10th Annual

Future of Security, Sydney 2024

20 August 2024 8:00 am - 5:00 pm

Dockside
  • Days
    Hours
    Mins
    Secs
Spots Filling Fast!

Complimentary for FSI Executives

FST Media is excited to announce the return of our premier conference, The Future of Security, Sydney. This year’s event will showcase a series of robust keynote sessions and panel discussions throughout a dynamic, action-packed day. Attendees are invited to engage in “Meet the Tech Experts” roundtable discussions, which facilitate high level dialogue between industry experts and conference attendees.

The Future of Security, Sydney 2024, will delve into the CISOs’ agenda for 2024 and beyond with in-depth keynote sessions and interactive panel discussions. Industry experts will outline the key upcoming trends – The AI Revolution, adapting to Quantum Technology developments, and collaborating with regulators to forge advanced security practices.

The over-arching theme of the conference will be: Fostering Resilience During Periods of Disruption.

The following sub-themes will underscore the content on the day:

  • Assessing the evolving threat landscape – MFA technical developments, cloud security, IAM and protecting customer data from AI-powered malicious actors.
  • Responding to the latest regulatory requirements – APRA’S CPS230, treating compliance as a ‘tick-the-box’ exercise and responding to more stringent regulation.
  • The future of cyber invulnerability – ‘security-by-design’ software development, preparing for the criminal exploitation of Quantum technology and mitigating API exposure risk.
  • Addressing pressing security concerns when undergoing a digital transformation.

For exclusive insights into the future of cyber security within financial services, join us on August 20th at Dockside, Darling Harbour. Last year, we kicked off with an opening keynote by Richard Johnson, Westpac Group’s Chief Information Security Officer, who enlightened our audience of over 200 Cybersecurity, IT, Data, Risk, and Compliance executives about the top three technologies reshaping the security landscape. TAL’s CISO offered valuable insights on crafting outcome-focused cyber security strategies, and Alex Hope, known as Australia’s Only Hacker, concluded the day with his experiences, including the time he hacked former Prime Minister Tony Abbott.

Divisional Information Security Officer
Allianz Technology Munich
Global Chief Information Security Officer
QBE Insurance
Head of Security Controls Assessment
Westpac Group
Head of Group Security Culture and Advisory
NAB
Head Cyber Strategy, Operations, Intel and Influence
ANZ Bank
Chief Information Security Officer
TAL
Chief Information Security Officer
Tyro Payments
Head of Technology and Cyber Risk
Cbus Super
CIO, CISO, Board Advisor, NED and Author
Head of Cyber Advisory and Application Security
Tyro Payments
Head of Information Security
Defence Bank
Master of Ceremonies
(MC)
Associate Vice President - Endpoint Security HCL BigFix Software, BFSI for APJ
HCL Software
Senior Director ANZ
SentinelOne
Vice President Sales, ANZ
Ping Identity

Stay tuned for further speaker announcements...

 
  • Applying history to the present: The emergence of the cyber discipline, the ramifications of the 1971 ‘Creeper’ program and the ways cyber warfare has evolved. 
  • Introducing artificial intelligence to software development: new opportunities for criminal exploitation, the automation of cyber-attacks, evading defense layers and scaling malicious activity.  
  • When Quantum and AI merge: accelerating the deployment of high-quality phishing campaigns, performing data mining exercises within microseconds and relinquishing privileged information through sophisticated ‘deepfake’ technologies.
  • While digital transformation has taken over CIO's agenda in many organisations, cybersecurity concerns are all time high for CISOs. Technology is getting smarter, so are criminals with more and more malicious attacks powered by AI!  
  • The future of security - focus on Zero Trust Architecture, tool consolidation, prioritization and remediation of vulnerabilities and enabling continuous compliance through automated endpoint assessment, analytics, and remediation. 
  • In this session, we will dive into the complex cybersecurity landscape in Australia, share best practices and real life examples on how to stay resilient with future-proof security technologies. 
 
