ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Fraud & Breach Prevention Summit: Sydney

July 19, 2018

Register Now

SUMMARY / Fraud & Breach Prevention

Jeremy Kirk

Managing Editor, Security and Technology

The data stolen during a breach is used for many purposes, but especially for fraud. Security and fraud teams are working ever more closely together, both pre- and post-breach, to ensure that they are in the best possible position to defend, detect and respond. In this dual track day, intended for senior InfoSec and Fraud professionals, we’ll focus on the latest fraud techniques and technologies, as well as a holistic, strategic approach to looking at the data breach problem that effects all industries. Feel free to switch between sessions in each track and network with your peers as well as our speakers and sponsors throughout the day.

Attendees also gain onDemand access to all summit recordings and our curriculum of 400+ webinars after the Summit.

Details

Venue TBD

AUD$495

Register Now

Registering For a Group?
Call + 1 (609)-356-1499

  • Event Gallery

Philip Reitinger

President & CEO, Global Cyber Alliance; former Deputy Undersecretary for Cybersecurity, Department of Homeland Security; former CISO, Sony

Mike D'Agostino

General Manager, ISMG

Kay Lam-MacLeod

Principal, Idealaw

Tom Field

SVP, Editorial, ISMG

Ian Yip

Chief Technology Officer - Asia Pacific, McAfee; former Director of Cybersecurity, Ernst & Young

Ben Chung

CISO, NTT Communications, NTT Communications ICT Solutions

Catherine Buhler

CISO, BlueScope Steel

Mark Doepel

Cyber Insurance Attorney and Partner, Sparke Helmore; Chairman and Director, Lloyd's Australia Ltd.

PAST SPEAKERS / Featured Speakers From Our Past Sydney Summit

Gordon Hughes

Attorney, Davies Collison Cave

Jeremy Kirk

Managing Editor, Security and Technology, ISMG

Phil Marshall

Chief Research Officer - Tolaga Research

Alex Mosher

Vice President of Security Strategy, CA Technologies

Ian Yip

Chief Technology Officer - Asia Pacific, McAfee; former Director of Cybersecurity, Ernst & Young

Ben Chung

CISO, NTT Communications, NTT Communications ICT Solutions

Patrick Gunning

Partner, King & Wood Mallesons

Kay Lam-MacLeod

Principal, Idealaw

Catherine Buhler

CISO, BlueScope Steel

Stuart Mort

Director of Cybersecurity, Optus

Mark Doepel

Cyber Insurance Attorney and Partner, Sparke Helmore; Chairman and Director, Lloyd's Australia Ltd.

Phil Cole

Team Leader, Security Operations, AusCERT

Alex Tilley

Counter Threat Unit Intelligence Team, Dell SecureWorks

Daniel Rodriguez

Agent, Australian Federal Police Cybercrime Operations - Melbourne

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Schedule / Session Date & Times



  • Thursday, July 19th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:00 am -
8:45 am
8:00 am - 8:45 am

Registration, Breakfast, & Networking

8:45 am -
9:00 am
8:45 am - 9:00 am

Opening Remarks

9:00 am -
10:00 am
9:00 am - 10:00 am

Keynote: The Emerging Threat Landscape: How To Keep Ahead in Cyberspace

As information-security threats intensify, organizations risk becoming disoriented – focused more on grappling with complex technology, an explosion of data, increased regulation and a debilitating skills shortage. This is a huge danger, since prompt action is required to interpret an increasingly complex threat horizon, which could place organizations and their goals at risk. By preparing for the unknown, organizations will have the flexibility to withstand unexpected, high-impact security attacks and events. This session will review the top global security threats for 2017 and how organizations can prepare for them.

10:05 am -
10:40 am
10:05 am - 10:40 am

Fighting the Next Generation of Targeted BEC Attacks

Business email compromise (BEC) attacks that impersonate executives and business partners to trick employees comprise the biggest cyberthreat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.

This session will review why email spoofing works, current BEC trends and attack methods, and advances in technology that are being used to identify and block BEC attacks before they hit the inbox.

10:40 am -
11:10 am
10:40 am - 11:10 am

Exhibiting & Networking Break

11:10 am -
12:10 pm
11:10 am - 12:10 pm

Ransomware: Trends, Challenges and Initiatives to Mitigate Ongoing Risks

This session will review ransomware, exploring why it continues, how to battle it and what the future portends. Using real-world examples, this session will walk through some recent ransomware campaigns and discuss new developments in ransomware attacks. How should organizations shore up their defenses and mitigate their risks? And what role, if any, should banking institutions play in ensuring their customers are protected?

