
  13. 11:30 - 12:15 PM

    Lifeboat Strategy for Resilience
    Mark Raeburn, Rouz Hashemi & Chris Farrell, Accenture

    Event Toggle Arrow

    Understanding the new recovery challenges within Operational Resilience regulations following an 'extreme but plausible' cyber event, as recently experienced around the world, does not always have to originate via intentional or malicious intent. Operational resilience regulations require financial institutions to demonstrate their ability to recover critical activities. Learn the practical aspects of a new innovative approach 'Lifeboat strategy' for recovery that firms can use Cost vs risk-appropriate approach tried and tested tools; facilitation of testing; experience and challenges for implementation. An interactive session with discussion, industry insights and client case study examples.

  14. 11:30 - 12:15 PM

    The Elephant in the Room: Risks from Critical Third-Party Providers
    Dr David Aubrey-Jones, FS-ISAC; Milen Mihnev, M&G; Seth King, Nomura; Etienne de Burgh, Google

    Event Toggle Arrow
    The risks from Third-Party Providers (TPPs) continues to grow. TPPs are increasingly being used to deliver critical financial services, incidents are becoming more common, but Third-Party Risk Management (TPRM) practices often haven't changed significantly. As many common providers create largely unknown concentration risks for the sector, regulators are becoming very concerned and are imposing new regulations such as DORA. The expert panel will discuss the latest best TPRM practice with advantages and disadvantages of different approaches in this interactive session. They will also outline future trends and improvements, with members being given the opportunity to ask the panel their questions.
  15. 12:15 - 1:15 PM

    Lunch

  16. 1:15 - 2:00 PM

    Emerging Cyber Threats - What Keeps Us Awake At Night
    Dr David Aubrey-Jones, FS-ISAC; Amit Parmar, JPMorgan Chase & Co.; Karen Lamb, HSBC; William Newton, Standard Chartered; Jared Skivington, Bank of America; Darren Morrisey, Lloyds Banking Group

    Event Toggle Arrow
    The Cyber Security threat landscape is evolving and the threats we face today are rather different to those we faced several years ago. The cyber world seems to be becoming a far more dangerous place. At the same time many security and control improvements are expensive and take considerable time to implement. This session will focus on the major threats that may emerge over the next couple of years. Panel members are Cyber Security specialists, with different areas of expertise, who will give their thoughts on how the threat landscape may change in Financial Services.
  17. 1:15 - 2:00 PM

    Reimagining Operational Risk: Beyond the Framework
    Georgina Whetstone and Damian Crosby, JPMorgan Chase & Co.

    Event Toggle Arrow

    Join us for an insightful member session from JPMC, where we will delve into their innovative approaches for reimagining operational risk within their Technology and Cyber organizations. The discussion will cover the use of risk management framework enhancements and future risk management tools, including thematic risk reviews and the associated advantages for both the First and the Second Lines of Defence.

  18. 1:15 - 2:00 PM

    Breaking Down Silos: The Identity-Fraud Fusion
    Dan Wiseman, Erwan Dano & Dean Stevenson, Transmit Security

    Event Toggle Arrow
    A workshop that will dismantle the divide between cybersecurity and fraud prevention, enlightening attendees on the benefit of unified approach to securing customer journeys and preventing identity-derived fraud. Brainstorm key concerns, existing solutions, gaps and opportunities for fusing together cyber and fraud to craft the most robust defence against evolving threats and bad actors. Leave with an action plan to implement in your own organisation.
  19. 2:15 - 3:00 PM

    Putting our Cyber Security on a WAR footing
    Paul Higginson & Katy Hinchcliffe, M&G

    Event Toggle Arrow
    This session will cover how M&G have transitioned to a Cyber Resilience focus using our WAR model (Withstand, Absorb, Recover). Diving into how M&G have operationalised WAR, what we have completed (a Containment Framework), what we are working on (Threat Led Vulnerability Assurance) and aspirational (WAR Drills). This focus shows a shift from the business have bought into and accepted the heightened likelihood of a cyber incident in future while ensuring we have optimised our defence and recovery processes.
  20. 2:15 - 3:00 PM

    Understand Your Attackers: The Role of Sandboxing in Threat Intelligence
    Michael Bourton, VMRay

    Event Toggle Arrow
    In a rapidly evolving threat landscape, understanding attackers and proactively mitigating threats is crucial. This technical talk explores the symbiotic relationship between sandboxing technologies and cyber threat intelligence (CTI), emphasizing how dynamic malware analysis can enhance organizational defenses. The presentation covers four key stages: the importance of threat intelligence, selecting the right sandbox, the value of Indicators of Compromise (IOCs), and maximizing the utility of threat intelligence. Attendees will learn to integrate sandboxing technologies into their CTI workflows, transforming reactive responses into proactive defense strategies, and effectively managing the deluge of malware and phishing attempts.
  21. 2:15 - 3:00 PM

