Future of Security, Sydney 2022

1 September 2022 9:00 am - 5:00 pm

Hilton Sydney
  • Days
    Hours
    Mins
    Secs

Complimentary for FSI Executives

The Future of Security, Sydney conference is FST’s dedicated security forum for NSW, exploring the most pressing issues of cybersecurity, resilience and diligence in the financial services industry.

Join us at the Hilton in Sydney on Thursday, 1 September as we help you to navigate the key post-pandemic trends coming up in 2022, including digital transformation accelerating cyber-attacks, data security concerns with the next phase of Open Banking, and partnering with key stakeholders and financial regulators to shape security practices.

Event Snapshot

Going into 2022, cyber-attacks remain the most difficult threat and risk in the financial services industry despite significant advances by the sector to boost cyber defence, vigilance and resilience. Cybercriminals are still one step ahead of the game, increasing the precision, sophistication and intensity of their malicious attacks along with the take-up of digital products and services providing ample opportunity for cybercrime.

Facing continuous surges in cyber threats, especially in 2021, the financial services industry recorded the second-highest number of data breaches across all sectors, leaving leaders trapped in an unending battle for control against criminal hackers. Not only are network breaches and data loss on the line, but security teams have the ultimate duty to protect customer privacy and secure the prime assets of institutions.

Featured Topics:

  • Endpoint security
  • Open Banking and data security
  • Digital identity and access management
  • Threat intelligence and management
  • Breach detection and prevention
  • Mobility and device security
  • Cloud security
  • Data protection and information governance
  • Cybersecurity and resilience
  • DevSecOps
  • SOC innovations
Event Highlights
Future of Security, Sydney 2022
Breakdown
27 Speakers
25 Sponsors
Speakers
Darren Argyle
Standard Chartered
David Higgins
Kiwibank
Alex Loizou
Medibank
Maryam Bechtel
AGL
David Gee
Macquarie Group
Steve Coles
Youi
Highlights
Darren Argyle - Navigating a World of Cyber Hazards
Right Level of Board Engagement
Security Leaders Panel Discussion
Overcoming The Cyber Talent Issue
Group Chief Information Security Risk Officer
Standard Chartered
CISO & Head of Technology Operational Risk & Compliance
Kiwibank
CISO
Medibank
CISO
AGL
Global Head Cyber, Technology and Data Risk
Macquarie Group
Strategic Security Advisor, Non-Executive Board Member
Youi
CISO
Hollard Insurance
Chief Risk Officer and General Counsel
Beforepay
CISO
Avenue Bank
fmr. Regional CISO, Board Member, Author
Standard Chartered (🇸🇬)
CISO
AUB Group
Founder and Head of Journalism
KBI.Media
Master of Ceremonies
(MC)
Chief Technology Officer APJ
Rapid7
CISO - APJ
Zscaler
Global Head of Intelligence
F5
Director of Product Marketing
Silverfort
ANZ Director
Thales
Partner Relations, APJ
Outseer
Director
Fortiguard Labs Australia
Head of Solutions Engineering APJ
Snyk
Global CTO
Securonix
Security Solutions Engineer
Netskope
Senior Director, Cybersecurity Strategy
Menlo Security
Regional Vice President - ANZ
Box
Solution Architect
Sonatype
  • Historic lessons for cyber safety 
  • Building a coalition of the willing
  • Controlling the controllables
  • Cyber leadeship priorities that matter

 

Financial Services has never been more dependent on data, at risk of cyberattack or under the regulatory compliance microscope as it is today. At the same time, digital transformation initiatives are reliant on DevOps for delivering innovation solutions to business problems and opportunities at high speed. Consequently for FSIs, there is a need to shift-left and embed data security into their development pipelines.

  • What does shifting left for data security looks like?
  • How shifting left doesn't necessarily mean compromised security or compliance, or increased business risk.
  • How organisations have embraced shifting left to reduce costs and time to value.

 

 

  • Understanding your board and how to communicate risk
  • The sharp eye regulators have on Boards
  • Cyber war stories and examples of the good, the bad and the ugly

 

 

  • Mergers & Acquisitions are accelerating as organisations look to grow and increase value for their shareholders
  • Why must cyber teams be engaged and the benefits of engagement?
  • How can zero trust network access improve the time to value to achieve business synergies?

 

The State of Security in 2022 and Beyond

  • Building digital trust in a hyper-connected service economy
  • How are emerging technologies reshaping cyber security risks and controls?
  • Taking a proactive approach to strengthen enterprise cyber defences
  • How has the cyber security risk landscape evolved in 2022, and how will it continue to evolve?

Sponsored by Rapid7

 

  • The Labour government has arrived with a definite focus on cybersecurity.
  • At the intersection of geopolitics, organised crime, and Covid-19, is Cyber Security.
  • This talk will explore our changed attack surfaces, the drivers that are shaping the threat landscape, and what we need to do to succeed in this future of security.
  • What tricks are your employees falling for, and how do bad actors exploit them?
  • How we can fix the talent issue by training more people and increasing skilled migration
  • What is the impact on my organisation?
  • Most companies have a ratio of 100:1 developers to security professionals, so why aren't developers empowered to take action? 
  • If companies want to survive and thrive in this fast-paced digital world, we trust and empower developers to handle security and fix security issues themselves. 
  • How security teams can scale by empowering developers to create secure applications, including the use of modern cloud technologies

