<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

 

0883 CISO FSI Logo

10am - 1:30pm AEDT
12pm - 3:30pm NZDT

CLAIM YOUR FREE PLACE

REQUEST A SPONSORSHIP PROSPECTUS  


Day 1 - 9 November
10:00

KEYNOTE PANEL: Addressing key InfoSec issues for FSI organisations

  • Exploring the cyber threats landscape for financial services institutions in H2 2021 and beyond
  • Assessing the risks of emerging technologies, such as quantum computing, deepfakes and 5G
  • How can you improve your defences capabilities and prevent risks?
  • What emerging technology can be employed for improved security?

Speaking:

Phillip Kowalick

President, AIPIO

KEYNOTE PANEL: Addressing key InfoSec issues for FSI organisations

November 9 | 10:00 - 10:40

  • Exploring the cyber threats landscape for financial services institutions in H2 2021 and beyond
  • Assessing the risks of emerging technologies, such as quantum computing, deepfakes and 5G
  • How can you improve your defences capabilities and prevent risks?
  • What emerging technology can be employed for improved security?
CLAIM YOUR FREE PLACE

Speaking:

10:40

Dynamic cybersecurity: Adapting to a fast-evolving IT landscape

  • Overview of the benefits and risks of emerging technologies
  • Adopting new IT systems with a robust risk and cybersecurity management embedded to it
  • How can you build a cybersecurity, regulatory compliance and data privacy framework?

Speaking:

Raghu Nandakumara

Field CTO, Illumio

Dynamic cybersecurity: Adapting to a fast-evolving IT landscape

November 9 | 10:40 - 11:05

  • Overview of the benefits and risks of emerging technologies
  • Adopting new IT systems with a robust risk and cybersecurity management embedded to it
  • How can you build a cybersecurity, regulatory compliance and data privacy framework?
CLAIM YOUR FREE PLACE

Speaking:

11:05

INTERNATIONAL KEYNOTE: Adopting a risk-based security approach

  • Exploring the challenges of getting cybersecurity into the company’s risk management structure
  • Explaining risk potentials to the board when seeking funds for security projects
  • Creating efficient risk assessment, monitoring and response processes
  • Refining the enterprise’s risk metrics to identify hidden and complex exploit points
  • Improving cyber risk management performance through effective governance

Speaking:

Fawad Bayunus

Head of Information Security, Standard Chartered Bank (Pakistan & Middle East)

INTERNATIONAL KEYNOTE: Adopting a risk-based security approach

November 9 | 11:05 - 11:30

  • Exploring the challenges of getting cybersecurity into the company’s risk management structure
  • Explaining risk potentials to the board when seeking funds for security projects
  • Creating efficient risk assessment, monitoring and response processes
  • Refining the enterprise’s risk metrics to identify hidden and complex exploit points
  • Improving cyber risk management performance through effective governance
CLAIM YOUR FREE PLACE

Speaking:

11:30

Trust and digital identity and accessibility

Join this presentation to discuss a new way to create a digital identity that’s accessible to everyone. We’ll explore how companies protect their customers’ identity by eradicating passwords and using clever mathematics to protect your devices.

Speaking:

David Maunsell

CEO, Haventec

Trust and digital identity and accessibility

November 9 | 11:30 - 11:55

Join this presentation to discuss a new way to create a digital identity that’s accessible to everyone. We’ll explore how companies protect their customers’ identity by eradicating passwords and using clever mathematics to protect your devices.

CLAIM YOUR FREE PLACE

Speaking:

11:55

Successful automated vulnerability assessment and management strategies

  • Identifying gaps and creating a successful management plan
  • Defining the processes to respond to incidents quickly, effectively and with minimal consequences
  • Developing a scenario exercise to predict risks and anticipate how prepared you are for an attack
  • What are the best strategies to minimise financial and reputational losses?