    Mapping Supply Chains and Concentration Risks in Financial Services
    Dr David Aubrey-Jones, FS-ISAC & Haydn Brooks, Risk Ledger

    Event Toggle Arrow
    Financial Services is increasingly reliant on services from Third-Party Providers (TPPs) and many of these are critical. But the sector has no map of TPP services or understanding of critical dependencies that present concentration risks, and regulators are becoming concerned and are imposing new regulations such as DORA and UK Critical Third-Parties. To address this, FS-ISAC in partnership with Risk Ledger, is undertaking a project to understand the FS Third-Party landscape and concentration risks, including nth party providers. The results, analysis and implications of the project will be presented by FS-ISAC and Risk Ledger in conjunction with participants.
  22. 3:00 - 3:30 PM

    Coffee break

  23. 3:30 - 4:15 PM

    Not Just Cyber: Using Intelligence Analytic Methods to Support Decision-Makers
    Freddy Murstad, Nordics Finance CERT; Harrison Kieffer, Goldman Sachs

    Event Toggle Arrow

    Join two experts as they discuss the application of structured analytic techniques in the cyber threat analysis to address risks and ultimately support decision-makers beyond the cyber realm. Hear about the theory behind strategic intelligence analysis, understand how to address non-technical business requirements, and learn how one of your peers are putting this approach into action.

  24. 3:30 - 4:15 PM

    UK Resilience Panel
    Panel Moderator: Elizabeth Heathfield, FS-ISAC; Panellists: Jayaraj Puthanveedu, BNP Paribas; Bethany Netzel, CME Group; Amy Lee, Bank of England

    Event Toggle Arrow
    Join us for a discussion with senior leaders about the evolution of resilience programmes in the financial sector. The panellists include members of FS-ISAC’s EMEA and Global Board of Directors and a representative from the Bank of England. The panel discussion, moderated by FS-ISAC, will explore how resilience programs have grown and changed, what sets resilience programs apart from traditional business continuity or risk management programs, and how resilience relates to and works with cybersecurity teams. Leadership will share their insights on building resilience amidst the complexity of the global financial system, the advancement of digital technologies, and the increasing frequency of cyber threats.
  25. 3:30 - 4:15 PM

    QR Codes: Adapting to a social trend
    Dave Ross, Intel 471

    Event Toggle Arrow
    An interactive session exploring the use of QR codes across the audience's organisations and controls they currently use to mitigate threats and educate colleagues and customer posed by threat actors using QR codes. The session will cover the growth of the use of QR codes in society over the last 5 years and how threat actors have integrated QR codes into existing attack methods to target both businesses and its customers.Takeaways: The growth of the QR code in society The implementation QR codes within threat activity Control measures used by peer organisations Evaluating risk posed by expanding engagement delivery methods
  26. 4:30 - 5:00 PM

    Tracking Malicious Actors with Proactive Threat Intelligence
    Martina Di Folco & Brendan Toland, Morgan Stanley

    Event Toggle Arrow
    We would like to give some ideas to our members to take back and implement into actual processes which help to improve their security posture. We are in a number of intelligence sharing circles and we regularly see discussion about tracking new threat actor activity, so this is highly relevant to our peers, and we hope to provide a starting point for those who don't yet proactively threat hunt infrastructure.
  27. 4:30 - 5:00 PM

    The Evolution of Business Continuity Planning
    Khalid Rashid DTCC, Derek Pillar, Mastercard & Nathan Bird, Google

    Event Toggle Arrow
    The global financial regulations and regulators, and operational resilience in the face of a challenging landscape. The session will enable the members to understand how Global Financial Regulations and Business Continuity practices are evolving to ensure the resilience of the financial sector and the service offerings offered to clients by the FIs. The session will include an insightful group discussion with perspectives from Nathan Bird of Google and Derek Pillar of Mastercard, facilitating an engaging exchange of views.  
  28. 4:30 - 5:00 PM

    Staring at the Clouds: Securing the Bank's cloud real-estate
    Vincent King, Bank of England

    Event Toggle Arrow
    When the world's most storied financial institution decided to embrace the power of the cloud, the security team had to adapt and develop a cloud security framework to ensure their cloud journey was smooth sailing. Join us to hear from the Bank of England on their unique 3I (Inventory, Intelligence Insights) framework to securing their cloud environment.
  29. 5:00 - 6:00 PM

    Closing Reception