10th Annual

Future of Security, Melbourne 2024

22 August 2024 8:00 am - 5:00 pm
Crown Conference Centre
About the Event

Due to overwhelming demand, the Future of Security conference in Melbourne returns in 2024, more expansive and impressive than before. The event will host a comprehensive array of keynote presentations and panel debates throughout a single, dynamic day. Participants will have the opportunity to engage in “Meet the Tech Expert” roundtable discussions which facilitate high-level conversations between industry experts and conference attendees.

The over-arching theme of the conference will be: Fostering Resilience During Periods of Disruption 

The following sub-themes will underscore the content of the day:

  • Assessing the evolving threat landscape – MFA technical developments, cloud security, IAM and protecting customer data from AI-powered malicious actors.
  • Responding to the latest regulatory requirements – APRA’S CPS230, treating compliance as a ‘tick-the-box’ exercise and responding to more stringent regulation.
  • The future of cyber invulnerability – ‘security-by-design’ software development, preparing for the criminal exploitation of Quantum technology and mitigating API exposure risk.
  • Addressing pressing security concerns when undergoing a digital transformation.

As the threat landscape perpetually shifts, it is critical for security professionals to gather and formulate effective strategies. Last year, we kicked off with an opening keynote by Richard Johnson, Westpac Group’s Chief Information Security Officer, who enlightened our audience on the top three technologies reshaping the security landscape. Additionally, insights were shared by the Assistant Director-General of Technical Threats and Visibility from the Australian Cyber Security Centre on fortifying Australia’s security stance through ACSC and FSI collaboration. Hollard Insurance’s CISO extrapolated on the term “Cybernomics,” describing the role of multidisciplinary skills in the post-artificial intelligence cyber security job market.

This year’s Future of Security, Melbourne 2024 will delve into the key priorities for CISOs in 2o24 and beyond. This one-day event will feature five keynote sessions and three dynamic panel discussions where industry leaders outline the imminent trends revolutionising cyber security in financial services. These include, and are not limited to, the Artificial Intelligence debate, advancements and use-cases for Quantum Technology and forging advanced security practices with regulatory bodies.

Speakers
Divisional Information Security Officer
Allianz Technology Munich
Chief Information Security Officer
Australian Retirement Trust
Chief Information Security Officer
Insignia Financial
Head of Group Security Culture and Advisory
NAB
Head of Security Control Assessment
Westpac Group
Head Cyber Strategy, Operations, Intel and Influence
ANZ Bank
Chief Information Security Officer
TAL
General Manager - Information Security, Technology Controls and Governance
AIA Australia
Head of Technology and Cyber Risk
Cbus Super Fund
CIO, CISO, Board Advisor, NED and Author
Macquarie Bank (Former)
Head of Information Security
Defence Bank
Master of Ceremonies
(MC)
Security Manager
AC3
Senior Director ANZ
SentinelOne
Strategic Account Director
Thales CPL
Vice President Sales, ANZ
Ping Identity
Cyber Security Solution Engineer
Delinea
SE Leader for Australia and New Zealand
Forescout
Indicative Agenda
  • Applying history to the present: The emergence of the cyber discipline, the ramifications of the 1971 ‘Creeper’ program and the ways cyber warfare has evolved. 
  • Introducing artificial intelligence to software development: new opportunities for criminal exploitation, the automation of cyber-attacks, evading defense layers and scaling malicious activity.  
  • When Quantum and AI merge: accelerating the deployment of high-quality phishing campaigns, performing data mining exercises within microseconds and relinquishing privileged information through sophisticated ‘deepfake’ technologies.
  • Consumer habits and competitive pressures have accelerated the need for digital transformation. 
  • Digital transformation at financial institutions increases the risk of data breach. 
  • Discover, Protect and Control Sensitive data on Hybrid IT.
 