 

 

  • Maintaining compliance with upcoming regulations while also achieving operational excellence and driving business outcomes is crucial. It involves ensuring that Australia's financial services industry aligns with international standards and finding ways to respond to increased regulatory demands from APRA and ASIC. 
  • Exploring technical advancements in methodologies such as Multi-Factor Authentication, Identity Access Management, and the use of geo-proximity data for password-less access to devices. 
  • Supporting critical business operations by consistently adhering to the principles of People, Processes, and Technology (PPT), enhancing end-to-end processes, implementing appropriate controls, and fostering innovation within the IT team.
  • Collaborating with vendors to offer complimentary cyber assessments and deliver first-class cyber advice to SMBs (Small-to-Medium Businesses). 
  • The challenges SMBs face in achieving full cyber security and NAB's commitment to guiding them towards cyber safety. 
  • Fostering employee security and growing participation in the cyber workforce through strategic partnerships.
  • Prepare for the criminal exploitation of AI: Anticipating an increase in attack vectors, the automation of cyber-attacks, and respond by automating layers of data protection and defense. 
  • Prevent quantum-powered cyber-attacks by implementing a post-quantum security framework that encrypts data located within cloud-based networks. 
  • Fortify your organisation against sophisticated threat actors through preventative IAM measures, upgrading your MFA technology, embarking on an organisation-wide enhancement of baseline controls. 
  • Collaborate with your data and IT team for cyber invulnerability: embedding ‘security by design’ as a core principle during software development and becoming a supporter of IT innovation
  • During economic downturns, it's crucial to shift your focus to tech stack consolidation and the ongoing enhancement of baseline controls, such as patch and vulnerability testing. 
  • Strengthening your core controls while bracing for challenging times: conduct a comprehensive enhancement of controls and confirm that your guardrails align with your risk tolerance. 
  • Ensuring operability within the boundaries of compliance: approaching security as a fundamental practice to satisfy basic regulatory demands and avoid blindly following the latest industry fads.
  • Embarking on a comprehensive enhancement of controls to support the Government's newly announced Six Cyber Shields strategy and collaborating with the state to transform Australia into a leading nation in cyber security. 
  • In preparation for APRA's CPS230, it is crucial to ensure that baseline controls are established, the use of multi-factor authentication is increased, and there is a heightened focus on managing third-party risks. 
  • Assessing the daily impact of oncoming regulation on your department: the consolidation of endpoints, updating end-of-life controls for existing software, and alleviating workforce pressures.
  • Preventative Strategies: Acknowledging the inevitability of cyber incidents and ensuring that routine security measures satisfy fundamental standards.
  • Proactive Strategies: Investigating how cyber experts are constructing frameworks to actively address the threat environment and enhance cyber and IT teams through automation.
  • Integration of Both: Comprehending the necessity of managing residual risks and considering cyber security as an all-encompassing task, steered by executive leadership

 

  • What are the required Skills, Knowledge, Experience and Behaviour 
  • The Elevator to my next CISO or CIO role 
  • Moments of Truth 
 
 

 

For event and marketing enquiries:
Jessica Cozanitis
Marketing Executive
T: +61 401 422 928
For sponsorship enquiries:
Marcus Sedman
Senior Account Director
T: +61 402 147 500
To participate as a speaker:
Stella Spackman
Senior Conference Producer
T: +61 433 732 794
Register

Please note that delegate attendance is complimentary for the financial services industry only.

Paid tickets are available for service providers to the industry (e.g., solution providers to the banking, insurance & wealth management industry) at the discretion of FST Media. For more information on vendor fees, please contact fsisales@fst.net.au or +61 2 8484 0918.

FST Media reserves the right to decline registration and entry to the event.

By agreeing to the Terms and Conditions for complimentary VIP Registration, you acknowledge that to qualify for that complimentary VIP pass the delegate needs to be currently employed by a Financial Services organisation.

Should you be unable to attend on the day of the conference, a ‘like-for-like’ substitute is welcome to attend in your stead at no extra charge, provided we are informed of the change up to 14 days prior to the conference. Any cancellations made within 14 days of the conference, with no relevant substitute provided, will incur a $150+ GST non-attendance fee. This fee will be used to cover delegate material costs and catering costs incurred by FST Media on submission of delegate numbers to the conference venue.

FST Media will make every effort to ensure that the event and the program will take place as advised. FST Media reserves the right to delete or alter items in the program and will not take financial responsibility for changes that are the result of events beyond its control, including travel and/or accommodation.

FST Media Terms & Conditions and Privacy Policy

By registering for this event you are agreeing to our privacy policy, you consent to the following:

  • The use of your personal information for the purposes of providing direct marketing material to you; and
  • The disclosure of your personal information to our event partners
  • Clause 3 of our Privacy Policy contains further information regarding how we may use your information to provide direct marketing material to you, and how you may opt out of any further material