Event Schedule

Times for this Event are in Eastern Time (EDT/EST)

The Summit will be open from 8AM to 6PM.

  • DAY ONE
  • Welcome / Introductions
  • Moving Beyond Password to Delight & Secure Users 9:40 am

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Panel Participants:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer at Okta

    Collapse This Item

  • Small businesses deserve big protection 9:55 am

    Presented by Cisco

    Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Kate MacLean from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.

    Click to Expand

    Panel Participants:

    Kate MacLean
    Kate MacLean

    Kate MacLean

    Cloud Security Evangelist at Cisco

    Collapse This Item

  • Latest network-layer DDoS trends and the rise of ransom-driven attacks 10:45 am

    Presented by Cloudflare

    Unprecedented changes in how people live and work around the world since the COVID-19 pandemic led to changing patterns of Internet usage. And as our reliance on the Internet surged, so did the frequency, sophistication, and distribution of cyberattacks. 

    In this talk, Cloudflare’s Head of Solution Engineering will discuss the latest DDoS attack trends observed over Cloudflare’s network. Join this talk to understand:

    • Key trends and shifts in the DDoS landscape
    • Ransom-based attacks: what are they and how to respond?
    • Steps organizations can take to better protect their networks
    Click to Expand

    Panel Participants:

    Trey Guinn
    Trey Guinn

    Trey Guinn

    Head of Solution Engineering

    Collapse This Item

  • A Modern Approach to Information Protection 11:05 am

    Presented by Proofpoint

    Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Customer PII data is the most often lost or stolen data, and more than half of these breaches involve malicious attacks. Challenges like increasing threat activity, difficulty protecting a remote workforce, and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations – especially when analysts need multiple tools to investigate data leakages. So how can you better protect your company in 2021? 

    Join us as we discuss how you can reimagine data privacy with a modern approach to information protection. In this session, we will cover: 

    • Modern data security challenges 
    • The convergence of data and threat protection to secure data from internal and external threats 
    • How people-centric investigations lead to more rapid investigative outcomes
    Click to Expand

    Panel Participants:

    Mike Stacy
    Mike Stacy

    Mike Stacy

    Global Cloud and Information Protection Director at Proofpoint

    Collapse This Item

  • Expert Panel Discussion: Recover from Ransomware 11:25 am

    Recover from Ransomware/Ransomware Ex Post Facto: Coming Back After an Attack

    Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated.  Rebuilding images, devices, re-formatting storage, and all the rest is part of this process.  In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.

    Click to Expand

    Panel Participants:

    Marina Liang
    Marina Liang

    Marina Liang

    Senior Security Engineer at Automox

    Adam Mansour
    Adam Mansour

    Adam Mansour

    Chief Security Officer at ActZero

    Daniel Stiegman
    Daniel Stiegman

    Daniel Stiegman

    Manager, Threat Intelligence Group

    Collapse This Item

  • Lunch Break
  • Guest Keynote: Andrew Hoover a Key architect of the CMMC 12:30 pm

    Development of the CMMC and its benefits to an Organization

    CMMC was developed to drive a cultural shift in the DIB away from reactive compliance to proactive cybersecurity measures. One of the key CMMC model architects from the Software Engineering Institute (SEI) at Carnegie Mellon University (CMU) will walk through how CMMC was developed on top of, rather than replacing, existing regulations and why additional practices were added to those already existing in NIST 800-171. We will then look at how the implementation of process maturity can benefit organizations and show data which supports the effectiveness of these processes.   

    Click to Expand

    Panel Participants:

    Andrew Hoover
    Andrew Hoover

    Andrew Hoover

    Resilience Engineering Team Lead of CERT Division at Carnegie Mellon University

    Collapse This Item

  • Disrupting Lateral Movement by Securing Active Directory 1:20 pm

    Presented by Attivo Networks

    A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Directory to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization. 

    Active Directory security requires time, resources, expertise, and visibility. Typical best practices focus on limiting privileged accounts, conducting audits, and hardening systems, but these no longer suffice to address advanced attacks. 

    Join this session to explore new options that automate defending AD from compromise to prevent lateral movement. 

