
Catalin Cosma
Cyber Regulatory Lead (Director), UBS
3:55 pm - 4:45 pm
COMPLIANCE VS COST – PANEL DISCUSSION
Balancing regulatory expectations with business reality
- Understanding how enforcement severity and penalties influence compliance priorities
- Evaluating trade-offs between risk mitigation, revenue and operational efficiency
- Developing frameworks to allocate TPRM resources based on risk and cost impact
- Communicating rationale and decisions to management, regulators, and stakeholders
10:55 am - 11:45 am
CYBERSECURITY & AI-EXPANDED ATTACK SURFACES ACROSS THE THIRD-PARTY ECOSYSTEM – PANEL DISCUSSION
Increased cyber risk in a cloud-connected, AI-enabled landscape
- Understanding how cloud connectivity, API integrations and AI-enabled workflows are expanding third and Nth-party attack surfaces
- Examining how AI adoption by vendors introduces new cyber, data integrity and operational resilience risks
- Exploring professionalisation of threat actors and increasingly sophisticated attack methods
- Understanding failures caused by patching, software updates and configuration changes at 3rd and 4th parties
3:55 pm - 4:45 pm
COMPLIANCE VS COST – PANEL DISCUSSION
Balancing regulatory expectations with business reality
- Understanding how enforcement severity and penalties influence compliance priorities
- Evaluating trade-offs between risk mitigation, revenue and operational efficiency
- Developing frameworks to allocate TPRM resources based on risk and cost impact
- Communicating rationale and decisions to management, regulators, and stakeholders
11:30 am - 12:20 pm
CYBERSECURITY & AI-EXPANDED ATTACK SURFACES ACROSS THE THIRD-PARTY ECOSYSTEM – PANEL DISCUSSION
Increased cyber risk in a cloud-connected, AI-enabled landscape
- Understanding how cloud connectivity, API integrations and AI-enabled workflows are expanding third and Nth-party attack surfaces
- Examining how AI adoption by vendors introduces new cyber, data integrity and operational resilience risks
- Exploring professionalisation of threat actors and increasingly sophisticated attack methods
- Understanding failures caused by patching, software updates and configuration changes at 3rd and 4th parties
