Agenda
Covering crucial topics for credit union leaders
If your credit union is focused on cybersecurity, technology, innovation, or simply just staying ahead of threats and protecting member data, CU Intersect is right for you.
Complete with impactful keynotes, flexible breakout tracks, industry panel discussions, emerging tech use cases, and more. Mix and match any breakout sessions to customize your conference experience!
We’re working on our preliminary 2024 agenda, but you can expect to see topics similar to:
- AI Ethics and Safety for Credit Unions
- Cloud Migration Best Practices and Lessons Learned
- Network Segmentation
- Secure Access Service Edge (SASE) and Zero Trust
- Effectively Outsourcing, Bringing in Third-Parties
- API Security for Internal & External Connections
- Risk Assessments and Risk Management
2024 Speakers
2024 Agenda *Subject to change*
Day 1 Agenda
8:30 – 8:45 AM: Emcee(s) from NCU-ISAO / Pure IT CUSO – Welcome, Overview & Opening Remarks
8:45 – 9:45 AM: Steve Soukup, CEO, DefenseStorm – Session Title Coming Soon
Description: Coming soon – join us and Steve Soukup, CEO of DefenseStorm, as he discusses the latest paths to credit union cyber resilience!
About: Steve Soukup has served as Chief Executive Officer since 2020 and in that role is responsible for leading all aspects of the company’s business. He is passionate about building a community of trust among our teams and with our customers while also enabling our customers to do the same with their accountholders. Steve joined us as Chief Revenue Officer in May 2017 with a charge to drive growth for the business while leveraging his extensive experience serving the banking vertical. He was promoted to President in October 2019 and then to CEO in April of 2020. Under his leadership, DefenseStorm has set the standard for enabling banks and credit unions to achieve cyber risk readiness.
9:45 – 10:45 AM: Hal Kempfer, CEO, GRIPSA – Re-assessing Risk in an Era of Growing Global Instability
Description: With wars proliferating over the last few years, especially in just the last year, threats to our critical infrastructure thought as primarily terrorist based since 9-11 are being rapidly realigned to nation-state actors openly challenging the global order, and aggressively operating in the clandestine “gray zone” just short of open conflict. The risk faced across society and to our economy has shifted dramatically and seemingly fast, and analogies to the unstable years just prior WWII are becoming a common refrain. Non-state actors and state actors have begun to blur, and the level of sophistication and threat potential has increased correspondingly. Europe has awakened to continent of full saboteurs and spies, and North America is quickly realizing the same. Asia and the West Pacific is increasingly seen as a not too future battlefield portending tectonic shifts to our way of life. A myriad of threat tactics and techniques have been employed in a dizzying array of regular assaults where cyberspace and physical space are both impacted, and the potential consequences seems to grow exponentially. Added to this are the more apparent effects of climate change, where natural forces are also impacting our all-hazards threat assumptions to critical infrastructure in ways not seen in many decades, if not centuries.
Hal Kempfer, a retired Marine Intelligence Officer who is a renowned “go-to” national and homeland security analyst relied up by multiple television news networks, will bring his unique background and perspective from his many decades dealing with war and terrorism, along with both man-made and natural disasters, to address how this era of global instability is forcing us to reassess risk, and broaden our scope of what that now truly means.
10:45 – 11:15 AM: Break & Exhibit Hall Grand Opening
Breakout 1 (3 concurrent sessions)
Randy Lindberg, CEO at Rivial Data Security
Description: Cyber Risk Quantification – Description coming soon!
CATO Networks, Speaker TBD – SASE/ Zero Trust Topic
Description: Session description coming soon!
Allure Security, Sam Bakken, Director of Product Marketing – Credit Union Impersonations Online: Real Costs and Emerging Trends of a Critical Threat
Description: Credit unions need to do more to attract younger members or risk “fading into irrelevance,” according to consulting group McKinsey. Key strategies include appealing to younger generations through increasing digital marketing investments and enhancing digital capabilities. However, online brand impersonations pose a significant threat to these initiatives by increasing fraud costs, damaging a credit union’s reputation, and eroding consumer trust in a credit union’s ability to keep its members safe.
In this session we’ll explore how fraudsters’ targeted credit unions and their members throughout 2024 and how credit unions need to respond in order to maintain and grow their organization.
