The Future of Security, Melbourne is FST’s dedicated security forum for Victoria, exploring the most pressing issues of cybersecurity, resilience and diligence in the financial services industry.
Join us at Melbourne’s Marvel Stadium on Tuesday, 30 August as we help you navigate the key post-pandemic trends coming up in 2022, including digital transformation accelerating cyber-attacks, data security concerns with the next phase of Open Banking, and partnering with key stakeholders and financial regulators to shape security practices.
Event Snapshot:
Going into 2022, cyber-attacks remain the most difficult threat and risk in the financial services industry despite significant advances by the sector to boost cyber defence, vigilance and resilience. Cybercriminals are still one step ahead of the game, increasing the precision, sophistication and intensity of their malicious attacks along with the take-up of digital products and services providing ample opportunity for cybercrime.
Facing continuous surges in cyber threats, especially in 2021, the financial services industry recorded the second-highest number of data breaches across all sectors, leaving leaders trapped in an unending battle for control against criminal hackers. Not only are network breaches and data loss on the line, but security teams have the ultimate duty to protect customer privacy and secure the prime assets of institutions.
Featured Topics:
- Endpoint security
- Open Banking and data security
- Digital identity and access management
- Threat intelligence and management
- Breach detection and prevention
- Mobility and device security
- Cloud security
- Data protection and information governance
- Cybersecurity and resilience
- DevSecOps
- SOC innovations
- Historic lessons for cyber safety
- Building a coalition of the willing
- Controlling the controllables
- Cyber leadeship priorities that matter
Financial Services has never been more dependent on data, at risk of cyberattack or under the regulatory compliance microscope as it is today. At the same time, digital transformation initiatives are reliant on DevOps for delivering innovation solutions to business problems and opportunities at high speed. Consequently for FSIs, there is a need to shift-left and embed data security into their development pipelines.
- What does shifting left for data security looks like?
- How shifting left doesn't necessarily mean compromised security or compliance, or increased business risk.
- How organisations have embraced shifting left to reduce costs and time to value.
- Understanding your board and how to communicate risk
- The sharp eye regulators have on Boards
- Cyber war stories and examples of the good, the bad and the ugly
- How to effectively protect end users in today’s challenging environment.
- Which strategies best protect your users
- Why isolation needs to be part of the strategy.
The State of Security in 2022 and Beyond
- Building digital trust in a hyper-connected service economy
- How are emerging technologies reshaping cyber security risks and controls?
- Taking a proactive approach to strengthen enterprise cyber defences
- How has the cyber security risk landscape evolved in 2022, and how will it continue to evolve?
Sponsored by Rapid7
- Anyone in your organization can be a target for cyberattacks
- what is the cost of cybersecurity and the impact of not having safeguards in place
- Where a 'digital twin' can potentially benefit businesses when determining the business impact of a cyber-incident.
- What tricks are your employees falling for, and how do bad actors exploit them?
- How we can fix the talent issue by training more people and increasing skilled migration
- What is the impact on my organisation?
Join Netskope for a fireside chat with IOOF as they share:
· The approach they took to start their digital transformation
· Lessons they learn along the way
· Where they are heading next
Streams Start
Stream A | ||
---|---|---|
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
Stream B | ||
---|---|---|
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|