    Highlights include: 

    • Live detection for attacks targeting Active Directory 
    • Attack surface reduction at both Active Directory and the endpoint 
    • Continuous visibility to AD changes that introduce new exposures 
    • Addressing Active Directory assurance to reduce risks and pass Red team tests
    Click to Expand

    Panel Participants:

    Joseph Salazar
    Joseph Salazar

    Joseph Salazar

    Technical Deception Engineer, CISSP, CEH, EnCE at Attivo

    Collapse This Item

  • Rethinking your data protection strategy in the age of ransomware. 1:40 pm

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Insider Risk Management: The alternative to traditional data protection is here! 2:20 pm

    Presented by Code42

    We live in a world where employees are almost twice as likely to expose corporate data than they were prior to the pandemic. As a result, organizations have been struggling to solve this problem with legacy solutions such as DLP and need a dedicated Insider Risk Program instead. By attending this session, you will learn how an Insider Risk Management approach can provide the visibility you need to quickly mitigate data exposure risks without the obstacles commonly associated with blocking and tackling.

    Click to Expand

    Panel Participants:

    Tommy Todd
    Tommy Todd

    Tommy Todd

    Vice President of Security

    Collapse This Item

  • Faking It: Stopping Impersonation Attacks with Cyber AI 2:40 pm

    Presented by Darktrace

    Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. 

    Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. 

    In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. 

    Find out how in this session.

    Click to Expand

    Panel Participants:

    Mariana Pereira
    Mariana Pereira

    Mariana Pereira

    Director of Email Security Products at Darktrace

    Collapse This Item

  • Expert Panel Discussion: Trends in Federal Cybersecurity 3:05 pm

    In the wake of “top tier tradecraft” nation-state sponsored cyberattacks, new executive order regulation looms.  The ecosystem around the federal government sector for those that work IN or WITH three-letter agencies is ever-changing.  Even as the new administration has kept much of the previous ones’ cyber plans on track – the key trends like Zero Trust, SOAR, CARTA, IAM, etc. that are important to all our Community Members are intensified by FedRAMP, CMMC and a host of new requirements. 

    Whether you spend all day thinking about the next DoD requirement or don’t know your C3PAO from TIC 3.0, our expert discussion will approach the topic from multiple angles that promises an educational opportunity for everyone. 

    Click to Expand

    Panel Participants:

    Jeet Shah
    Jeet Shah

    Jeet Shah

    Public Sector Identity Architect at Auth0

    Drew Church
    Drew Church

    Drew Church

    Cybersecurity Advisor at Splunk

    Justin Fanelli
    Justin Fanelli

    Justin Fanelli

    Chief Architect of Defense Medical Intelligence Data and the Technical Director at the Naval Information Warfare Center

    Andrew Hoover
    Andrew Hoover

    Andrew Hoover

    Resilience Engineering Team Lead of CERT Division at Carnegie Mellon University

    Collapse This Item

  • CISO Panel 3:55 pm

    Panel Participants:

    Don Watson
    Don Watson

    Don Watson

    Chief Information Security Officer - U.S. Patent and Trademark Office

    Marcia Main
    Marcia Main

    Marcia Main

    Former CISO for Rally Health

    Dasha Deckwerth
    Dasha Deckwerth

    Dasha Deckwerth

    CISO/President - Stealth-ISS Group, Inc.

    Eric Hussey
    Eric Hussey

    Eric Hussey

    CISO at Aptiv

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Day One Closing Session
  • DAY TWO
  • Welcome / Introductions
  • Leveling up to prevent cyber extortion: A blueprint for outcome-based cybersecurity investments and more effective public-private partnership model. 9:35 am

    Presented by ActZero

    In today’s evolving threat landscape — which features malicious actors frequently innovating at a pace unmatched by most defenses — companies of all sizes are in the cross hairs. They need more tailored guidance to make higher impact investments to mitigate cyber extortion. So while there’s no shortage of useful cybersecurity frameworks to guide information security and risk management programs — actually implementing them requires expertise and effective risk-based prioritization that most organizations don’t have. Too often, this dynamic leads to confusion, rather than impact. At the same time, the US federal response has been tepid to date with vague commitments around information sharing and marginal improvements in malware signature sharing and vulnerability disclosures, all of which primarily help sophisticated organizations. We need to level up our game. The federal government can provide more meaningful support to the private sector by leveraging its unique analytical capabilities to give organizations tailored control and monitoring guidance, based on higher fidelity threat modeling. This will assist organizations in making higher-impact investments that drive outcomes, and incentivize vendors to benchmark their offerings against federal recommendations to drive more outcome-based evaluations.

