Speaking:
President, AIPIO
Chief Customer Information Officer, Ping Identity
Vice President, IT Audit, BNP Paribas
IT Risk and Security Manager, MetLife
November 9 | 10:00 - 10:41
Speaking:
Head of Industry Solutions, Illumio
November 9 | 10:41 - 11:06
Speaking:
Cluster Head, Information & Cybersecurity Risk - Pakistan & Middle East
November 9 | 11:06 - 11:23
Join this presentation to learn how Haventec's patented single-step passwordless MFA enables you to create seamless and secure digital experiences for customers and employees.
Speaking:
Chief Growth Officer, Haventec
Speaking:
Senior Manager, Information Security, AUSIEX
November 9 | 11:42 - 12:00
Secure identity management has evolved to support how customers engage with financial institutions, and how institutions leverage applications and data internally and through their partner ecosystem to drive new business. How do core identity-driven functions enable federated, policy-based access and data privacy? This session will align key IAM and security functions across organizations, customers, and external partners to the core principles of Open Banking. Attendees will learn:
Speaking:
Senior Solutions Product Marketing Manager for Financial Services, Okta
November 9 | 12:00 - 12:20
Secure identity management has evolved to support how customers engage with financial institutions, and how institutions leverage applications and data internally and through their partner ecosystem to drive new business. How do core identity-driven functions enable federated, policy-based access and data privacy? This session will align key IAM and security functions across organizations, customers, and external partners to the core principles of Open Banking. Attendees will learn:
Speaking:
Information Security Consultant, ASB Bank
November 9 | 12:20 - 12:43
Speaking:
Chief Executive Officer, AIIA
CISO, Holland Insurance
Head of Information Security, Openpay
Senior Director for Research, Checkmarx
November 9 | 12:43 - 13:30
Speaking:
CEO, Cyber Leadership Institute
Head of Information Security, The Co-Operative Bank
Lead Solution Architect, Rapid7
President, Victorian Security Institute
November 10 | 10:00 - 10:45
Speaking:
Regional Director, ANZ, Checkmarx
November 10 | 10:45 - 11:00
Speaking:
Cyber Security Evangelist, Office of the Chief Technology Officer, Check Point
Deputy CISO, Medibank
CISO, Holland Insurance
November 10 | 11:00 - 11:46
Traditionally, the IT industry has relied on perimeter security strategies to protect its most valuable resources like user data and intellectual property. However, the move to hybrid cloud infrastructure are changing the way the FSI organisations do business. Relying on a network perimeter is no longer sufficient, with many enterprises currently operating with a patchwork of security solutions and tools with poor integration. In addition, the cost of integrating these systems, as cloud is adopted, is exploding. The industry needs new architectural practices and programs that break through these monolithic practices so that companies can move faster in finding, removing, detecting, and responding to incidents. Cyber Security teams need to spend less time building integrated solutions, and more time countering threats to their organisations.
According to the 2021 Cost of a Data Breach Report, in Australia, the time it takes to detect, respond and recover from cyber incidents is over 300 days. Join this session and understand how organisations can tackle these issues via:
Speaking:
CTO, Cyber Security, IBM Australia & New Zealand
November 10 | 11:46 - 12:07
Traditionally, the IT industry has relied on perimeter security strategies to protect its most valuable resources like user data and intellectual property. However, the move to hybrid cloud infrastructure are changing the way the FSI organisations do business. Relying on a network perimeter is no longer sufficient, with many enterprises currently operating with a patchwork of security solutions and tools with poor integration. In addition, the cost of integrating these systems, as cloud is adopted, is exploding. The industry needs new architectural practices and programs that break through these monolithic practices so that companies can move faster in finding, removing, detecting, and responding to incidents. Cyber Security teams need to spend less time building integrated solutions, and more time countering threats to their organisations.
According to the 2021 Cost of a Data Breach Report, in Australia, the time it takes to detect, respond and recover from cyber incidents is over 300 days. Join this session and understand how organisations can tackle these issues via:
Speaking:
President, Victorian Security Institute
Head of Information Security, AUB Group
Cyber Resilience Manager, UniSuper
Head of Technology (FSI), Google
November 10 | 12:07 - 12:45
Terms & Conditions
The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.
Disclosure of your information
You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:
- Business partners
- Suppliers
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Brella or Webinar.net.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing inquiries@coriniumintel.com
Data protection
The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at info@coriniumintel.com