Future of Security, Melbourne 2022

30 August 2022

Marvel Stadium

The Future of Security, Melbourne is FST’s dedicated security forum for Victoria, exploring the most pressing issues of cybersecurity, resilience and diligence in the financial services industry.

  • Days
    Hours
    Mins
    Secs

Complimentary for FSI Executives

The Future of Security, Melbourne is FST’s dedicated security forum for Victoria, exploring the most pressing issues of cybersecurity, resilience and diligence in the financial services industry.

Join us at Melbourne’s Marvel Stadium on Tuesday, 30 August as we help you navigate the key post-pandemic trends coming up in 2022, including digital transformation accelerating cyber-attacks, data security concerns with the next phase of Open Banking, and partnering with key stakeholders and financial regulators to shape security practices.

Event Snapshot:

Going into 2022, cyber-attacks remain the most difficult threat and risk in the financial services industry despite significant advances by the sector to boost cyber defence, vigilance and resilience. Cybercriminals are still one step ahead of the game, increasing the precision, sophistication and intensity of their malicious attacks along with the take-up of digital products and services providing ample opportunity for cybercrime.

Facing continuous surges in cyber threats, especially in 2021, the financial services industry recorded the second-highest number of data breaches across all sectors, leaving leaders trapped in an unending battle for control against criminal hackers. Not only are network breaches and data loss on the line, but security teams have the ultimate duty to protect customer privacy and secure the prime assets of institutions.

Featured Topics:

  • Endpoint security
  • Open Banking and data security
  • Digital identity and access management
  • Threat intelligence and management
  • Breach detection and prevention
  • Mobility and device security
  • Cloud security
  • Data protection and information governance
  • Cybersecurity and resilience
  • DevSecOps
  • SOC innovations
Event Information
30 August 2022 9:00 am - 5:00 pm
Group Chief Information Security Risk Officer
Standard Chartered
CISO & Head of Technology Operational Risk & Compliance
Kiwibank
CISO
Medibank
Strategic Security Advisor, Non-Executive Board Member
Youi
Global Head of Technology, Cyber & Data Risk
Macquarie Group
Head of Cyber Transformation and IAM
TAL
CISO
Hollard Insurance
fmr. Regional CISO, Board Member, Author
Standard Chartered (🇸🇬)
Chair - Cloud
AISA
Director & GM of BT Security, APJ & MEA
BT
Deputy Branch Chair (Cloud)
AISA
Senior Manager - Cyber Culture, 3rd Party Assurance & Testing Services
Insignia Financial (IOOF)
Founder and Head of Journalism
KBI.Media
Master of Ceremonies
(MC)
Chief Technology Officer APJ
Rapid7
VP, Enterprise Security Solutions
HP
ANZ Director
Thales
Director of Product Marketing
Silverfort
CISO
Fortinet Australia
Principal Security Specialist, ANZ
Elastic
Global CTO
Securonix
Senior Director, Cybersecurity Strategy
Menlo Security
Regional Director
Netskope
CTO - ANZ
Palo Alto Networks
Sales Engineer - Application Delivery & Security
Citrix
Security Architect
Vectra AI
  • Historic lessons for cyber safety 
  • Building a coalition of the willing
  • Controlling the controllables
  • Cyber leadeship priorities that matter

Financial Services has never been more dependent on data, at risk of cyberattack or under the regulatory compliance microscope as it is today. At the same time, digital transformation initiatives are reliant on DevOps for delivering innovation solutions to business problems and opportunities at high speed. Consequently for FSIs, there is a need to shift-left and embed data security into their development pipelines.

  • What does shifting left for data security looks like?
  • How shifting left doesn't necessarily mean compromised security or compliance, or increased business risk.
  • How organisations have embraced shifting left to reduce costs and time to value.
  • Understanding your board and how to communicate risk
  • The sharp eye regulators have on Boards
  • Cyber war stories and examples of the good, the bad and the ugly
  • How to effectively protect end users in today’s challenging environment.
  • Which strategies best protect your users
  • Why isolation needs to be part of the strategy.

The State of Security in 2022 and Beyond

  • Building digital trust in a hyper-connected service economy
  • How are emerging technologies reshaping cyber security risks and controls?
  • Taking a proactive approach to strengthen enterprise cyber defences
  • How has the cyber security risk landscape evolved in 2022, and how will it continue to evolve?

Sponsored by Rapid7

  • Anyone in your organization can be a target for cyberattacks 
  • what is the cost of cybersecurity and the impact of not having safeguards in place
  • Where a 'digital twin' can potentially benefit businesses when determining the business impact of a cyber-incident.
  • What tricks are your employees falling for, and how do bad actors exploit them?
  • How we can fix the talent issue by training more people and increasing skilled migration
  • What is the impact on my organisation?