    Click to Expand

    Panel Participants:

    Chris Finan
    Chris Finan

    Chris Finan

    Chief Operating Officer (COO)

    Collapse This Item

  • The Need for Building a Universal State Digital Citizen Identity 10:00 am

    Presented by Auth0

    The pandemic accelerated the already growing demand for digital citizen experiences. State and local agencies quickly pivoted from providing citizen services inline to making them available online. When many government officials enabled digital permit applications and access to unemployment insurance – they had to build entire application stacks from the ground up – including login services and identity verification. This led to poor citizen experience, unanticipated costs, long deployment timelines, and increased security risks.

    Today – we’ll look at why State’s digital transformation strategy should include a statewide citizen identity. We will discuss the importance of having a managed identity service to make access management simple & secure for government leaders so they can continue to innovate to provide the right services to their citizens.

    Click to Expand

    Panel Participants:

    Jeet Shah
    Jeet Shah

    Jeet Shah

    Public Sector Identity Architect at Auth0

    Collapse This Item

  • Expert Panel Discussion: Defense-in-Depth 10:20 am

    Defense-in-Depth: New Strategies for 2021

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?  

    Click to Expand

    Panel Participants:

    Zakk Karrazzi
    Zakk Karrazzi

    Zakk Karrazzi

    Chief Security Strategist at Attivo

    Eric Eddy
    Eric Eddy

    Eric Eddy

    Technical Engineer

    Mick Baccio
    Mick Baccio

    Mick Baccio

    Global Security Advisor at Splunk

    Mike Stacy
    Mike Stacy

    Mike Stacy

    Global Cloud and Information Protection Director at Proofpoint

    Collapse This Item

  • Your Ransomware Hostage Rescue Guide 11:25 am

    Presented by KnowBe4

    Ransomware attacks are on the rise and are estimated to cost global organizations $20 billion. As ransomware attacks become more targeted and more damaging, your organization faces increased risk that can leave your networks down for days or even weeks. So, how can your organization avoid getting held hostage?

    Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he looks at concerning features of new ransomware strains, provides actionable info that you need to prevent infections, and gives you tips on what to do when you are hit with ransomware.

    In this webcast we will cover:

    • What new scary ransomware strains are in the wild
    • Am I infected?
    • I’m infected, now what?
    • Proven methods of protecting your organization
    • How to create your human firewall

    Don’t get held hostage by ransomware and become a statistic!

    Click to Expand

    Panel Participants:

    Erich Kron
    Erich Kron

    Erich Kron

    Security Awareness Advocate at KnowBe4

    Collapse This Item

  • Introduction to Risk-Based Vulnerability Management 11:45 am

    Presented by Kenna Security

    Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities. 

    But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first. 

    Join Kenna Security’s CTO and Co-Founder Ed Bellis as he: 

    • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge 
    • Details the findings on how risk-based is the way to get ahead in vulnerability management 
    • Lays out several factors that drive better remediation performance 
    • Provides steps for setting up a successful risk-based vulnerability management program
    Click to Expand

    Panel Participants:

    Ed Bellis
    Ed Bellis

    Ed Bellis

    CTO and Co-Founder at Kenna Security

    Collapse This Item

  • Lunch Break
  • Feature Keynote: Cyber AI Best Practices Learned from startups to the DoD 12:35 pm

    [Fireside Chat] Cyber AI Best Practices Learned from startups to the DoD

    What can you learn about data science to aid cybersecurity with a $1 billion federal budget?  In this fireside chat with Justin Fanelli, he’ll dive into some of the lessons learned as a leader within the Naval Information Warfare Systems Command (formerly SpaWar).  

    In 2020, corporate spend on AI exceeded $50 Billion; over 20% of that was aimed at cyber. That said, one major study cites that only 10% of companies have seen a significant return on their AI investment. Therefore, we must improve our AI and Cyber AI yield. 

    Our keynote interview will focus on what has been learned, and what actions can be taken within the pre-procurement, procurement, and implementation processes for ways to increase the likelihood of improved outcomes or, as is sometimes said within the military, increase the amount of steel on target.

    Click to Expand

    Panel Participants:

    Justin Fanelli
    Justin Fanelli

    Justin Fanelli

    Chief Architect of Defense Medical Intelligence Data and the Technical Director at the Naval Information Warfare Center

    Collapse This Item

  • USSS GIOC Romance Scam Symposium 1:45 pm

    USSS Workshop - Opening Remarks by Stephen Dougherty

    The U.S. Secret Service Global Investigative Operations Center (GIOC) has seen a distinct rise in fraudulent and criminal activity from romance scams and other trust-related social engineering schemes. 

