Kick off Cybersecurity Awareness month by tuning in to Cyber Week On Demand featuring insightful sessions and engaging conversations with cybersecurity and risk experts, your peers, and experienced senior professionals.
Register here to gain access to the on demand recordings of our conference sessions.
|On Demand||Any time||Your Desk!|
Tune in as we kick-off ACA's first-ever Cyber Week with a 45-minute fireside chat with Phil Venables, Board Director and Senior Advisor (Risk and Cybersecurity) for Goldman Sachs and Mike Pappacena, Partner, ACA Aponix.
Join our group of thought leaders in cybersecurity and data privacy to learn where cybersecurity threats are increasing, where regulators are probing, what’s next in data privacy requirements, and what defines a sound cybersecurity program. In this session, panelists will dig into existing, growing, and emerging threats. They will share their experiences and observations of actual cybersecurity examinations by regulators. They will detail the current and future outlook for data privacy regulation, and the potential impact for companies large and small. They will further discuss risks specific to portfolio companies, the importance of cybersecurity assessments pre- and post-deal, privacy regulation, and third-party risk. Panelists will help define the components of a sound cybersecurity program that can scale with any organization.
With the ever increasing number of cybersecurity attacks targeting portfolio companies and the resulting investment value, LPs and GP internal risk functions (i.e. ESG, investment risk groups, etc.) have elevated expectations related to investment cybersecurity and privacy risk management oversight.
At the same time, management's time is more limited than ever as they work to navigate the new normal, requiring a risk management oversight approach that is efficient, minimizes impact on management, and provides enough fidelity into the unique cybersecurity risks across the portfolio to drive change where needed.
To discuss various approaches to tackling this increasing challenge we have assembled a panel with experience deploying portfolio company risk management programs and how to effectively leverage cyber insurance as an added layer of protection. In addition, we will examine how ACA's PortCo Defend and PortCo Protect have been leveraged by your peers to enhance PortCo risk management oversight.
Risk Payment fraud threats have become a major concern for organizations globally, with more than 80% of financial professionals reporting incidents of attempted fraud. Global trends reflect a continued and sustained growth over the past 3 years. The tactics used by fraudsters evolve and increase in sophistication continually. Attempted attacks are becoming harder to identify resulting in greater success infiltrating organizational payment flows. In addition to the obvious financial impact, fraudulent incidents may subject firms to regulatory scrutiny, privacy concerns, reputational damage, litigation and loss of clients/investors. In addition, post-breach remediation costs can be extremely high at an average of $3 to every $1 lost. Join panelists as they discuss how to be proactive in predicting and assessing your firms exposure to these threats in order to mitigate the likelihood and impact of a payment fraud incident.
As organizations around the world continue to engage third-parties to support their businesses, they often struggle when it comes to performing due diligence on the control environments of these third-parties. Third-parties themselves are faced with hundreds, if not thousands of due diligence requests, with differing formats, multiple platforms, and varying levels of inspection by clients looking to understand the quality of their internal controls as they engage for services. While we have moved closer in the past few years to the elusive holy grail of a standard assessment agreed to by all parties, we are still left with too many options and approaches. This is intended to be an interactive session with audience members to discuss current methods, what has been found to work well for this process, and what still needs to be accomplished by third-parties and their clients to achieve standardization and efficiency in the due diligence aspect of third-party risk management.
Join us for the horrifying retelling of the scariest cyber incidents of 2020. Learn from these incidents and see how you can apply best practices to improve your security, educate employees, and protect your business.