10th Annual

Future of Security, Sydney 2024

20 August 2024 8:00 am - 5:00 pm
Dockside
About the Event

FST Media is excited to announce the return of our premier conference, The Future of Security, Sydney. This year’s event will showcase a series of robust keynote sessions and panel discussions throughout a dynamic, action-packed day. Attendees are invited to engage in “Meet the Tech Experts” roundtable discussions, which facilitate high level dialogue between industry experts and conference attendees.

The Future of Security, Sydney 2024, will delve into the CISOs’ agenda for 2024 and beyond with in-depth keynote sessions and interactive panel discussions. Industry experts will outline the key upcoming trends – The AI Revolution, adapting to Quantum Technology developments, and collaborating with regulators to forge advanced security practices.

The over-arching theme of the conference will be: Fostering Resilience During Periods of Disruption.

The following sub-themes will underscore the content on the day:

  • Assessing the evolving threat landscape – MFA technical developments, cloud security, IAM and protecting customer data from AI-powered malicious actors.
  • Responding to the latest regulatory requirements – APRA’S CPS230, treating compliance as a ‘tick-the-box’ exercise and responding to more stringent regulation.
  • The future of cyber invulnerability – ‘security-by-design’ software development, preparing for the criminal exploitation of Quantum technology and mitigating API exposure risk.
  • Addressing pressing security concerns when undergoing a digital transformation.

For exclusive insights into the future of cyber security within financial services, join us on August 20th at Dockside, Darling Harbour. Last year, we kicked off with an opening keynote by Richard Johnson, Westpac Group’s Chief Information Security Officer, who enlightened our audience of over 200 Cybersecurity, IT, Data, Risk, and Compliance executives about the top three technologies reshaping the security landscape. TAL’s CISO offered valuable insights on crafting outcome-focused cyber security strategies, and Alex Hope, known as Australia’s Only Hacker, concluded the day with his experiences, including the time he hacked former Prime Minister Tony Abbott.

Speakers
Divisional Information Security Officer
Allianz Technology Munich
Global Chief Information Security Officer
QBE Insurance
Head of Security Control Assessment
Westpac Group
Head of Group Security Culture and Advisory
NAB
Head Cyber Strategy, Operations, Intel and Influence
ANZ Bank
Chief Information Security Officer
TAL
CIO, CISO, Board Advisor, NED and Author
Macquarie Bank (Former)
Industry Expert and Former Head of Cyber Security Advisory and Application Security
Tyro Payments
Head of Information Security
Defence Bank
Master of Ceremonies
(MC)
AVP, BigFix, BFSI lead for APJ
HCL Software
Senior Director ANZ
SentinelOne
Regional Manager
Thales CPL
Vice President Sales, ANZ
Ping Identity
Senior Director, Systems Engineering APJ
Proofpoint
Customer Chief Information Security Officer | Director of Strategy and Architecture
Sekuro
Area Vice President, Australia and New Zealand
ExtraHop
Regional CSO
Palo Alto Networks
Indicative Agenda
 
  • Applying history to the present: The emergence of the cyber discipline, the ramifications of the 1971 ‘Creeper’ program and the ways cyber warfare has evolved. 
  • Introducing artificial intelligence to software development: new opportunities for criminal exploitation, the automation of cyber-attacks, evading defense layers and scaling malicious activity.  
  • When Quantum and AI merge: accelerating the deployment of high-quality phishing campaigns, performing data mining exercises within microseconds and relinquishing privileged information through sophisticated ‘deepfake’ technologies.
  • While digital transformation has taken over CIO's agenda in many organisations, cybersecurity concerns are all time high for CISOs. Technology is getting smarter, so are criminals with more and more malicious attacks powered by AI!  
  • The future of security - focus on Zero Trust Architecture, tool consolidation, prioritization and remediation of vulnerabilities and enabling continuous compliance through automated endpoint assessment, analytics, and remediation. 
  • In this session, we will dive into the complex cybersecurity landscape in Australia, share best practices and real life examples on how to stay resilient with future-proof security technologies. 
 
