|Early bird registration fee effective January 7th-March 3rd, 2019:||$300 + tax|
|Registration fee as of March 4th, 2019:||$395 + tax|
|Hotel room rate:||$169 + tax per night|
Breakfast and lunch included both days
Networking event to be held on Wednesday, April 24, 2019 following wrap up of day one. Appetizers and drinks will be served.
** Please book your hotel room before March 21st, 2019 to take advantage of our group rate. Our group rate will not be available after this date. You may call 1-800-663-7667 or email email@example.com to book your hotel room or you may use the link below. Please reference the Interac Risk & Cybercrime Conference to ensure you receive our group rate.Book your group rate for Interac Risk and Cybercrime Conference
Agenda and speakers are being confirmed. Please check back regularly for updates
Chief Risk Officer,
|Cpl. Aaron Gilkes
Computer Forensics Investigator
|Behind Canadian Mobile Payment Phishing Campaigns
We have all received phishing text messages promising tax refunds, utility payment credits or e-transfers from unknown sources. We tracked some of these messages coming from Canadian phone numbers and analysed the sites they lead to. They use web pages and domain names similar to large Canadian institutions to lure victims in typing their personal information in fake forms. Who sent those text messages? What happens when we click on the links? We’ll try to answer some of these questions and take you through an actual investigation, highlighting the positive results of collaboration between private sector, financial institutions and law enforcement.
|Dt./Cst. Kenrick Bagnall
Intelligence Services & Computer Cyber Crime
Toronto Police Service
|The Cybersecurity Mindset – Cybercrime Risk Assessment, Mitigation and Response
With Billions being spent globally on Cybersecurity each year, breaches of various magnitudes are still taking place at an alarming rate. From phishing scams to targeted attacks, cyber threats loom over us keeping, business, technology and financial services professionals up at night. Effective action starts with the appropriate mindset, especially when it comes to determining your risk factors for becoming a victim of cybercrime. This presentation will examine cyber threat considerations, key components that should be in every cyber incident response plan and how law enforcement can use your mitigation efforts to assist with attribution.
Chief Data Scientist & VP, Fraud Risk
|Interac Fraud Update
Robert will provide a general fraud update for all of Interac’s products.
Partner, Risk Artificial Intelligence Leader
|Tackling Cyber-enabled fraud. What does it take?
The pressure to tackle financial crime, especially cyber-enabled fraud has never been greater. Using digital technologies, criminals are perpetrating increasingly sophisticated financial crimes across channels, geographies, and industries. As criminal methodologies evolve, new technologies heighten customer expectations, and new regulations raise the cost of compliance, it is getting increasingly complex to manage financial crime risks. To avoid falling behind, financial institutions need to reconsider their approach to mitigating financial crime.
This presentation will offer recent threat landscape on cyber-enabled fraud globally building on Deloitte’s global threat intelligence network and provide a pragmatic approach to tackling these threats.
Metro Vancouver Transit Police
|Reputation Management: The Impact of Social Media
Social Media is a commanding tool for communications, intelligence, and investigations. Regrettably, it is also heavily exploited by those either seeking to do harm or others failing to understanding the consequences of boundary blurring between personal and professional activities. This dynamic session should prompt attendees to ensure that their personal use privacy measures are up to date for the following platforms: Facebook, Instagram, and Twitter. Attendees will learn strategies to reduce risk regarding information leaks and personal reputation management. Attendees will be provided with an E-Booklet of the covered protection strategies in this session.
**Agenda is subject to change.**
Thank you to our Sponsors
Should you have any questions or concerns please feel free to contact firstname.lastname@example.org.