November 5, 2021, 1:00 pm - 3:00 pm
Session 1: CIO Panel
Peter Morales, Senior Vice President, Innovation & Technology
Dan Decosta, Chief Information Officer
Dan Serafin, Senior Vice President – Chief Information Officer
Ryan Rodrigue, Principal
Wolf & Company, P.C.
Session 2: Cybersecurity
Sean D. Goodwin, IT Assurance Manager
Wolf & Company, P.C.
Session 1: CIO Panel – Initiating Efficient IT: A CIO’s Perspective
Information technology (IT) integration is one of the most pertinent topics impacting financial institutions today. Our summit will host a Chief Information Officer (CIO) panel examining the challenges, benefits, and opportunities surrounding IT advancements and digital transformation in this sector. During this session, you’ll hear directly from experts about the innovative changes they’ve made to their technology environment, and how the ability to incorporate new IT systems relates to overall strategic planning. Panelists will also discuss effective techniques to streamline processes and reduce redundancy, and ways to access all of your data and put it to effective use.
- Actionable strategies to reach new customer bases
- Benefits and challenges of monetizing your data
- How to efficiently integrate new IT systems
Session 2: Preparing to Mitigate and Respond to Ransomware
Estimated global losses from cybercrime rose to $1 trillion in 2020, according to a report by McAfee. There’s also been a recent rise in ransomware attacks plaguing industries, leaving institutions either scrambling to remediate negative impacts or generate new preventive measures. Cybersecurity breaches can have severe financial, operational, and reputational consequences, and it can be difficult to defend your organization against these risks when hackers are consistently updating their methods to infiltrate your systems and steal confidential information.
We’ll dive into recent trends in ransomware—looking at where it is now, where it’s going, and steps you can take to protect your organization. From detection and prevention strategies to effective response procedures, we’ll detail what you can do to secure your systems before attacks happen, and what you need to do during an attack to contain and mitigate damage.
- What happens to your data when you get attacked
- Where malicious actors sell your information
- How to contain and respond to an attack if malicious actors succeed in infiltrating your systems