Streams Start

Stream A
13:25Chairperson's Opening Remarks
Founder and Head of Journalism
KBI.Media
13:30Security Integration, Influence and Awareness
  • How security teams can benefit from adaptive culture and integration techniques
  • What the changes in working mean for a highly regulated financial services industry
  • How to effectively manage supply chain security of vendors and customers
CISO
Hollard Insurance
13:50The Changing Risk Landscape: How Organisations Can Detect And Secure Sensitive Data Everywhere
  • How organisations can modernise their Protection Strategy against data loss, exfiltration & public exposure while meeting compliance demands
  • Approaches you can take to instant changes in policy around context and risk
  • The role of adaptive security and policy automation to help shift security baselines
Security Solutions Engineer
Netskope
14:10Is there a practical blueprint for a cyber leader?
  • ‘Visibility’ is foundation to every cyber leader in managing cyber risks.
  • Attacker-centric scenario modelling can lead to effective cyber risk management and can opens up “value” centric conversation with the Executives and Board.
  • Control design is a successful approach to prioritise investment decisions in a risk-based manner
  • Principle-based guardrails drive intended outcomes and deliver them as services
  • Right sourcing model is key to sustaining the maturity of cyber capabilities
14:30Building a Strategy For Secure Digital Client Experiences
  • Eliminate paper-based processes and create digital-first processes – like client onboarding or loan applications – for secure and seamless collaboration across the firm
  • Help support a hybrid workforce so teams can securely collaborate together, with customers, & with partners from anywhere, with any app or device
  • Centralise and secure client information like bank statements, tax information, and associated files by managing in accordance with privacy and compliance standards.
Regional Vice President - ANZ
Box
14:50Afternoon Tea and Networking Break
15:20Interactive Q&A
Founder and Head of Journalism
KBI.Media
15:30Former FBI Agent Explains How To Use Client-Side Signals to Prevent Attacks
  • Dan Woods will share his career journey, with insights into his time pursuing high value targets in the CIA, and at the FBI helping investigate the 2001 anthrax attacks.
  • He has conducted numerous fraud and money laundering investigations, and even worked under cover for a Russian human click farm.
  • Dan will also speak about how to use client-side signals to prevent attacks against inherit vulnerabilities in your environment.
Global Head of Intelligence
F5
15:50Considerations of Moving to the Cloud
  • How do you set up Cloud Capable teams
  • What people and roles do you look to hire for greenfield projects?
  • Working so multinational organisations can operate at the speed of start-ups
CISO
Medibank
16:10Technology Keynote: Silverfort

MFA Reborn: How To Defeat Ransomware’s Lateral Movement Storms

  • How has ransomware evolved and what does that mean for business operational risk?
  • How can you address the challenge of real time prevention of malicious authentication?
  • A thorough analysis of real-life ransomware attacks that have taken place in the course of the year
Director of Product Marketing
Silverfort
16:30Cyber Security Across The C-Suite
  • What execs are focusing on, and what they should be focusing on
  • How do you communicate effectively with your board?
  • Angles of the CIO, CTO and CISO
fmr. Regional CISO, Board Member, Author
Standard Chartered (🇸🇬)
16:50Chairperson's Closing Remarks
Founder and Head of Journalism
KBI.Media
Stream B
13:25Chairperson's Opening Remarks
Master of Ceremonies
(MC)
13:30Securing The Modern Ways of Working
  • How has the pandemic and technology growth fueled change in the industry?
  • What is next for different platforms and devices, and what does best-practice management look like?
  • How to set up a Security aware culture, and what elements are out of your control?
CISO & Head of Technology Operational Risk & Compliance
Kiwibank
13:50The Evolution Of Software Supply Chain Attacks

In this presentation, Sonatype will share their insights into next generation software supply chain attacks in open source ecosystems. Developer and APJ Senior Solutions Engineer, Cameron Townshend will explore the usage of open source, novel attacks now targeting the ecosystem and the blindspots emerging within organisations.

Solution Architect
Sonatype
14:10On-stage Interview: Risk, Data Security and Regulation
  • The changing perception of data risk management and security
  • What are the data risks you need to be aware of in 2022?
  • How to keep pace with the increasing cyber and data protection expectations from regulators?
Chief Risk Officer and General Counsel
Beforepay
14:30Defeating Digital Transaction Fraud & Friction with Global Network
  • How do you gain the foresight to stop fraud and mitigate cyber risks before transactions happen?
  • Which customers are authentic, and how can you be sure of their authenticity?
  • How close get we get to ‘frictionless’ experiences, and is that even something we want?
Partner Relations, APJ
Outseer
14:50Afternoon Tea and Networking Break
15:20Scaling Security Operations: The Answer To The Challenge of Threat Inflation
  • Organizations are living in a world where “threat inflation” is the reality and there is no reason to believe it will change anytime soon.
  • How can we handle this without making our cybersecurity teams become the highest number in our budget?
  • The future of cybersecurity is hedged on a single word: Scale.
Global CTO
Securonix
15:40Don’t Blame the Victim
  • How hackers don’t just attack technology they target the victims brain driving unexpected actions
  • How to encourage victims to stop the conversation and report the event
  • In hybrid workplaces, you can protect your organisation by shifting the conversation to ‘being safe at work and home’
CISO
AUB Group
16:05Prius vs. Ferrari: Who is helping threat actors outpace security controls?
  • How threat actors are getting past the security you have in place.
  • Shift from a detection-focused approach to one that starts with prevention to block threat actors.
  • How this shift enables security to influence top-line growth.
Senior Director, Cybersecurity Strategy
Menlo Security
16:25Security at a Neo-Bank
  • From top to bottom, what does the Security journey look like at a Neo-bank?
  • What can Security become in a blankslate environment?
  • How can you do more with less?
CISO
Avenue Bank
16:50Chairperson's Closing Remarks
Master of Ceremonies
(MC)
To participate as a speaker:
Aron Kunaseelan
Chief Operating Officer
T: +61 423 631 461
For sponsorship enquiries:
Brigitte Guerin
Commercial Director
T: +61 417 678 632