No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Wait Listed
Personal Calendar
???connect.schedule.participant???
Conference Event
Meeting
Interest
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
We were unable to load the map image.
This has not yet been assigned to a map.
Search Catalog
Reply
Replies ()
Search
New Post
Microblog
Microblog Thread
Post Reply
Post
Your session timed out.
Meeting Summary
The session has been added to your schedule
The session has been removed from your schedule
 

Are You Ready for Your Cyber Exam?

Session Speakers
Session Description

Why Attend 
Understand the SEC’s agenda and NIST Detect Function practices designed to protect your firm and clients from cyber exploitation.

Session Details
In its recent 2015 Cybersecurity Examination Initiative, the SEC has asked for information regarding firm policies and procedures for vulnerability scanning and penetration testing.  The National Institute of Standards and Technology (NIST) Cybersecurity Framework has referenced such testing under the Detect Function. Any Internet-connected network and systems can be vulnerable to hackers and cybercriminals. Vulnerability scanning and penetration testing can uncover these weaknesses and potential exploits. Find out what is the SEC currently saying about expectations in these areas? This session covers:

  • The basics of scanning and testing
  • A common-sense, risk-based approach to these disciplines
  • How to prepare for a vulnerability scan and manage ongoing testing
  • Choosing the right vendor
  • How to incorporate results into your risk-assessment process and vulnerability management program  

Additional Information
1h 15m
Session Schedule