+INTERACTIVE RANSOMWARE ATTACK DRILL
Topics covered include:
While you wait for the Forum, check out the newly updated cybersecurity resource site – which shares industry insight to support the cybersecurity efforts for your business, employees, and account holders.
Allen directs the Product Management, Research and Design and IT Regulatory Compliance groups for Gladiator, a division of Jack Henry and Associates. His team of IT security, fraud detection, development, business continuity planning and regulatory compliance experts provide industry leading solutions for financial institutions throughout the United States.
Sebastian is responsible for the business development of the Gladiator and Financial Crimes Solutions. His teams empower financial institutions to mitigate cybersecurity risk, increase their operational efficiencies, control IT expenditures, and ultimately protect their reputations.
Tom Williams is the Business Continuity/Cyber Security Strategy Manager for the Gladiator Division of Jack Henry of Jack Henry & Associates, Inc. (JHA). Tom’s responsibility includes educating and assisting clients in selecting the proper strategies and solutions for dealing with unplanned outages and cyber-attacks.
Viviana provides subject matter expertise and sales support for Gladiator’s CoreDEFENSE and IT Regulatory Compliance/Policy Products. She is responsible for bringing education on security and regulatory compliance-oriented products and services to financial institutions throughout the nation. With 20 years of experience in information security and the financial services industry, Viviana has extensive knowledge of IT regulatory compliance. She has delivered information security awareness and training to audiences ranging from banking employees and technicians to management and boards of directors.
Yonesy is the Chief Information Security Officer of Jack Henry & Associates (Jack Henry). In this role, he is responsible for ensuring effective business and information security alignment. Together with his team, he promotes and inculcates innovative information security risk management with the aim to protect the company’s data, client information, and associated assets.