<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

 

Copy of CISO Logo (3)

10am - 1:30pm AEDT
12pm - 3:30pm NZDT

CLAIM YOUR FREE PLACE

REQUEST A SPONSORSHIP PROSPECTUS


Day 1 - 16 March
10:00

KEYNOTE PANEL: The outlook for 2021 cyber threats landscape for financial services institutions

  • Overview of Australia’s and NZ’s ever-growing threats in 2021 and beyond
  • Assessing the risks of emerging technologies, such as deepfakes and 5G
  • How can you improve your defences capabilities and prevent risks?
  • What emerging technology can be employed for improved security?

Speaking:

Philip Kowalick

President, AIPIO

Nicholas McKenzie

Chief Security Office, NAB

Kostas Kyrifidis

President, Victorian Security Institute

Jacquelyn Painter

Senior Solutions Product Marketing Manager for Financial Services, Okta

KEYNOTE PANEL: The outlook for 2021 cyber threats landscape for financial services institutions

March 16 | 10:00 - 10:35

  • Overview of Australia’s and NZ’s ever-growing threats in 2021 and beyond
  • Assessing the risks of emerging technologies, such as deepfakes and 5G
  • How can you improve your defences capabilities and prevent risks?
  • What emerging technology can be employed for improved security?
CLAIM YOUR FREE PLACE

Speaking:

10:35

Augmenting native cloud security services to achieve enterprise-grade security for financial services

Appropriate use of native security controls in Amazon Web Services, Microsoft Azure and Google Cloud Platform is essential to managing cloud risk (and avoiding a costly breach). However, many organisations struggle with determining when and how to use these native security controls, doing so in a consistent fashion and also understanding how and when to augment these to ensure continuous security and compliance.

This session will cover:

  • How and when to use native cloud security controls
  • Why and when you may want to augment these controls
  • How to leverage automation to gain continuous security and compliance in public cloud

Speaking:

Christopher Hertz

Christopher Hertz, Vice President, Cloud Security, Rapid7

Augmenting native cloud security services to achieve enterprise-grade security for financial services

March 16 | 10:35 - 11:00

Appropriate use of native security controls in Amazon Web Services, Microsoft Azure and Google Cloud Platform is essential to managing cloud risk (and avoiding a costly breach). However, many organisations struggle with determining when and how to use these native security controls, doing so in a consistent fashion and also understanding how and when to augment these to ensure continuous security and compliance.

This session will cover:

  • How and when to use native cloud security controls
  • Why and when you may want to augment these controls
  • How to leverage automation to gain continuous security and compliance in public cloud
CLAIM YOUR FREE PLACE

Speaking:

11:00

The application of CX into cybersecurity

Speaking:

Jen Waugh

Senior Manager, Information Security, Pepper Financial Services

The application of CX into cybersecurity

March 16 | 11:00 - 11:125

CLAIM YOUR FREE PLACE

Speaking:

11:25

Identity and access management in a post pandemic world

For the past decade, we’ve been discussing the rise of cloud app technology, constant connectivity, and mobile devices. Now it’s not just easy to work from anywhere - employees expect it. As a result, IT is more challenged than ever to manage and protect a distributed workforce.

In this session, Lloyd Evans APAC Sales. Manager for LastPass who will be discussing the key insights and strategies to fortify the cyber security posture across all sectors of the economy in a work-from-anywhere world.

Speaking:

Lloyd Evans

APAC Sales Manager, LastPass

Identity and access management in a post pandemic world

March 16 | 11:25 - 11:50

For the past decade, we’ve been discussing the rise of cloud app technology, constant connectivity, and mobile devices. Now it’s not just easy to work from anywhere - employees expect it. As a result, IT is more challenged than ever to manage and protect a distributed workforce.

In this session, Lloyd Evans APAC Sales. Manager for LastPass who will be discussing the key insights and strategies to fortify the cyber security posture across all sectors of the economy in a work-from-anywhere world.

CLAIM YOUR FREE PLACE

Speaking:

11:50

Incorporating cybersecurity into the broader risk management

  • Creating efficient risk assessment, monitoring and response processes
  • Refining the enterprise’s risk metrics to identify hidden and complex exploit points
  • Improving cyber risk management performance through effective governance

Speaking:

Eric Keser

Senior Manager, Technology Services Advisory, AustralianSuper

Incorporating cybersecurity into the broader risk management

March 16 | 11:50 - 12:15

  • Creating efficient risk assessment, monitoring and response processes
  • Refining the enterprise’s risk metrics to identify hidden and complex exploit points
  • Improving cyber risk management performance through effective governance
CLAIM YOUR FREE PLACE

Speaking:

12:15

Tales from the Cloud: Lessons from Check Point’s Incident Response Team

Cyber criminals continue to change their approach for cloud attacks, are you updating your cyber strategy to address these emerging cloud based attacks? In this session, Ashwin Ram will share emerging cloud threats every CISO must be aware of, if you have a cloud adoption strategy or are already using cloud infrastructure and services.

