10th Annual

Future of Security, Melbourne 2024

22 August 2024 8:00 am - 5:30 pm

Crown Towers Melbourne
  • Days
    Hours
    Mins
    Secs
Spots Filling Fast!

Complimentary for FSI Executives

Due to overwhelming demand, the Future of Security conference in Melbourne returns in 2024, more expansive and impressive than before. The event will host a comprehensive array of keynote presentations and panel debates throughout a single, dynamic day. Participants will have the opportunity to engage in “Mastermind” roundtable discussions, organized into various technology zones for high-level conversations between industry specialists and attendees.

As the threat landscape perpetually shifts, it is critical for security professionals to gather and formulate effective strategies. Last year, we kicked off with an opening keynote by Richard Johnson, Westpac Group’s Chief Information Security Officer, who enlightened our audience on the top three technologies reshaping the security landscape. Additionally, insights were shared by the Assistant Director-General of Technical Threats and Visibility from the Australian Cyber Security Centre on fortifying Australia’s security stance through ACSC and FSI collaboration. Hollard Insurance’s CISO extrapolated on the term “Cybernomics,” describing the role of multidisciplinary skills in the post-artificial intelligence cyber security job market.

This year’s Future of Security, Melbourne 2024 will delve into the key priorities for CISOs in 2o24 and beyond. This one-day event will feature five keynote sessions and three dynamic panel discussions where industry leaders will outline imminent trends revolutionising the cyber security landscape. These include, and are not limited to, the Artificial Intelligence debate, advancements and use cases for Quantum Technology and forging advanced security practices with regulatory bodies.

The over-arching theme of the conference will be: Fostering Resilience During Periods of Disruption 

The following sub-themes will underscore the content of the day:

  • Assessing the evolving threat landscape – MFA technical developments, cloud security, IAM and protecting customer data from AI-powered malicious actors.
  • Responding to the latest regulatory requirements – APRA’S CPS230, treating compliance as a ‘tick-the-box’ exercise and responding to more stringent regulation.
  • The future of cyber invulnerability – ‘security-by-design’ software development, preparing for the criminal exploitation of Quantum technology and mitigating API exposure risk.
  • Addressing pressing security concerns when undergoing a digital transformation.
Divisional Information Security Officer
Allianz Technology Munich
Chief Information Security Officer
Industry Expert
Chief Information Security Officer
Insignia Financial
Head Cyber Strategy, Operations, Intel and Influence
ANZ Bank
General Manager - Information Security, Technology Controls and Governance
AIA Insurance
Chief Information Security Officer
Australian Super
Chief Information Security Officer
Tyro Payments
Global Head Cyber, Technology and Data Risk
Macquarie Group
Head of Information Security
Defence Bank
Master of Ceremonies
(MC)

Stay tuned for further speaker announcements...

