Secure identity management has evolved to support how customers engage with financial institutions, and how institutions leverage applications and data internally and through their partner ecosystem to drive new business. How do core identity-driven functions enable federated, policy-based access and data privacy? This session will align key IAM and security functions across organizations, customers, and external partners to the core principles of Open Banking. Attendees will learn:
- Open Banking opportunity and breadth of identity controls
- What is strong customer authentication and why it is important
- Where fine grain authorisation can be applied in the customer and partner journey
- Building digital trust in a hyper-connected service economy
- How are emerging technologies reshaping cyber security risks and controls?
- Taking a proactive approach to strengthen enterprise cyber defences
- Communicating risk effectively in an increasingly dynamic threat environment
- Avoiding technical debt caused by having a cybersecurity mesh
- Exploring how industry experts are recommending frameworks be used
- How to simplify security programs and integrate security strategies
- What security leaders aren’t paying attention to, and what priorities to focus on
- Upholding a culture of transparency and accountability in managing cyber risks
- Choosing the most fit-for-purpose security governance model
In today's hyper-distributed world, where risk factors are spread over physical and cyber realms, every connection and access point creates an opportunity for adversaries. This new reality requires a new approach to enterprise security -- one that is centered around intelligence. Equipped with timely, accurate and actionable intelligence, defenders are empowered to act at the speed of the adversary to mitigate risk. This presentation will provide a roadmap for building an intelligence-led security program that enables proactive and persistent risk mitigation.
Gain early access to the research behind Nicki’s upcoming journal article as she shares how various organisations cultures have responded to significant cyber events. How often do the C-Suite react in a positive way and create culture change? Or do heads roll as part of the fallout and reports get buried so everyone can back to business as usual?
Nicki will share real life examples gained from research and numerous interviews with CEO’s and CISO’s from different industries and organisations across the world.
- How can enterprises maintain security posture while rethinking architecture design?
- How can organisations address potential threats introduced by new deployment options, from public cloud, to highly containerised applications and API only endpoint?
- What strategies are global organisations using to increase their visibility of security threats to web applications?
- How do you separate the hype from the fact when looking at Zero Trust?
- The evolution of authentication practices as identity becomes the new security perimeter
- Using Zero Trust reduce attack surfaces
- The problem with passwords
- Why Passwordless?
- Passwordless in action
- BNP Paribas’ journey to build and maintain operational resilience
- Trends and developments in the European cyber security environment
- Case studies to build resilience, combining cyber capabilities, third party risk management and anti-fraud controls
- Snapshot of the threat landscape over the past year
- How has infrastructure changed?
- Defence in depth – threat reduction strategies to reducing exposure
- Human considerations for insider and conduct risk for predominantly remote employees.
- Securing and supervising application and data access in a reduced visibility environment.
- Combining and incorporating zero trust concepts with activity monitoring for risk mitigation.
- Hear from Dan Woods, Global Head of Intelligence at F5 and former FBI agent and CIA cyber operations officer
- Gain specific insights into the anatomy of credential stuffing attacks
- Learn how attackers defeat MFA used by major Australian BFSI institutions and discuss alternative strategies
- Lessons from 2020 - the need for a different approach to securing network access
- Making the zero trust framework relatable
- Incorporating Zero Trust and SASE into your security strategy
• Pitfalls of some common application security measurements • How to correlate multiple data points together to give better insights and make more informed decisions • Track trends over time to see continual improvement
- Defining what XDR means for your organisation
- How to create your own XDR strategy
- Why network data is an essential building block for any XDR ecosystem
- How the Cyber Landscape is rapidly evolving
- Navigating the rise of ransomware threats and the security posture for critical infrastructure providers
- Strategies to optimise enterprise defences and examine Australian Government changes legislation around critical infrastructure
- Exploring asset identification and classification principles
- Enabling rapid risk identification to pre-empt and prevent breaches
- Reducing risk by understanding the metrics that matter
- Recent accelerated adoption and transformation to the cloud with multi and hybrid continuing to be the future
- Challenges with security in a hybrid and multi cloud world, a lack of visibility and confidence
- Reframing the question of "how are my clouds configured" to "how is my cloud actually being used compared to how I said it should be used"?
As the organisations, economic system and way of life strives to adapt to the newer demands caused by the global pandemic, join this keynote to hear about how the Risk Reporting can and needs to be more dynamic and prioritise pace, to better manage risks from an enterprise-wide perspective.