2021 and beyond requires a foundational change to how a cyber leader views their threatscape, engages the business and architects their processes for a secure cyber future. In this session, hear a panel of cyber execs opine on how exactly they are doing this to drive a future-proof cyber security function that enables sustainable business innovation moving forward. They will share views around:
• What changes do you anticipate in your threatscape over the next 5 years?
• What is the top challenge you are focused on addressing at your organisation?
• How do you envision your cyber security set up needing to change to support more proactivity into the future?
• What approaches are you using to improve top-down understanding and ownership of cyber-safe practices?
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.
In this session, learn about:
· Paradigm shifts in the cyber landscape
· Advancements in offensive AI attack techniques
· The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
· Real-world examples of emerging threats that were stopped with Cyber AI
Most organisations are well into their journey towards cloud, and are enjoying the advantages that cloud brings to business. We hear so much about ransomware and high profile product vulnerabilities that the challenge in securing cloud operations has almost become lost in the noise.
However cloud-derived breaches are some of the most high profile, and some of the most devastating in history. As cloud strategies evolve to meet contemporary realities like SDWAN and distributed workforces, the edge is likely to become one of our riskiest areas.
At MinterEllison, APAC’s largest law firm, Sunil’s working hard to ensure his cyber team is maximising security outcomes in a truly responsive manner whilst managing skillset constraints that challenge the infosec community globally. Add to these challenges a remote workforce with personal networks, disparate practices and ultimately a larger, complex threatscape generating approx. 2 billion events per month. In this session, learn how Sunil is leading his team for success by:
• Using foundations of user-centricity to increase security “barriers” without impacting staff outcomes and productivity
• Increasing the scope for automation to support resource shortages and improve infosec & cyber proactivity
• Overcoming challenges with improving staff awareness and behaviours around cyber risks
Historically, cybersecurity has focused on protection, preventing threats exploiting weaknesses within an organization. This is changing as organisations accept that due to gaps in defences allied with the attack's sophistication, threats will enter your organization and often remain undetected for weeks or months, exfiltrating data and moving across your assets. Businesses are increasingly focusing on threat detection and response to address this risk.
In this ever-evolving landscape, it is imperative to understand the right threat detection and response approach for your organisation; is it the Endpoint Detection and Response (EDR), or Extended Detection and Response (XDR) or Managed Detection and Response (MDR), and what are next-generation defences required.
The session will discuss:
A robust data security strategy and capability is a perquisite for secure operations in a cloud-first future. At BHP, Mathieu has been leading the charge to bring more automation into how the organisation classifies, encrypts and protects data across internal and third party environments and overcomes challenges with securing endpoints sitting outside of the organisation’s network without impeding on the user experience. In this session, he’ll showcase the remarkable work done over the last 3 years around:
• Developing a solid, integrated foundation of security solutions for full control over data across internal and third-party environments
• Balancing confidentiality, availability, and business viability, from policy and appropriate access standpoints
• Taking staff through a cultural transformation journey to bring maturity into secure practices adoption
• Using DLP tools as a safety net rather than a blocker for user experience