10th Annual

Future of Security, Sydney 2024

20 August 2024 8:00 am - 5:30 pm

Dockside
  • Days
    Hours
    Mins
    Secs
Spots Filling Fast!

Complimentary for FSI Executives

FST Media is excited to announce the return of our premier conference, The Future of Security, Sydney. This year’s event will showcase a series of robust keynote sessions and panel discussions throughout a dynamic, action-packed day. Attendees are invited to engage in “Mastermind” roundtable discussions, providing unparalleled opportunities for high-level dialogue with industry experts.

For exclusive insights into the future of cyber security within financial services, join us on August 20th at Dockside, Darling Harbour. Last year, we kicked off with an opening keynote by Richard Johnson, Westpac Group’s Chief Information Security Officer, who enlightened our audience of over 200 Cyber Security, IT, Data, Risk, and Compliance executives about the top three technologies reshaping the security landscape. TAL’s CISO offered valuable insights on crafting outcome-focused cyber security strategies, and Alex Hope, known as Australia’s Only Hacker, concluded the day with his experiences, including the time he hacked former Prime Minister Tony Abbott.

The Future of Security, Sydney 2024, will delve into the CISOs’ agenda for 2024 and beyond with in-depth keynote sessions and interactive panel discussions. Industry experts will outline the key upcoming trends – The AI Revolution, adapting to Quantum Technology developments, and collaborating with regulators to forge advanced security practices.

The over-arching theme of the conference will be: Returning to the Fundamentals to Achieve Cyber-Resilience  

The following sub-themes will underscore the content on the day:

  • Ensuring a sophisticated security posture and mitigating technical debt when undergoing a digital transformation.  
  • Assessing the evolving threat landscape – MFA technical developments, cloud security, IAM and AI-powered malicious actors.  
  • Responding to the latest regulatory requirements – APRA’S CPS230, treating compliance as a ‘tick-the-box’ exercise and responding to more stringent regulation.  
  • The future of cyber invulnerability – ‘security-by-design’ software development, preparing for the criminal exploitation of Quantum technology and mitigating API exposure risk. 
Chief Information Security Officer
Tyro Payments
Global Head Cyber, Technology and Data Risk
Macquarie Group
Head of Cyber Advisory and Application Security
Tyro Payments
Master of Ceremonies
(MC)

Stay tuned for further speaker announcements...

  • Applying history to the present: The emergence of the cyber discipline, the ramifications of the 1971 ‘Creeper’ program and the ways cyber warfare has evolved. 

  • Introducing artificial intelligence to software development: new opportunities for criminal exploitation, the automation of cyber-attacks, evading defense layers and scaling malicious activity.  

  • When Quantum and AI merge: accelerating the deployment of high-quality phishing campaigns, performing data mining exercises within microseconds and relinquishing privileged information through sophisticated ‘deepfake’ technologies.

  • Adopt the language of ‘risk’ to communicate the necessity of increased investment in 3rd party risk management, 24/7 monitoring and incident response systems.  
  • Remedy traditionally antagonistic relationships between cyber and the wider business: become a supporter of IT innovation and an enabler of critical business imperatives.  
  • Collaborating with your data and IT team for cyber invulnerability: embedding ‘security by design’ as a core principle during software development.

 

  • During economic downturns, it's crucial to shift your focus to tech stack consolidation and the ongoing enhancement of baseline controls, such as patch and vulnerability testing.
  • Strengthening your core controls while bracing for challenging times: conduct a comprehensive enhancement of controls and confirm that your guardrails align with your risk tolerance.
  • Ensuring operability within the boundaries of compliance: approaching security as a fundamental practice to satisfy basic regulatory demands and avoid blindly following the latest industry fads.
  • Embarking on a comprehensive enhancement of controls to support the Government's newly announced Six Cyber Shields strategy and collaborating with the state to transform Australia into a leading nation in cyber security.
  • In preparation for APRA's CPS230, it is crucial to ensure that baseline controls are established, the use of multi-factor authentication is increased, and there is a heightened focus on managing third-party risks.
  • Assessing the daily impact of oncoming regulation on your department: the consolidation of endpoints, updating end-of-life controls for existing software, and alleviating workforce pressures.
  • Understanding the post-AI recruitment landscape
  • Acquiring talent through hiring for qualities like creativity and problem-solving
  • Utilising novel strategies to protect your future data
  • Maintaining compliance with upcoming regulations while also achieving operational excellence and driving business outcomes is crucial. It involves ensuring that Australia's financial services industry aligns with international standards and finding ways to respond to increased regulatory demands from APRA and ASIC.
  • Exploring technical advancements in methodologies such as Multi-Factor Authentication, Identity Access Management, and the use of geo-proximity data for password-less access to devices.
  • Supporting critical business operations by consistently adhering to the principles of People, Processes, and Technology (PPT), enhancing end-to-end processes, implementing appropriate controls, and fostering innovation within the IT team.
  • The crux of AI's practicality hinges on the critical need to develop an AI strategy from the outset and steering clear of implementing AI simply for the sake of it.
  • Employing AI in security: Tackle the expanding cyber skills shortage by automating mundane tasks, thus allowing your team to redistribute resources more efficiently and focus on the strategic direction of the department.
  • Preparing for the criminal exploitation of AI: Anticipating an increase in attack vectors, the automation of cyber-attacks, and respond by automating layers of data protection and defense.
  • Mastering AI Governance to Minimize Risk: Revise current corporate procedures and policies to integrate AI effectively.

Preventative Strategies: Acknowledging the inevitability of cyber incidents and ensuring that routine security measures satisfy fundamental standards.
Proactive Strategies: Investigating how cyber experts are constructing frameworks to actively address the threat environment and enhance cyber and IT teams through automation.
Integration of Both: Comprehending the necessity of managing residual risks and considering cyber security as an all-encompassing task, steered by executive leadership.

For event and marketing enquiries:
Jessica Cozanitis
Marketing Executive
T: +61 401 422 928
For sponsorship enquiries:
Marcus Sedman
Senior Account Director
T: +61 402 147 500
To participate as a speaker:
Stella Spackman
Senior Conference Producer
T: +61 433 732 794
Register

Please note that delegate attendance is complimentary for the financial services industry only.

Paid tickets are available for service providers to the industry (e.g., solution providers to the banking, insurance & wealth management industry) at the discretion of FST Media. For more information on vendor fees, please contact fsisales@fst.net.au or +61 2 8484 0918.

FST Media reserves the right to decline registration and entry to the event.

By agreeing to the Terms and Conditions for complimentary VIP Registration, you acknowledge that to qualify for that complimentary VIP pass the delegate needs to be currently employed by a Financial Services organisation.

Should you be unable to attend on the day of the conference, a ‘like-for-like’ substitute is welcome to attend in your stead at no extra charge, provided we are informed of the change up to 14 days prior to the conference. Any cancellations made within 14 days of the conference, with no relevant substitute provided, will incur a $150+ GST non-attendance fee. This fee will be used to cover delegate material costs and catering costs incurred by FST Media on submission of delegate numbers to the conference venue.

FST Media will make every effort to ensure that the event and the program will take place as advised. FST Media reserves the right to delete or alter items in the program and will not take financial responsibility for changes that are the result of events beyond its control, including travel and/or accommodation.

FST Media Terms & Conditions and Privacy Policy

By registering for this event you are agreeing to our privacy policy, you consent to the following:

  • The use of your personal information for the purposes of providing direct marketing material to you; and
  • The disclosure of your personal information to our event partners
  • Clause 3 of our Privacy Policy contains further information regarding how we may use your information to provide direct marketing material to you, and how you may opt out of any further material