Operations/Tech Seminar 2019

Operations/Tech Seminar 2019

When:
March 12, 2019 all-day
2019-03-12T00:00:00-04:00
2019-03-13T00:00:00-04:00
Contact:
net.fortunal.ical4j.invalid:Harrisburg%20Area

The role of a successful IT professional requires many diverse skills. Just knowing about IT is not enough, as you need to keep on top of technology trends and scams, know the business of banking and advocate what is best for the bank’s technology strategy. To help you continue to lead your bank’s technology department, the Pennsylvania Association of Community Bankers is hosting the 2019 Technology Conference. This year’s conference will feature sessions on information security, business continuity best practices, cybersecurity, vendor management and more.

 Who Should Attend

  • IT Security Officers
  • Chief Information Officers
  • Incidence Response Managers
  • Risk Management Officers
  • Technology Officers

 Program At-A-Glance

 8:30 – 9:00 a.m.    Registration

 9:00 – 9:50 a.m.    Cybersecurity: Why the Dark Web Should Be Your Guide
Jeremy S. Burris, CISA, CISSP, MCP, L|PT, CPTS, C|EH, CICP, ECSA, SECURITY+
Principal, Technology Services Group, SR Snodgrass

Like it or not, cybersecurity is part of our daily business.  This presentation will point out today’s trending threats, the weak links in many institutions’ cybersecurity plans and more.

10:00 – 10:50 a.m. Skimming, Scammers and Security
Ben Hayden, Risk Services Supervisor, SHAZAM

Across the country, skimmers and the cloned cards they produce are costing banks millions of dollars in fraudulent transactions, re-issued cards and damaged reputations. Understand how skimming happens and what to do when it does occur. We’ll share real world examples and short videos to demonstrate how skimmers work, how data is collected and how easy it is to clone a card from the collected data. Once a card is compromised, learn how to mitigate the risk. New card technologies in conjunction with detection systems, blocking transactions and launching transaction alerts, reduce fraud and protect accountholder information. Learn about current fraud trends and ways to fight back.

11:00 – 11:50 a.m. Darkest Day or Finest Hour? How to Communicate Essential Information During a Business Disaster
Matthew Hollenbeck, Senior Project Manager, Ncontracts

Picture a debris-strewn field. The injured struggle as news media begins to storm the area. The hero swings into action, swiftly following protocol to save lives and restore as much normalcy as possible. It’s not Hollywood’s latest blockbuster, but it is a situation that could surprise any financial institution. Are you ready to be the director in this scenario? This session will take you beyond phone trees to find out what it really takes to save the day and clearly communicate business continuity plans in times of disaster when lives are in danger and business interruptions loom.

 12:00 – 12:45 p.m. Lunch

 12:50 – 1:40 p.m.    Cyber Money Laundering: AML Goes Cyber
Ben Hayden, Risk Services Supervisor, SHAZAM

The world of money laundering has grown far more sophisticated with the introduction of technologies such as high-speed connectivity, virtual currencies, and the Internet of Things.  This session will look at some high-profile cases where money launderers utilized the internet to launder money, and will address the future of money laundering and what your institution can do to stop it before it happens.

1:50 – 2:40 p.m.       Cryptocurrency, Fintech and Blockchain – What Is It and Why Do I Care?
Bryan Adler, Co-Founder & CEO, Vetter

Since Fintech was created 8 years ago, it feels like there is a new financial disruption popping up every week – some of the disruptions are fads and some are here to stay. Cyptocurrency and Blockchain are the latest financial disruptions. Learn what it is, why you should care and debate if this is a fad or a lasting trend the industry should pay attention to.

2:50 – 3:40 p.m.       Vendor Policy: Solving the Mystery of Classifying Vendors
Matthew Hollenbeck, Senior Project Manager, Ncontracts

If your vendors are labeled or classified solely by dollar amount, you may be in for a surprise. The amount you spend on a vendor, may not correlate to the risk that vendor poses to your institution. There are many factors that you have to consider when labeling a vendor, such as GLBA Information, the financial and operational effects on the institution, if the vendor were unable to provide services and the ability to replace a vendor, which should be included in your Third-Party Risk Management Policy and Procedures. All vendors are not created equal. It’s easy to try to categorize them using broad terms, but that may be too vague to be effective. This session will help you with best practices for classifying vendors within a comprehensive management policy for your third-party risk program.

3:45 p.m.           Conference Adjourns