    Over the past four years, the number of reported romance scam incidents has tripled. In 2016, there were approximately 10,000 reported romance scam incidents, in comparison, 2020 saw over 30,000 reported romance scam and related incidents. The financial loss is commensurate as well, $304 Million in loss was reported in 2020, and over the previous 5 years, nearly $1 Billion in loss has been reported. 

    The financial impact is apparent, but romance scams and related socially-engineered trust schemes have deep cutting psychological and emotional impacts on the associated victims including their friends and families. Aside from direct financial loss, romance scam victims often become unwitting cogs in more complex cyber-enabled fraud schemes such as Business Email Compromise. Romance scam victims have even become involved in human trafficking events and drug related crimes. 

    The U.S. Secret Service has adopted a multi-layered approach to combating romance scams and related schemes. An important pillar in this approach is education and awareness. To increase awareness for these schemes, USSS/CID is proposing a joint symposium with other federal law enforcement agencies and private side partners. The symposium would be approximately 120 minutes to 150 minutes with several different presentations from different perspectives. The goal of the symposium is to increase awareness and shed light on the impact that romance scams cause.

    Symposium Agenda
    Opening Remarks :USSS Stephen Dougherty, Financial Fraud Investigator, USSS
    USSS: Real Talk: Romance Scams, impact stories, perspectives, and prevention Stephen Dougherty, Financial Fraud Investigator, USSS
    FBI IC3:  US Cybercrime Reporting (a.k.a. Follow the Money) Donna Gregory, Unit Chief, FBI Cyber Division IC3
    Cybersecurity & The Private Sector: Lessons Learned from Romance Victims Ronnie Tokazowski, Senior Threat Researcher
    Financial Industry:  Schemes and Scams:  An Overview of Romance Scams Ken Elder, VP – Enterprise AML Officer, Lincoln Financial Group
    AARP:  Stop Sending Nudes! Amy Nofziger, Director Fraud Victim Support
    Romance Scam Panel: FBI, Secret Service & Private Sector Leaders Discuss Trends Stephen Dougherty, Ronnie Tokazowski, Ken Elder, Amy Nofziger, and Rachel Yurkovich
    Closing Remarks Stephen Dougherty, Financial Fraud Investigator, USSS
    Click to Expand

    Panel Participants:

    Stephen Dougherty
    Stephen Dougherty

    Stephen Dougherty

    Financial Fraud Investigator, Global Investigative Operations Center

    Ronnie Tokazowski
    Ronnie Tokazowski

    Ronnie Tokazowski

    Ronnie Tokazowski - Senior Threat Researcher, Agari

    Kenneth Elder
    Kenneth Elder

    Kenneth Elder

    Vice President – Enterprise AML Officer - Lincoln Financial Group

    Amy Nofziger
    Amy Nofziger

    Amy Nofziger

    Director Fraud Victim Support with AARP

    Rachel Yurkovich
    Rachel Yurkovich

    Rachel Yurkovich

    Analyst at the FBI Criminal Division, Internet Crime Complaint Center (IC3)

    Donna Gregory
    Donna Gregory

    Donna Gregory

    Unit Chief at FBI Cyber Division, IC3

    Collapse This Item

  • USSS: Real Talk: Romance Scams, impact stories, perspectives, and prevention 2:00 pm

    Presented by: Stephen Dougherty, Financial Fraud Investigator, USSS

    The U.S. Secret Service along with the FBI is hosting an afternoon Romance scam symposium focusing on real stories, different perspectives including a financial sector representative and AARP, education, and a town hall style Q&A panel session.

    Subject matter experts will shed light on the ever growing threat and harm that romance and confidence scams cause. Speakers will give real life examples of how romance scam victims get roped into transnational organized crime by laundering money, being human trafficked, and even drug smuggling. Participants will get a briefing on statistics to get a true picture of the threat and will hear from several industry experts on the schemes they are seeing and how to prevent others from falling victim.

    Click to Expand

    Panel Participants:

    Stephen Dougherty
    Stephen Dougherty

    Stephen Dougherty

    Financial Fraud Investigator, Global Investigative Operations Center

    Collapse This Item

  • FBI IC3: US Cybercrime Reporting (a.k.a. Follow the Money) 2:15 pm

    Presented by: Donna Gregory, Unit Chief, FBI Cyber Division IC3

    Since 2000, the FBI’s Internet Crime Complaint Center (IC3) has received complaints crossing the spectrum of cyber crime matters, to include online fraud in its many forms including Intellectual Property Rights (IPR) matters, Computer Intrusions (hacking), Economic Espionage (Theft of Trade Secrets), Online Extortion, International Money Laundering, Identity Theft, and a growing list of Internet facilitated crimes. 

