- How the Cyber Landscape is rapidly evolving
- Navigating the rise of ransomware threats and the security posture for critical infrastructure providers
- Strategies to optimise enterprise defences and examine Australian Government changes legislation around critical infrastructure
Secure identity management has evolved to support how customers engage with financial institutions, and how institutions leverage applications and data internally and through their partner ecosystem to drive new business. How do core identity-driven functions enable federated, policy-based access and data privacy? This session will align key IAM and security functions across organizations, customers, and external partners to the core principles of Open Banking. Attendees will learn:
- Open Banking opportunity and breadth of identity controls
- What is strong customer authentication and why it is important
- Where fine grain authorisation can be applied in the customer and partner journey
- How has the cyber security risk landscape evolved in 2021?
- How are emerging tools, technologies and techniques helping to protect organisations?
- How can financial services institutions ensure they're building a culture of awareness? e
- How will the threat landscape evolve in 2022?
In today's hyper-distributed world, where risk factors are spread over physical and cyber realms, every connection and access point creates an opportunity for adversaries. This new reality requires a new approach to enterprise security -- one that is centered around intelligence. Equipped with timely, accurate and actionable intelligence, defenders are empowered to act at the speed of the adversary to mitigate risk. This presentation will provide a roadmap for building an intelligence-led security program that enables proactive and persistent risk mitigation.
- What security leaders aren’t paying attention to, and what priorities to focus on
- Upholding a culture of transparency and accountability in managing cyber risks security operations
- Choosing the most fit-for-purpose security governance model
- Avoiding technical debt caused by having a cybersecurity mesh
- Exploring how industry experts are recommending frameworks be used
- How to simplify security programs and integrate security strategies
- How can enterprises maintain security posture while rethinking architecture design?
- How can organisations address potential threats introduced by new deployment options, from public cloud, to highly containerised applications and API only endpoint?
- What strategies are global organisations using to increase their visibility of security threats to web applications?
- BNP Paribas’ journey to build and maintain operational resilience
- Trends and developments in the European cyber security environment
- Case studies to build resilience, combining cyber capabilities, third party risk management and anti-fraud controls
- Snapshot of the threat landscape over the past year
- How has infrastructure changed?
- Defence in depth – threat reduction strategies to reducing exposure
- Defining what XDR means for your organisation
- How to create your own XDR strategy
- Why network data is an essential building block for any XDR ecosystem
IT professionals around the world have some thorough and detailed frameworks and guidelines to use when it comes to developing a robust information security strategy, but there is one thing missing – the human element.
The cyber threat landscape is out of control across the globe and organisations can’t seem to get ahead of the curve.
Cyber attacks are increasing as cybercriminals are becoming more and more sophisticated and their methods are quite frankly abhorrent.
They continue to target our human vulnerabilities and leave a trail of destruction in their wake without a care in the world.
Today, we are looking at the human operating system and what you can do to attract its attention, raise curiosity, get buy-in and have yourself a powerful culture of (cyber)security in your organisation.
Discussion points:
- Important Definitions and why they matter
- IT doesn't impact culture, or does it?
- Real-world situational examples
- Key elements required
- Lessons from 2020 - the need for a different approach to securing network access
- Making the zero trust framework relatable
- Incorporating Zero Trust and SASE into your security strategy
- Pitfalls of some common application security measurements
- How to correlate multiple data points together to give better insights and make more informed decisions
- Track trends over time to see continual improvement
Gain early access to the research behind Nicki’s upcoming journal article as she shares how various organisations cultures have responded to significant cyber events. How often do the C-Suite react in a positive way and create culture change? Or do heads roll as part of the fallout and reports get buried so everyone can back to business as usual?
Nicki will share real life examples gained from research and numerous interviews with CEO’s and CISO’s from different industries and organisations across the world.
- Exploring asset identification and classification principles
- Enabling rapid risk identification to pre-empt and prevent breaches
- Reducing risk by understanding the metrics that matter
As the organisations, economic system and way of life strives to adapt to the newer demands caused by the global pandemic, join this keynote to hear about how the Risk Reporting can and needs to be more dynamic and prioritise pace, to better manage risks from an enterprise-wide perspective.
The Financial Services Industry is one of the most targeted verticals across the globe, seeing a mix of nation state and e-crime intrusions on a recurring basis. This session explores the state of the FSI threat landscape, discussing attacks across the globe while narrowing the aperture to highlight unique attacks occurring in our very own APJ backyard. Attendees can expect to gain insight into the threats the industry faces and some concepts for having awareness and visibility into threat adversary activity.
- Emerging challenges for financial firms in a fast-evolving digital landscape
- Keeping pace from a security perspective with DevSecOps and full-stack process automation
- BBVA’s approach to security innovation, focused on OpenSource projects with other financial institutions