Speaking:

John Giudice

Cyber Security Vulnerability Management Lead, IAG

Successful automated vulnerability assessment and management strategies

November 9 | 11:55 - 12:20

  • Identifying gaps and creating a successful management plan
  • Defining the processes to respond to incidents quickly, effectively and with minimal consequences
  • Developing a scenario exercise to predict risks and anticipate how prepared you are for an attack
  • What are the best strategies to minimise financial and reputational losses?
CLAIM YOUR FREE PLACE

Speaking:

12:20

Crime-Stoppers Talk: Reducing risks of financial cybercrime and fraud

  • Understanding the vulnerabilities and exploit points inherent in automation and digitalization
  • Reducing organisational silos to strengthen your boundaries
  • Applying advanced tools and technologies for threat detection, interdiction and prevention

Crime-Stoppers Talk: Reducing risks of financial cybercrime and fraud

November 9 | 12:20 - 12:45

  • Understanding the vulnerabilities and exploit points inherent in automation and digitalization
  • Reducing organisational silos to strengthen your boundaries
  • Applying advanced tools and technologies for threat detection, interdiction and prevention
CLAIM YOUR FREE PLACE

Speaking:

12:45

Delivering Effective Cyber Security Strategy

  • Creating alignment with business strategy
  • Stakeholder buy-in and board engagement
  • Evolving strategy and coping with threat landscape
  • Creating strategic project portfolio and strategy execution
  • Reporting and measuring success

Speaking:

Zeshan Shahzad

Information Security Consultant, ASB Bank

Delivering Effective Cyber Security Strategy

November 9 | 12:45 - 13:10

  • Creating alignment with business strategy
  • Stakeholder buy-in and board engagement
  • Evolving strategy and coping with threat landscape
  • Creating strategic project portfolio and strategy execution
  • Reporting and measuring success
CLAIM YOUR FREE PLACE

Speaking:

1:10

FIRESIDE CHAT: No party is better than third-party: Securely managing vendors’ risks

  • What are the cybersecurity implications of third party management in the financial services sector?
  • Understanding and addressing the cyber risks behind this
  • Challenges presented by third party identity management – and how to overcome it
  • How to ensure your organisation is complying with CDR rules when adopting this approach?

Speaking:

Grae Meyer-Gleaves

CISO, Holland Insurance

Eesh Kharbanda

Head of Information Security, Openpay

FIRESIDE CHAT: No party is better than third-party: Securely managing vendors’ risks

November 9 | 13:10 - 13:50

  • What are the cybersecurity implications of third party management in the financial services sector?
  • Understanding and addressing the cyber risks behind this
  • Challenges presented by third party identity management – and how to overcome it
  • How to ensure your organisation is complying with CDR rules when adopting this approach?
CLAIM YOUR FREE PLACE

Speaking:

1:50

Close of Day One

Close of Day One

November 9 | 13:50

CLAIM YOUR FREE PLACE

Speaking:

Day 2 - 10 November
10:00

KEYNOTE PANEL: Strengthening your cyber culture and getting everyone on-board

  • What are the biggest challenges when creating risk awareness and building a cybersecurity driven culture?
  • How to encourage everybody to take ownership of cyber?
  • Exploring strategies to create executive influence by developing communications skills
  • What will the future of work look like in 2022 and what challenges would these trends represent to cybersecurity executives?

Speaking:

Phil Zongo

Head of IT Risk & Security, Crestone Wealth Management

Nick Tucker

Head of Information Security, The Co-Operative Bank

Belinda Mack

Senior Consultant, Information Security Awareness, MLC Life

KEYNOTE PANEL: Strengthening your cyber culture and getting everyone on-board

November 10 | 10:00 - 10:40

  • What are the biggest challenges when creating risk awareness and building a cybersecurity driven culture?
  • How to encourage everybody to take ownership of cyber?
  • Exploring strategies to create executive influence by developing communications skills
  • What will the future of work look like in 2022 and what challenges would these trends represent to cybersecurity executives?
CLAIM YOUR FREE PLACE

Speaking:

10:40

Reinforcing your Boundaries with IAM

Many organisations are implementing an integrated identity access and governance management to overcome the challenges they face when upgrading business operations, modernising aging infrastructure and protecting network perimeters. Join us to learn how IAM is successfully helping safeguard your organisation while scaling up.