Highlights:
• Key insights from Allure Security’s annual report “SPOOF 2024: Trends in Online Impersonation of Credit Unions”
• How to detect and eliminate online scams before they harm your members
• How to build a compelling business case for investing in proactive online brand protection initiatives
Breakout 2 (3 concurrent sessions)
Tim Parisi, Sr. Director, Incident Response & Cloud Services at CrowdStrike – The Front Lines with CrowdStrike: Latest Threats and Best Practices from CrowdStrike’s IR Team
Description: This presentation will provide an overview of the most recent and sophisticated cyberattacks that CrowdStrike’s incident response (IR) team has encountered and mitigated. You will learn about the tactics, techniques, and procedures (TTPs) of the adversaries, as well as the best practices and recommendations from the IR experts to enhance your security posture and resilience. You will also get a glimpse of how CrowdStrike’s cloud-native platform and services can help you prevent, detect, and respond to breaches faster and more effectively.
*Additional Breakouts will be added as they are finalized*
Breakout 3 (3 concurrent sessions)
Scott Johnson, Meritrust Credit Union – A New Ownership Model for Vulnerability Management
Description: How can credit unions effectively manage their vulnerability risk in a complex and dynamic environment? In this session, you will learn how one credit union reduced the number of vulnerable applications in their environment to improve their security posture.
Josh Langas, Dupaco Community Credit Union – Analyzing and creating actionable CTI, with Detection Engineering for Beginners
Description: In this session, you will learn how Dupaco, a leading credit union, uses cyber threat intelligence (CTI) and detection engineering (DE) to enhance its security operations and respond to emerging threats. We will explain the CTI and DE lifecycles, show examples of how Dupaco has used them to detect and prevent phishing and ransomware attacks, and share some useful resources and tools. We will also present a Dupaco use case of the entire chain of ingesting and analyzing CTI to creating and deploying detections based on an active threat. We will conclude with a Q&A session where you can ask any questions you may have about CTI and DE.
Steve Koinm, Pure IT Credit Union – Back to the Future…of Hacking Physical Security Systems
Description: Join us for an encore follow-up presentation from CU Intersect 2023 as Steve Koinm looks at advancements in hacker tools and technology to show how physical security systems can be compromised.
*Additional Breakouts will be added as they are finalized*
3:15 – 4:00 PM: Jacob Aguiar, Cybersecurity Advisor, CISA – Protecting Critical Infrastructure: Perspectives on the Latest Adversarial Threats from CISA
Description: CISA is the operational lead for federal cybersecurity and the national coordinator for critical infrastructure security and resilience. We are designed for collaboration and partnership. Learn about our layered mission to reduce risk to the nation’s cyber and physical infrastructure. We lead the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure.
4:00 – 4:45 PM: Gene Fredriksen, Published Author, Executive Director & CISO, NCU-ISAO – Managing Third-Party Vendor Risks in a Complex Cyber Landscape
Description: The recent wave of cyberattacks on critical infrastructure, government agencies, and private organizations has highlighted the importance of managing third-party and nth party vendor risks. These risks arise from the inter-dependencies and connections between an organization and its external partners, suppliers, and service providers, who may have access to sensitive data, systems, or networks.
In this keynote, Gene, will share his insights and best practices on how to identify, assess, and mitigate third-party and nth party vendor risks. He will also discuss how to align vendor risk management with the organization’s overall cyber risk management strategy and governance framework.
Day 2 Agenda
8:30 – 8:45 AM: Emcees, NCU-ISAO & Pure IT CUSO – Welcome, Day 2 Overview
8:45 – 9:45 AM: Alex Goryachev – Artificial Intelligence Expert, WSJ Best Selling Author, Expert on Innovation
Description: AI transformation is not about technology; it’s about people. Alex Goryachev, a leading authority on AI-driven workplace transformation, is at the forefront of this shift. An estimated 40% of the global workforce will require reskilling in the next three years due to AI. Organizations must invest in talent development as much as in technology to stay competitive.
Alex Goryachev’s extensive experience in senior roles at major corporations like Cisco, IBM, Amgen, Dell, and Pfizer, coupled with his active involvement in the International Standards Organization, provides him with unique insights into guiding organizations through this transformative period. Additionally, as a Wall Street Journal bestselling author, his expertise is both recognized and respected widely in the industry.
As AI continues to reshape industries, the ability to effectively blend human skills with AI capabilities will determine which organizations merely survive and which ones thrive. By partnering with Alex, you’ll equip your team with the knowledge and tools needed to excel in the age of AI, ensuring your organization not only survives but thrives in this new era.
9:45 – 10:45 AM: Pen Test Partners (PTP), Speaker Coming Soon
Description: Session description coming soon!