12:10 pm -
1:10 pm
12:10 pm - 1:10 pm

Lunch

1:10 pm -
1:45 pm
1:10 pm - 1:45 pm

Speed Networking

One of the most valuable ways to learn is through interaction with your peers. Our “Speed Networking” session will provide an opportunity to meet practitioners who have similar challenges in the arena of fraud and breach prevention and discuss solutions to those potential obstacles. Mingle, share and learn in this unique, rapid fire and interactive environment.

1:45 pm -
2:15 pm
1:45 pm - 2:15 pm

Panel: How Australia's Mandatory Breach Disclosure Law Will Impact Your Business

After several years of discussion, Australia’s Parliament passed a mandatory breach notification/disclosure law in February. It requires organisations to notify affected consumers and regulators, ensuring transparency in an era of ever-increasing cyberattacks. Although large organisations generally follow the advice of Office of the Australian Information Commissioner and voluntarily disclose breaches, the new law brings a complex issue to the forefront to some for the first time. The legislation also comes after a January federal court decision that loosened the definition of what constitutes personal information, excluding IP addresses and other network information not directly collected from a customer. In this one-hour session, we will host a data protection expert, who will kick off the discussion with a walk-through of the legislation, discussing key compliance questions that arise. He will analyse the implication of the 2017 ruling, in light of the law, and what obligations organisations should keep in mind as they contemplate their own compliance considerations. From there, we will move into an interactive panel discussion about the new law and what it means for Australian businesses of all sizes

2:20 pm -
2:50 pm
2:20 pm - 2:50 pm

Deception Technology: When It Works, It Works. But What about When It Goes Wrong?

Deception is the most successful strategy in military history. Just as armies used deceit to conquer continents, cyber-deception is being used by more and more organizations to exploit a hacker’s greatest weakness – being a human, after all, behind a keyboard. Deception techniques such as honeypots are not a new. But new techniques and capabilities are delivering new approaches to how cyberthreats are dealt with, proactively. During this session, we will deconstruct recent attacks from a hacker’s perspective and show how you can use deception technology to detect stealthy attacks, illuminate network blind spots and minimize breach detection time – highlighting the benefits of deception defenses. But what about when these techniques don’t work as planned? Can deception technology actually create more problems long-term? We will explore the positives and negatives of deception technology.

2:50 pm -
3:05 pm
2:50 pm - 3:05 pm

Exhibiting & Networking Break

3:05 pm -
3:55 pm
3:05 pm - 3:55 pm

Security Controls vs. Customer Experience - A Dichotomy

The landscape of corporate and retail payments across channels such as mobile and online, and across emerging products such as Apple Pay, provide customer convenience and satisfaction. But these new channels and technologies also create opportunities for fraudsters. This session offers lessons learned for creating a robust fraud defense for today and into tomorrow. These best practices will help organizations balance customer expectations with the confidence that fraud risk is being controlled effectively and efficiently.

Highlights for this session include:

  • Applying best practices in real-time analytics to stay ahead of fraud in emerging payment channels and new technologies;
  • Bringing together financial and non-financial account and customer data with data from multiple access devices to gain more insight into customer behavior and fraud patterns;
  • Creating competitive differentiation by improving the customer experience and controlling fraud risk.
4:00 pm -
4:35 pm
4:00 pm - 4:35 pm

Blockchain Technology: Lessons Learned from BitCoin

Although developed as a core technology underlying the infamous bitcoin, the blockchain ledger mechanism is proving to have a multitude of potential use cases, from IoT micropayments to capital market trading, retail banking and even voting. The bitcoin blockchain is, in effect, a distributed ledger, shared with hundreds of thousands of automated machine auditors all running the bitcoin open source code; they verify the authenticity of every transaction, drastically reducing, if not completely eliminating, fraudulent entries.

Many current transaction mechanisms are vulnerable to fraud, and in this session, we’ll walk through the potential impact of broader blockchain deployment, and review cybersecurity lessons blockchain technology provides for other deployments.

4:35 pm -
4:45 pm
4:35 pm - 4:45 pm

Closing Remarks

4:45 pm -
5:45 pm
4:45 pm - 5:45 pm

Cocktails and Networking

View Schedule

SPONSORS / Supporting Organizations

Arbor Networks
Attivo Networks
Biocatch
bitglass
CA Technologies
Cyber Ark
Darktrace
DF Labs
FireEye
FIS
IBM
InAuth
Information Security Forum (ISF)
Ixia
LexisNexis
NSS Labs
RSA
Skybox
Tata Communications
Thycotic

LOCATION / Venue & Address

Venue TBD

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Register Now

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismg.io

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data