Catalin Cosma

Catalin Cosma

Cyber Regulatory Lead (Director), UBS

3:55 pm - 4:45 pm

COMPLIANCE VS COST – PANEL DISCUSSION

Balancing regulatory expectations with business reality

  • Understanding how enforcement severity and penalties influence compliance priorities
  • Evaluating trade-offs between risk mitigation, revenue and operational efficiency
  • Developing frameworks to allocate TPRM resources based on risk and cost impact
  • Communicating rationale and decisions to management, regulators, and stakeholders

10:55 am - 11:45 am

CYBERSECURITY & AI-EXPANDED ATTACK SURFACES ACROSS THE THIRD-PARTY ECOSYSTEM – PANEL DISCUSSION

Increased cyber risk in a cloud-connected, AI-enabled landscape

  • Understanding how cloud connectivity, API integrations and AI-enabled workflows are expanding third and Nth-party attack surfaces
  • Examining how AI adoption by vendors introduces new cyber, data integrity and operational resilience risks
  • Exploring professionalisation of threat actors and increasingly sophisticated attack methods
  • Understanding failures caused by patching, software updates and configuration changes at 3rd and 4th parties

3:55 pm - 4:45 pm

COMPLIANCE VS COST – PANEL DISCUSSION

Balancing regulatory expectations with business reality

  • Understanding how enforcement severity and penalties influence compliance priorities
  • Evaluating trade-offs between risk mitigation, revenue and operational efficiency
  • Developing frameworks to allocate TPRM resources based on risk and cost impact
  • Communicating rationale and decisions to management, regulators, and stakeholders

11:30 am - 12:20 pm

CYBERSECURITY & AI-EXPANDED ATTACK SURFACES ACROSS THE THIRD-PARTY ECOSYSTEM – PANEL DISCUSSION

Increased cyber risk in a cloud-connected, AI-enabled landscape

  • Understanding how cloud connectivity, API integrations and AI-enabled workflows are expanding third and Nth-party attack surfaces
  • Examining how AI adoption by vendors introduces new cyber, data integrity and operational resilience risks
  • Exploring professionalisation of threat actors and increasingly sophisticated attack methods
  • Understanding failures caused by patching, software updates and configuration changes at 3rd and 4th parties