 

 

  • Maintaining compliance with upcoming regulations while also achieving operational excellence and driving business outcomes is crucial. It involves ensuring that Australia's financial services industry aligns with international standards and finding ways to respond to increased regulatory demands from APRA and ASIC. 
  • Exploring technical advancements in methodologies such as Multi-Factor Authentication, Identity Access Management, and the use of geo-proximity data for password-less access to devices. 
  • Supporting critical business operations by consistently adhering to the principles of People, Processes, and Technology (PPT), enhancing end-to-end processes, implementing appropriate controls, and fostering innovation within the IT team.
  • Consumer habits and competitive pressures have accelerated the need for digital transformation. 
  • Digital transformation at financial institutions increases the risk of data breach. 
  • Discover, Protect and Control Sensitive data on Hybrid IT.

 

  • The status of the Australian Financial Services threat landscape
  • Ways to implement AI / ML to mitigate human-centric risks in Financial Services
  • Review of some successful examples where AI / ML has been leveraged to address human-centric risks.
 
 
  • Prepare for the criminal exploitation of AI: Anticipating an increase in attack vectors, the automation of cyber-attacks, and respond by automating layers of data protection and defense. 
  • Prevent quantum-powered cyber-attacks by implementing a post-quantum security framework that encrypts data located within cloud-based networks. 
  • Fortify your organisation against sophisticated threat actors through preventative IAM measures, upgrading your MFA technology, embarking on an organisation-wide enhancement of baseline controls. 
  • Collaborate with your data and IT team for cyber invulnerability: embedding ‘security by design’ as a core principle during software development and becoming a supporter of IT innovation
  • Insights from 400 CXOs in Australia, USA, Canada, UK on current and future state of cloud security 
  • Understand the top threats facing cloud deployments in 2024 
  • Learn from SentinelOne about how AI is proving to be a force multiplier in cloud security

 

  • Collaborating with vendors to offer complimentary cyber assessments and deliver first-class cyber advice to SMBs (Small-to-Medium Businesses). 
  • The challenges SMBs face in achieving full cyber security and NAB's commitment to guiding them towards cyber safety. 
  • Fostering employee security and growing participation in the cyber workforce through strategic partnerships.
  • The decentralized identity market is projected to grow to over $6 billion worldwide by 2027 at a CAGR of 89%. Unsurprisingly, the financial services industry already accounts for and will continue to account for, a sizable proportion of this market. 
  • The rapidly evolving identity fraud landscape, growing user onboarding and identity verification challenges, and increasing demand for enhanced privacy and control over data are culminating in a unique way for financial service providers. In this new paradigm, decentralized identity will become more strategically important than ever. 
  • Join Ping Identity’s Ash Diffey to learn how decentralized identity has evolved in the financial services industry, continues to drive industry transformation and will reshape the industry over the next 5-10 years.
 
 
  • What are the required Skills, Knowledge, Experience and Behaviour 
  • The Elevator to my next CISO or CIO role 
  • Moments of Truth 
  • Preventative Strategies: Acknowledging the inevitability of cyber incidents and ensuring that routine security measures satisfy fundamental standards.
  • Proactive Strategies: Investigating how cyber experts are constructing frameworks to actively address the threat environment and enhance cyber and IT teams through automation.
  • Integration of Both: Comprehending the necessity of managing residual risks and considering cyber security as an all-encompassing task, steered by executive leadership

 

  • Traditional thinking perceives cyber security investments as inversely proportional to the user experience, and the time has come to disrupt this paradigm.  
  • Given the workforce of the future will embrace Generative AI, interact with a wide variety of data types and look to extend their corporate workflows to their personal devices, the opportunity to transform is significant. 
  • In this session, Riccardo Galbiati, Regional CSO at Palo Alto Networks, will share key innovations and design concepts that allow CIOs to make their cybersecurity architecture an enabler of their 'future of work' initiatives
 
 
 
 
Contact Us
For event and marketing enquiries:
Jessica Cozanitis
Marketing Executive
T: +61 401 422 928
For sponsorship enquiries:
Marcus Sedman
Senior Account Director
T: +61 402 147 500
To participate as a speaker:
Stella Spackman
Senior Conference Producer
T: +61 433 732 794