  • Understanding new and emerging attack vectors for cloud
  • Subtle changes allowing cyber criminals to bypass your defence
  • Critical focus areas for cloud security in 2021

Speaking:

Ashwin Ram

Cyber Security Evangelist, Office of the Chief Technology Officer, Check Point

Tales from the Cloud: Lessons from Check Point’s Incident Response Team

March 16 | 12:15 - 12:40

Cyber criminals continue to change their approach for cloud attacks, are you updating your cyber strategy to address these emerging cloud based attacks? In this session, Ashwin Ram will share emerging cloud threats every CISO must be aware of, if you have a cloud adoption strategy or are already using cloud infrastructure and services.

  • Understanding new and emerging attack vectors for cloud
  • Subtle changes allowing cyber criminals to bypass your defence
  • Critical focus areas for cloud security in 2021
CLAIM YOUR FREE PLACE

Speaking:

12:40

Close of Day One

Close of Day One

March 16 | 12:40

CLAIM YOUR FREE PLACE

Speaking:

Day 2 - 17 March
10:00

PANEL: Strengthening the culture and making cybersecurity a shared responsibility within the enterprise

  • What are the biggest challenges when creating risk awareness and building a cybersecurity driven culture?
  • How to encourage everybody to take ownership of cyber?
  • Exploring business cases of companies that are successfully overcoming these challenges
  • What will the future of work look like in 2021 and what challenges would these trends represent to cybersecurity executives?

Speaking:

Raghu Nandakumara

Field CTO, Illumio

Tony Arnold

Head of Information Security Office, ANZ Bank (NZ)

Saikiran Maruvada

Cybersecurity Strategy & Management Consultant, Beyond Bank Australia

Matt Maddocks

Risk Advisory Consultant

PANEL: Strengthening the culture and making cybersecurity a shared responsibility within the enterprise

March 17 | 10:00 - 10:35

  • What are the biggest challenges when creating risk awareness and building a cybersecurity driven culture?
  • How to encourage everybody to take ownership of cyber?
  • Exploring business cases of companies that are successfully overcoming these challenges
  • What will the future of work look like in 2021 and what challenges would these trends represent to cybersecurity executives?
CLAIM YOUR FREE PLACE

Speaking:

10:35

Finding Success by Adopting a SASE Architecture

In a world where digital transformation is accelerating, with our data no longer in an environment we control, this session will explore how security programs need to transform in order to address the challenges posed.

Speaking:

Michael Ferguson

Senior Sales Engineer, Netskope

Finding Success by Adopting a SASE Architecture

March 17 | 10:35 - 11:05

In a world where digital transformation is accelerating, with our data no longer in an environment we control, this session will explore how security programs need to transform in order to address the challenges posed.

CLAIM YOUR FREE PLACE

Speaking:

11:05

Live Interview: Embracing the human element when creating your cybersecurity culture

Speaking:

Jacinda Murphy

Manager, Cyber & Technology Risk, Westpac New Zealand

Paul McInerney

Vice-President, ITPA

Live Interview: Embracing the human element when creating your cybersecurity culture

March 17 | 11:05 - 11:40

CLAIM YOUR FREE PLACE

Speaking:

11:40

INTERNATIONAL KEYNOTE SESSION: Leading in crisis: creating a successful incident response plan

  • Defining the processes to respond to incidents quickly, effectively and with minimal consequences
  • Developing a scenario exercise to predict risks and anticipate how prepared you are for an attack
  • What are the best strategies to minimise financial and reputational losses?

Speaking:

Wahyu Agung Prasetyo

Bank Danamon (Indonesia)

INTERNATIONAL KEYNOTE SESSION: Leading in crisis: creating a successful incident response plan

March 17 | 11:40 - 12:05

  • Defining the processes to respond to incidents quickly, effectively and with minimal consequences
  • Developing a scenario exercise to predict risks and anticipate how prepared you are for an attack
  • What are the best strategies to minimise financial and reputational losses?
CLAIM YOUR FREE PLACE

Speaking:

12:25

Close of Day Two

Close of Day Two

March 17 | 12:25

CLAIM YOUR FREE PLACE

Speaking:

Terms & Conditions

The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.

Disclosure of your information

You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:

- Business partners
- Suppliers
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Brella or Webinar.net.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing inquiries@coriniumintel.com

Data protection

The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at info@coriniumintel.com