Join Netskope for a fireside chat with IOOF as they share:

·  The approach they took to start their digital transformation

 

·  Lessons they learn along the way

·  Where they are heading next

Streams Start

Stream A
13:25Chairperson's Opening Remarks
Founder and Head of Journalism
KBI.Media
13:30Considerations of Moving to the Cloud
  • How do you set up Cloud Capable teams
  • What people and roles do you look to hire for greenfield projects?
  • Working so multinational organisations can operate at the speed of start-ups
CISO
Medibank
13:50 Enabling and Securing The Future of Work with ZTNA 2.0
  • How to build a scalable and future-ready network infrastructure
  • How your attack surface has expanded and what you need to know
  • SASE done right and why ZTNA 2.0 is so critical to your business success
  • How to deliver an exceptional experience no matter where users are
CTO - ANZ
Palo Alto Networks
14:10Security Integration, Influence and Awareness
  • How security teams can benefit from adaptive culture and integration techniques
  • What the changes in working mean for a highly regulated financial services industry
  • How to effectively manage supply chain security of vendors and customers
CISO
Hollard Insurance
14:30Prius vs. Ferrari: Who is helping threat actors outpace security controls?
  • How threat actors are getting past the security you have in place.
  • Shift from a detection-focused approach to one that starts with prevention to block threat actors.
  • How this shift enables security to influence top-line growth.
Senior Director, Cybersecurity Strategy
Menlo Security
14:50Afternoon Tea and Networking Break
15:20Interactive Q&A Session
Founder and Head of Journalism
KBI.Media
15:30MFA Reborn: How To Defeat Ransomware’s Lateral Movement Storms
  • How has ransomware evolved and what does that mean for business operational risk?
  • How can you address the challenge of real time prevention of malicious authentication?
  • A thorough analysis of real-life ransomware attacks that have taken place in the course of the year
Director of Product Marketing
Silverfort
15:50Rethinking MFA
Head of Cyber Transformation and IAM
TAL
16:10Scaling Security Operations: The Answer To The Challenge of Threat Inflation
  • Organizations are living in a world where “threat inflation” is the reality and there is no reason to believe it will change anytime soon.
  • How can we handle this without making our cybersecurity teams become the highest number in our budget?
  • The future of cybersecurity is hedged on a single word: Scale.
Global CTO
Securonix
16:30Real Life BEC Horror Story and Missing Millions
  • What measures were taken by the bad actors, and what red flags were missed?
  • The aftermath, and how this hack could have been easily avoided at multiple points
  • Step-by-step autopsy of the hack and PIR lessons learned
Deputy Branch Chair (Cloud)
AISA
16:50Closing Remarks
Founder and Head of Journalism
KBI.Media
Stream B
13:25Chairperson's Opening Remarks
Master of Ceremonies
(MC)
13:30Securing The Modern Ways of Working
  • How has the pandemic and technology growth fueled change in the industry?
  • What is next for different platforms and devices, and what does best-practice management look like?
  • How to set up a Security aware culture, and what elements are out of your control?
CISO & Head of Technology Operational Risk & Compliance
Kiwibank
13:50The Evolution Of Software Supply Chain Attacks

In this presentation, Sonatype will share their insights into next generation software supply chain attacks in open source ecosystems. Developer, and APJ Senior Solutions Engineer, Cameron Townshend will explore the usage of open source, novel attacks now targeting the ecosystem and the blindspots emerging within organisations.

Solution Architect
Sonatype
14:10Cyber Security Across The C-Suite
  • What execs are focusing on, and what they should be focusing on
  • How do you communicate effectively with your board?
  • Angles of the CIO, CTO and CISO
fmr. Regional CISO, Board Member, Author
Standard Chartered (🇸🇬)
14:30Is the Cloud Control Plane the next Frontline in Cybersecurity?
  • Rapid shift to remote work and adoption of new technologies has led to new challenges in securing cloud data & apps
  • Accelerating adoption of cloud technologies has resulted in the evolution of the next generation of modern attacks now traversing through & towards an the control plane
  • Discuss steps an organisation needs to take to secure their enterprise’s cloud control plane
Security Architect
Vectra AI
14:50Afternoon Tea
15:20 The Rapidly Changing State of Security Operations
  • Exploring the issues in traditional security operations practices
  • How a rethink is needed to build a fit for purpose SOC for the next 3-6 years
  • How your SIEM can grow and extend into your Endpoint and Cloud workloads to give you end to end visibility across your enterprise while detecting, investigating and responding to threats in a scalable and cost effective manner
Principal Security Specialist, ANZ
Elastic
15:40On-stage Interview: SASE, Cyber Pathways and Collaboration
Director & GM of BT Security, APJ & MEA
BT
16:00Deliver The Next Layer Of Security To Support Digital Transformation
  • How many layers of security are required?
  • The dive into the expansion of web automation, external integrations and data access being highly valuable assets
  • Citrix’s strategy in protecting their assets, and why Application Security is critical to supporting these business outcomes

 

Sales Engineer - Application Delivery & Security
Citrix
16:20The Human Element of Security
  • Why Security awareness programs are struggling to take hold in organisations
  • How can you make your cause and message more palatable?
  • What does taking responsibility away from the CISO make room for?
Chair - Cloud
AISA
16:45Closing Remarks
Master of Ceremonies
(MC)
For event logistics and operations:
Amy McAdams
Event Manager
T: +61 2 8484 0908
To participate as a speaker:
Conor Hughes
Conference Producer
T: +61 468 415 456
For sponsorship enquiries:
Mark Quinn
Sales Director
T: +61 2 8484 0955