Reinforcing your Boundaries with IAM

November 10 | 10:40 - 11:05

Many organisations are implementing an integrated identity access and governance management to overcome the challenges they face when upgrading business operations, modernising aging infrastructure and protecting network perimeters. Join us to learn how IAM is successfully helping safeguard your organisation while scaling up.

CLAIM YOUR FREE PLACE

Speaking:

11:05

INTERACTIVE DISCUSSION: The Future of Work & what it means for cybersecurity

  • How cyber super stars are overcoming challenges of flexibility and digital transformation
  • Exploring opportunities to develop new cybersecurity talents
  • Investing in your teams’ skills and capabilities
  • Strengthening security strategies through your most valuable asset – people

Speaking:

Mark Jones

Deputy CISO, Medibank

Grae Meyer-Gleaves

CISO, Holland Insurance

INTERACTIVE DISCUSSION: The Future of Work & what it means for cybersecurity

November 10 | 11:05 - 11:45

  • How cyber super stars are overcoming challenges of flexibility and digital transformation
  • Exploring opportunities to develop new cybersecurity talents
  • Investing in your teams’ skills and capabilities
  • Strengthening security strategies through your most valuable asset – people
CLAIM YOUR FREE PLACE

Speaking:

11:45

Digital identity: Secure CX is ‘sexy’

  • Exploring the risks and implications of digital identity solutions
  • Assessing the cybersecurity implications of identity and access controls
  • How can we adopt agile IAM?
  • What are the risks and benefits of this approach?
  • Keys to success when implement identity management

Digital identity: Secure CX is ‘sexy’

November 10 | 11:45 - 12:10

  • Exploring the risks and implications of digital identity solutions
  • Assessing the cybersecurity implications of identity and access controls
  • How can we adopt agile IAM?
  • What are the risks and benefits of this approach?
  • Keys to success when implement identity management
CLAIM YOUR FREE PLACE

Speaking:

12:10

PANEL DISCUSSION: Rethinking security and adopting a people-centric approach

  • Exploring ongoing and new threats from the transition to remote and digital
  • How to encourage everybody to take ownership of security?
  • Strategies to improve your teams’ skills and knowledge in IT and cybersecurity
  • Exploring how innovative technologies can help your company achieve adaptability and resilience

Speaking:

Mangaraja Saut Martua

Head of Information Security, ING Australia

David Geber

Head of Information Security, AUB Group

Christie Wilson

Cyber Resilience Manager, UniSuper

PANEL DISCUSSION: Rethinking security and adopting a people-centric approach

November 10 | 12:10 - 12:50

  • Exploring ongoing and new threats from the transition to remote and digital
  • How to encourage everybody to take ownership of security?
  • Strategies to improve your teams’ skills and knowledge in IT and cybersecurity
  • Exploring how innovative technologies can help your company achieve adaptability and resilience
CLAIM YOUR FREE PLACE

Speaking:

12:50

Social Engineering – Protecting your people and organisations against cyber-attacks

  • Influencing user behaviour and effective awareness programs
  • Importance of human factor to cyber security and why most cyber awareness efforts fail
  • Tailoring security awareness programs to address cyber risks and business priorities
  • Strategies to influence behaviour and create a cyber-safe culture

Speaking:

Aashish Pathak

Senior Manager, Information Security, AUSIEX

Social Engineering – Protecting your people and organisations against cyber-attacks

November 10 | 12:50 - 13:15

  • Influencing user behaviour and effective awareness programs
  • Importance of human factor to cyber security and why most cyber awareness efforts fail
  • Tailoring security awareness programs to address cyber risks and business priorities
  • Strategies to influence behaviour and create a cyber-safe culture
CLAIM YOUR FREE PLACE

Speaking:

1:15

Close of Day Two

Close of Day Two

November 10 | 13:15

CLAIM YOUR FREE PLACE

Speaking:

Terms & Conditions

The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.

Disclosure of your information

You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:

- Business partners
- Suppliers
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Brella or Webinar.net.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing inquiries@coriniumintel.com

Data protection

The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at info@coriniumintel.com