  • Maintaining compliance with upcoming regulations while also achieving operational excellence and driving business outcomes is crucial. It involves ensuring that Australia's financial services industry aligns with international standards and finding ways to respond to increased regulatory demands from APRA and ASIC.
  • Exploring technical advancements in methodologies such as Multi-Factor Authentication, Identity Access Management, and the use of geo-proximity data for password-less access to devices.
  • Supporting critical business operations by consistently adhering to the principles of People, Processes, and Technology (PPT), enhancing end-to-end processes, implementing appropriate controls, and fostering innovation within the IT team.
  • Insights from 400 CXOs in Australia, USA, Canada, UK on current and future state of cloud security 
  • Understand the top threats facing cloud deployments in 2024 
  • Learn from SentinelOne about how AI is proving to be a force multiplier in cloud security

This presentation explores the strategies we’ve leveraged to build a cyber security function from the ground up, focusing on practical insights and challenges faced in today's dynamic business environment. 

  

Discussion Points:  

  • Establishing support for required cyber capability 

  • Building the business case 

  • Defining the target operating model 

  • Implementation of the structure and lessons learned

  • The decentralized identity market is projected to grow to over $6 billion worldwide by 2027 at a CAGR of 89%. Unsurprisingly, the financial services industry already accounts for and will continue to account for, a sizable proportion of this market. 
  • The rapidly evolving identity fraud landscape, growing user onboarding and identity verification challenges, and increasing demand for enhanced privacy and control over data are culminating in a unique way for financial service providers. In this new paradigm, decentralized identity will become more strategically important than ever. 
  • Join Ping Identity’s Ash Diffey to learn how decentralized identity has evolved in the financial services industry, continues to drive industry transformation and will reshape the industry over the next 5-10 years.
 
 
  • Prepare for the criminal exploitation of AI: Anticipating an increase in attack vectors, the automation of cyber-attacks, and respond by automating layers of data protection and defense. 
  • Prevent quantum-powered cyber-attacks by implementing a post-quantum security framework that encrypts data located within cloud-based networks. 
  • Fortify your organisation against sophisticated threat actors through preventative IAM measures, upgrading your MFA technology, embarking on an organisation-wide enhancement of baseline controls. 
  • Collaborate with your data and IT team for cyber invulnerability: embedding ‘security by design’ as a core principle during software development and becoming a supporter of IT innovation
  • When identities and credentials are compromised bad things happen. 
  • Most ransomware incidents have turned into data extortion incidents because it has become the preferred method from ransomware gangs. 
  • Identities and credentials are a key target and that in a majority of security breaches do have some type of identity component to it. 
  • It’s important to take a reality check on what security controls can reduce risks and secure digital identities in today’s Generative AI world
  •  
  • Collaborating with vendors to offer complimentary cyber assessments and deliver first-class cyber advice to SMBs (Small-to-Medium Businesses). 
  • The challenges SMBs face in achieving full cyber security and NAB's commitment to guiding them towards cyber safety. 
  • Fostering employee security and growing participation in the cyber workforce through strategic partnerships.
 
 
  • Reduce vulnerability noise: Prioritise critical vulnerabilities based on risk and exploitability. 
  • Focus on actionable insights: Transform data into intelligence to inform security decisions. 
  • Strengthen security posture: Proactively identify and mitigate risks to protect your organisation. 
  • Optimise resource allocation: Efficiently allocate security budgets and personnel.
 
 
 
  • Preventative Strategies: Acknowledging the inevitability of cyber incidents and ensuring that routine security measures satisfy fundamental standards.
  • Proactive Strategies: Investigating how cyber experts are constructing frameworks to actively address the threat environment and enhance cyber and IT teams through automation.
  • Integration of Both: Comprehending the necessity of managing residual risks and considering cyber security as an all-encompassing task, steered by executive leadership.
  • What are the required Skills, Knowledge, Experience and Behaviour 
  • The Elevator to my next CISO or CIO role 
  • Moments of Truth
Contact Us
For event and marketing enquiries:
Jessica Cozanitis
Marketing Executive
T: +61 401 422 928
For sponsorship enquiries:
Marcus Sedman
Senior Account Director
T: +61 402 147 500
To participate as a speaker:
Stella Spackman
Senior Conference Producer
T: +61 433 732 794