  • Applying history to the present: The emergence of the cyber discipline, the ramifications of the 1971 ‘Creeper’ program and the ways cyber warfare has evolved.
  • Introducing artificial intelligence to software development: new opportunities for criminal exploitation, the automation of cyber-attacks, evading defense layers and scaling malicious activity. 
  • When Quantum and AI merge: accelerating the deployment of high-quality phishing campaigns, performing data mining exercises within microseconds and relinquishing privileged information through sophisticated ‘deepfake’ technologies.
  • Adopt the language of ‘risk’ to communicate the necessity of increased investment in 3rd party risk management, 24/7 monitoring and incident response systems.  
  • Remedy traditionally antagonistic relationships between cyber and the wider business: become a supporter of IT innovation and an enabler of critical business imperatives.  
  • Collaborating with your data and IT team for cyber invulnerability: embedding ‘security by design’ as a core principle during software development.
  • During economic downturns, it's crucial to shift your focus to tech stack consolidation and the ongoing enhancement of baseline controls, such as patch and vulnerability testing.
  • Strengthening your core controls while bracing for challenging times: conduct a comprehensive enhancement of controls and confirm that your guardrails align with your risk tolerance.
  • Ensuring operability within the boundaries of compliance: approaching security as a fundamental practice to satisfy basic regulatory demands and avoid blindly following the latest industry fads.
  • Embarking on a comprehensive enhancement of controls to support the Government's newly announced Six Cyber Shields strategy and collaborating with the state to transform Australia into a leading nation in cyber security.
  • In preparation for APRA's CPS230, it is crucial to ensure that baseline controls are established, the use of multi-factor authentication is increased, and there is a heightened focus on managing third-party risks.
  • Assessing the daily impact of oncoming regulation on your department: the consolidation of endpoints, updating end-of-life controls for existing software, and alleviating workforce pressures.
  • Understanding the post-AI recruitment landscape
  • Acquiring talent through hiring for qualities like creativity and problem-solving
  • Utilising novel strategies to protect your future data
  • Maintaining compliance with upcoming regulations while also achieving operational excellence and driving business outcomes is crucial. It involves ensuring that Australia's financial services industry aligns with international standards and finding ways to respond to increased regulatory demands from APRA and ASIC.
  • Exploring technical advancements in methodologies such as Multi-Factor Authentication, Identity Access Management, and the use of geo-proximity data for password-less access to devices.
  • Supporting critical business operations by consistently adhering to the principles of People, Processes, and Technology (PPT), enhancing end-to-end processes, implementing appropriate controls, and fostering innovation within the IT team.
  • Prepare for the criminal exploitation of AI: Anticipating an increase in attack vectors, the automation of cyber-attacks, and respond by automating layers of data protection and defense. 
  • Prevent quantum-powered cyber-attacks by implementing a post-quantum security framework that encrypts data located within cloud-based networks.  
  • Fortify your organisation against sophisticated threat actors through preventative IAM measures, upgrading your MFA technology, embarking on an organisation-wide enhancement of baseline controls. 
  • Collaborate with your data and IT team for cyber invulnerability: embedding ‘security by design’ as a core principle during software development and becoming a supporter of IT innovation.
  • Preventative Strategies: Acknowledging the inevitability of cyber incidents and ensuring that routine security measures satisfy fundamental standards.
  • Proactive Strategies: Investigating how cyber experts are constructing frameworks to actively address the threat environment and enhance cyber and IT teams through automation.
  • Integration of Both: Comprehending the necessity of managing residual risks and considering cyber security as an all-encompassing task, steered by executive leadership.
For event and marketing enquiries:
Jessica Cozanitis
Marketing Executive
T: +61 401 422 928
For sponsorship enquiries:
Marcus Sedman
Senior Account Director
T: +61 402 147 500
To participate as a speaker:
Stella Spackman
Senior Conference Producer
T: +61 433 732 794
Register

Please note that delegate attendance is complimentary for the financial services industry only.

Paid tickets are available for service providers to the industry (e.g., solution providers to the banking, insurance & wealth management industry) at the discretion of FST Media. For more information on vendor fees, please contact fsisales@fst.net.au or +61 2 8484 0918.

FST Media reserves the right to decline registration and entry to the event.

By agreeing to the Terms and Conditions for complimentary VIP Registration, you acknowledge that to qualify for that complimentary VIP pass the delegate needs to be currently employed by a Financial Services organisation.

Should you be unable to attend on the day of the conference, a ‘like-for-like’ substitute is welcome to attend in your stead at no extra charge, provided we are informed of the change up to 14 days prior to the conference. Any cancellations made within 14 days of the conference, with no relevant substitute provided, will incur a $150+ GST non-attendance fee. This fee will be used to cover delegate material costs and catering costs incurred by FST Media on submission of delegate numbers to the conference venue.

FST Media will make every effort to ensure that the event and the program will take place as advised. FST Media reserves the right to delete or alter items in the program and will not take financial responsibility for changes that are the result of events beyond its control, including travel and/or accommodation.

FST Media Terms & Conditions and Privacy Policy

By registering for this event you are agreeing to our privacy policy, you consent to the following:

  • The use of your personal information for the purposes of providing direct marketing material to you; and
  • The disclosure of your personal information to our event partners
  • Clause 3 of our Privacy Policy contains further information regarding how we may use your information to provide direct marketing material to you, and how you may opt out of any further material