11:15- NOON: Cloud Migration Panel: Strategies and Lessons Learned – Mark Frieden at Hughes FCU, CJ Daiker at MAPS Credit Union, Wayne Trout at NCUA, Kurt Long at BUNKR, Trent Henson at Pure IT – Moderated by Masako Long, Janusea
Description: Join us for a credit union panel discussing various aspects of the cloud. Learn the how and the why of moving from on-prem to the cloud, including the latest technology strategies, regulatory considerations, and more. Credit union leaders will share lessons learned during cloud migration in a compelling and dynamic discussion moderated by Masako Long, VP of Sales at Janusea.
NOON – 1:00 PM: Lunch & Sponsor Exhibits
Breakout 1 (3 concurrent sessions)
Silverfort, Speaker TBD – Tentative Topic: Privileged Access and Identity Access Management
Description: Session description coming soon!
Alexandria Fontana, Software Specialist at CoNetrix Tandem – Guarding Your Digital Fortress: Defending Against Personal Data Exploitation
Tentative Description: In this session, you will learn how to protect your personal data and your organization’s data from cyberattacks, identity theft, and data breaches. You will also discover the best practices and tools for complying with data protection regulations and standards. You will gain insights from experts and practitioners on how to build a robust and resilient digital fortress that can withstand the threats of data exploitation.
Speaker TBD, DefenseStorm
Description: Session description coming soon!
Breakout 2 (3 concurrent sessions)
Idrees Rafiq, Information Security & Risk Management Consulting VP, Cornerstone Resources – Risk-focused Topic Coming Soon!
Description: Coming Soon!
Brian Hinze, VP, Member Services & Operations, NCU-ISAO – The Imminent Risk of Deepfakes!
Description: Join Brian Hinze at the NCU-ISAO as he demonstrates how modern, AI-driven tools have simplified deepfake attacks for fraudsters. Learn how easy it is to create a deepfake, and discuss how your organization can work to protect its leadership and assets from opportunistic criminals.
Michael Weaver, CISO, EdgeFi – Creating a Strong Cyber Culture from the Top Down
Description: Cybersecurity is everyone’s job. It’s everyone’s job to install MFA, it’s everyone’s job to lock thier computers, it’s everyone’s job to not click that phishy link.
It seems simple, but as we all know, that’s not always the case.
Join us in a conversation about building a strong cyber culture from the top down. We will explore how strong leadership creates a strong team and discuss the details of how to help build that at your company.
*Additional Breakouts will be added as they are finalized*
3:00 – 3:30 PM: Break & Sponsor Exhibits
3:30 – 4:30 PM: Wayne Trout, NCUA – Update on the Cybersecurity Examination Program
Description: Join us as the National Credit Union Administration discusses key developments in the Information Security Examination (ISE) program, as well as key emerging threats to credit unions and how your organization should be prepared. Delve into key takeaways from the 72-hour reporting rule, and what’s on the horizon for the future of examinations.
Day 3 Agenda
8:30 – 9:15 AM: Kurt Long, CEO, Founder & Philanthropist, BUNKR – Trust, Truth and Accountability in 2024 and Beyond
Tentative Description: The speaker will explore:
* The relationship between trust, truth and accountability as it relates to our core institutions in the United States as well as in our individual lives
* Recent trends which undermine trust and endanger law and order as well as general trust in the world
* Finally, what we can do as institutions, leaders and particularly as individuals to turn the tide on these trends to create cultures of trust, truth and personal accountability. The result being that we are capable of withstanding escalating modern stresses on our institutions including increasingly ruthless cyber criminal attacks on individuals and businesses
9:15 – 9:45 AM: Break, Last-chance Exhibits & Vendor Giveaways
9:45 – 11:15 AM: David Krygowski and Phil Schneider, Cyberbit, Live Fire Attack Exercise Incident Response Simulation
Description: CU Intersect has partnered with Cyberbit, a leading skill development platform and cyber range provider, to bring you a real-time cyber incident response exercise at this year’s conference! Experienced Cyberbit trainers will conduct a live investigation of a security incident as it unfolds in real-time, simulated in Cyberbit’s hyper-realistic cyber range.
Key Takeaways:
• Gain experience and insight as you help a SOC analyst investigate and respond to an attack in real-time.
• Get feedback from an expert cyber trainer, and improve your knowledge of best practices, tools, and threats.
• Follow along as a hyper-realistic cyber range recreates the SOC experience, including the networks, the attacks, and the security tools.
• Observe how industry experts leverage market-leading SIEM platforms, firewalls, and network analysis tools in the incident response process.