speaker-info

James Dean

President & CEO of TrueCourse Advisory

President & CEO

Jim brings 30 years’ experience in providing hands on leadership of Business, IT and Cybersecurity strategy to the Financial Services and Maritime industries. His experience includes IT and Consulting Management at leading FinTech companies, and international consulting firms – including KPMG and BearingPoint. He also has been awarded CISSP and AML/CA certifications. The TrueCourse team also provides Cybersecurity policy, strategy and management advisory services to the Maritime, Shipping & Port operations.

He has had co-chaired a payment industry Law Enforcement Alliance Program. In this capacity, he worked closely with the National Cyber & Forensic Training Alliance (NCFTA), FBI and USSS regarding cybersecurity and fraud. Part of the responsibilities in this role have been to lead the development of fraud and cybercrime scenarios and related cyber security best practices. He has participated in leading the development of data reporting standards for suspicious financial activities.

Jim has served on the Federal Reserve Board’s Secure Payments Task Force and is an advisor to the Intelligence Community through the private sector program of the ODNI, managed by the DHS, and an expert Cybersecurity advisor to the Maritime Port and Shipping Information Sharing & Analysis Organization. In addition, he served as Co-chair of Programs committee of SE chapter of Business Executives for National Security (BENS).

In other security related activities, he has led NIST/ISO 27000 IS/ PCI DSS security standards reviews for major corporations and conducted security reviews for M&A and VC/Corporate investment due diligence projects.

Jim is a frequent industry speaker and has presented at NCFTA Cyfin, Money 2020 US & Europe, BofA Fraud Forum, RSA eFraud Forum, FBI Cyber Summit and NYDA Cyber Summit.

My Sessions

Cyber criminals know how to profit, too

Panel Room A

It’s not only talented entrepreneurs who are drawn to fast growing industries–so are cybercriminals. What are the unique vulnerabilities and considerations? What are the emerging best practices, technologies and processes?

Growing the Business
READ MORE