    In this discussion, Donna Gregory, Unit Chief for the FBI Cyber Division, IC3 will explain more about their mission to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity and to develop effective alliances with law enforcement and industry partners. 

    She will then present some of the data from these analyses, including romance scam statistics, and how these crimes interoperate with other cybercrime activities. Moreover, she will highlight the FBI efforts to tackle both the freezing of fraudulently wired funds and its participation in the Department of Justice’s Elder Fraud Initiative.

    Click to Expand

    Panel Participants:

    Donna Gregory
    Donna Gregory

    Donna Gregory

    Unit Chief at FBI Cyber Division, IC3

    Collapse This Item

  • Cybersecurity & The Private Sector: Lessons Learned from Romance Victims 2:35 pm

    Presented by: Ronnie Tokazowski, Senior Threat Researcher

    In this presentation, Ronnie Tokazowski (Sr. Threat Researcher at Agari) will give a deep dive into how romance scams work from both the actor and victim perspective. In addition, Ronnie will provide tips and uncomfortable tales from the trenches based on real events and victims.

    Click to Expand

    Panel Participants:

    Ronnie Tokazowski
    Ronnie Tokazowski

    Ronnie Tokazowski

    Ronnie Tokazowski - Senior Threat Researcher, Agari

    Collapse This Item

  • Financial Industry: Schemes and Scams: An Overview of Romance Scams 3:20 pm

    Presented by: Kenneth Elder, VP - Enterprise AML Officer, Lincoln Financial Group

    Transnational romance scams are a particularly egregious form of financial exploitation. Based on his work within LFG, and extensive research, Mr. Elder will further explain techniques fraudsters use to obtain a target’s personal information and their efforts to use that information for illicit purposes. A seasoned professional of the financial services industry, his presentation will talk more about the current schemes, federal and state efforts to combat these issues, and steps individuals can take to protect themselves. 

    Supported by case studies and analysis, Ken exposes the scams used to access and deplete financial accounts, and why they are on the rise, both in terms of their variety and the depths to which the scammers will go to further their personal financial gain. 

    Click to Expand

    Panel Participants:

    Kenneth Elder
    Kenneth Elder

    Kenneth Elder

    Vice President – Enterprise AML Officer - Lincoln Financial Group

    Collapse This Item

  • AARP: Stop Sending Nudes! 3:40 pm

    Presented by: Amy Nofziger, Director Fraud Victim Support

    In 2020, reported losses to romance scams reached a record $304 million and most people don’t think it will ever happen to them or someone they know. But with millions of victims a year, it’s likely happening to someone in your life.

    Each year thousands of romance scam victims and their families reach out to AARP’s Fraud Watch Network Helpline for information and support. Learn about trends from callers to the Helpline, persuasion tactics used to lure in victims, use blackmail and extortion strategies and common methods of contact and what to expect from the romance scams of tomorrow. 

    Click to Expand

    Panel Participants:

    Amy Nofziger
    Amy Nofziger

    Amy Nofziger

    Director Fraud Victim Support with AARP

    Collapse This Item

  • Romance Scam Panel: FBI, Secret Service & Private Sector Leaders Discuss Trends 4:00 pm

    Presented by: Stephen Dougherty, Ronnie Tokazowski, Ken Elder, Amy Nofziger, and Rachel Yurkovich

    Panel Participants:

    Stephen Dougherty
    Stephen Dougherty

    Stephen Dougherty

    Financial Fraud Investigator, Global Investigative Operations Center

    Ronnie Tokazowski
    Ronnie Tokazowski

    Ronnie Tokazowski

    Ronnie Tokazowski - Senior Threat Researcher, Agari

    Kenneth Elder
    Kenneth Elder

    Kenneth Elder

    Vice President – Enterprise AML Officer - Lincoln Financial Group

    Amy Nofziger
    Amy Nofziger

    Amy Nofziger

    Director Fraud Victim Support with AARP

    Rachel Yurkovich
    Rachel Yurkovich

    Rachel Yurkovich

    Analyst at the FBI Criminal Division, Internet Crime Complaint Center (IC3)

    Collapse This Item

  • Closing Remarks 4:40 pm

    Presented by: USSS GIOC Team, Stephen Dougherty, Financial Fraud Investigator, USSS

    Panel Participants:

    Stephen Dougherty
    Stephen Dougherty

    Stephen Dougherty

    Financial Fraud Investigator, Global Investigative Operations Center

    Collapse This Item

  • Summit Final Closing Session
Partners