Building business and operational resilience to cyber threats, compliance and third-party risk

19 - 21 July, 2022 (SGT) | Free Cyber Security Online Event

Fawad Bayunus

Cluster Head, Information Security Risk Officer Standard Chartered Bank

Having over 18 years of experience with demonstrated success and accomplishments in Big4 & financial institutions. He is a specialist with a focus on composing and implementing security policies & procedures, performing security maturity assessments, conducting security audits, ensuring security control compliance, and leading security transformation projects.

Fawad is privileged with diversified experience having worked in compliance, risk, technology & audit functions for different organisations. He has been a regional security lead for The Bank of Tokyo Mitsubishi UFJ. - Oceania and Information Technology Security Officer (ITSO) for ABN AMRO Clearing Bank – APAC.

He has also worked as a compliance specialist for Westpac bank, IT Risk Assurance & Security specialist for ING Bank, security assurance expert at PricewaterhouseCoopers (PwC) Australia. Other organisations include Askari Bank Limited, Samba Bank Limited, Silk Bank Limited and Aussie Forex & Finance.

He is a Masters in Information & Technology from the university of Canberra and holds certificate courses in cybersecurity, Info. System Audit, Operational Risk, Compliance and many others.

He is passionate about cybersecurity and believes that meaningful language for the “c-suite” and continuous learning for security specialists is the key to any organisation’s cybersecurity capability enhancement.

Day 1: 19th July 2022

14:00 Mitigating and controlling third-party security concerns

Different industries have different domains on how they manage third-party risk, and each industry will normally start with a framework to access the typical risk appetite in an organization. Fawad will give a few examples of different industries and what are the typical risk appetite with vendors exposed to, the level of engagement acquired and how to check security hygiene by leveraging on technologies to monitor and mitigate risk with focus on:  

  • Understanding of how to access reputation, external facing of different organization from a security hygiene point of view  
  • How to perceive and leverage technologies in advance to manage and mitigate risk  
  • How to handle and move forward with a non-compliant single vendor who provides specific solutions that is needed by an organization  
  • Ways to respond when there is a cyber-attack on a third-party vendor/business partner