Visionary Keynote: The Past, Present, and Future of Cybersecurity

 

Amid the emergence of remote and hybrid work, organizations everywhere are facing an entirely new cybersecurity landscape. On top of that, a number of future developments - including conflict with Russia, an increase in ransomware, and a more complex regulatory environment - only threaten to make security more challenging moving forward. At times like these, it’s helpful to take stock of the situation and assess where you’re vulnerable. In this keynote address, Rachel Wilson, Managing Director and Head of Data Security at Morgan Stanley Wealth Management, will discuss how the world of cyberthreats has evolved over the last five years, and what your business needs to do to stay safe.

Rachel Wilson

Speaker: Rachel Wilson

Position: Managing Director and Head of Data Security, Morgan Stanley Wealth Management

Background: Rachel Wilson is the Managing Director and Head of Data Security for Morgan Stanley Wealth Management. She is responsible for protecting the cybersecurity of Wealth Management systems and the integrity and confidentiality of Firm and client data. Additionally, Rachel advises the leadership of Wealth Management on numerous cybersecurity issues, leads field and client education on cyber risk and mitigations, and drives innovation for new cybersecurity and authentication technology.


Rachel was recognized by Morgan Stanley Wealth Management as part of the 2019 MAKERS Class, a program that honors women who serve as groundbreakers, innovators and advocates. She was also named one of the Top Women in WealthTech 2020 by ThinkAdvisor.


Prior to joining the Firm in 2017, Rachel spent 15 years at the National Security Agency (NSA), where she held several key senior executive-level leadership positions. As part of her tenure, Rachel spent nearly five years leading NSA’s cyber exploitation operations as the Deputy and then Chief of the Remote Operations Center within NSA’s Tailored Access Operations. In this capacity, she led the planning and execution of thousands of cyber exploitation operations against a wide array of foreign intelligence, military, and cyber targets, and served as the committing official for many of NSA’s highest risk and most important intelligence gathering activities.