EMERGING TECHNOLOGY BENEFITS AND CHALLENGES: Strengthen Your Core - Internal Cyber Risk Strategies
Cyber threats are evolving—and so are regulatory expectations. In this session, a panel of experts shares practical strategies for reducing cybersecurity risk across mortgage operations. Learn how to strengthen your defenses with tools and frameworks like Zero Trust Architecture, Privileged Access Management, and comprehensive risk assessments to limit internal access and prevent data breaches.
Speakers
Speakers
Tom Clerici currently serves as the Executive Vice President and Chief Information Security Officer at Freedom Mortgage Corporation. In this role, he oversees the management of cybersecurity risks and leads the enterprise information security program. He is responsible for securing a $700B servicing portfolio with over 2.5M borrowers, as well as a loan origination platform capable of generating over $100B annually.

Michael Egan has focused on cyber/data/privacy issues in the areas of technology, innovation, retail and consumer solutions, life sciences, manufacturing, financial services, and healthcare since 2007. He advises clients on all legal aspects of global privacy and data protection, data security, data breach, information technology, and related restrictions on data collection and transfer. Egan has represented companies before numerous government agencies and bodies, including the US Federal Trade Commission, the US Department of Justice, and the US Securities and Exchange Commission, as well as data protection authorities around the world, regarding disclosure of data security compliance issues, internal investigation findings, remediation measures and settlement terms. Egan’s practice focuses primarily on the ever-changing privacy and security regulatory landscape faced by companies in the US and globally. He also advises companies on how best to address the requirements related to personal data, consumer protection, data security and breach preparation and response, cookies and marketing, cross-border data flows, e-monitoring, eDiscovery procedures, outsourcing, social media, and other privacy-related issues.