20 March 2025 (Thursday)
Time | Sessions |
---|---|
As quantum computing advances, it poses both challenges and opportunities for the banking sector's digital landscape. This session will explore how banks and financial institutes adopt the new quantum technologies in terms of strategy, risks and timeline perspectives. How should the decision makers plan and prioritize the encryption estate by state-of-the-art security devices to secure critical applications from potential future quantum computing attacks |
|
The headlines tell the story of high-profile breaches, but what happens behind the scenes? This panel uncovers the anatomy of 2024’s most impactful cyber incidents, revealing the lessons learned and strategic shifts made in their wake. Expect lively discussion on incident response, redundancy planning, and leveraging collaboration—because when it comes to cybersecurity, every crisis is a chance to level up. Panelists:
Moderator:
|
|
10:20am |
Coffee Break |
As companies undergo digital transformation, cyber threats are evolving to exploit all possible attack vectors. From external vulnerabilities to phishing and identity theft, attackers leverage various techniques to breach organizations. This session will explore how companies can gain visibility into risks associated with their digital footprint, validate external exposures, and adopt proactive strategies to mitigate threats before they escalate. Discover how impactful intelligence can enhance your organization's security posture by identifying risks, validating exposures, and proactively mitigating threats in today’s digital landscape |
|
Can we trust what we see and hear? Increasingly sophisticated, adversaries are crafty in how fraud campaigns are designed and executed. The proliferation of AI adoption, in combination with easy access to personal data from open sources boost such attacks on our identities with laser sharp precision connivingly. The use of advanced deepfake generation tools and powerful compute resources further challenge our realities and impede our digital defence stance. This session covers tested considerations for multi-layered identity security that leverages AI/ML to defend against deepfake attacks. |
|
Artificial intelligence has supercharged both defenders and attackers in the cybersecurity arena. This panel dives deep into how financial organizations can harness AI for predictive intelligence and faster responses while keeping adversarial AI at bay. Discussions will also highlight how organizations can build internal capabilities to maximize the potential of AI while navigating the ethical and operational challenges it presents. From navigating ethical dilemmas to finding AI-savvy talent, this conversation promises a thought-provoking look at where technology ends and responsibility begins. Panelists:
Moderator:
|
|
12:15pm |
Networking Lunch |
It’s not just about strategy—execution is where the battle is won. This panel takes a deep dive into the cutting-edge tools, platforms, and frameworks transforming cybersecurity in the financial sector. Experts will discuss real-world implementations of AI-powered detection systems, multi-cloud security solutions, and threat intelligence platforms, sharing lessons learned from their own deployments. Expect actionable advice on selecting the right tools, avoiding common pitfalls, and driving successful implementations. Panelists:
Moderator:
|
|
Cyber defense demands more than reaction. This session maps the evolution and implementation of predictive and proactive cybersecurity technologies - exploring advancements in identity posture, data security, secure AI controls, and more. Discover how practical Zero Trust tooling, like Zero Trust Network Access (ZTNA), and methodologies like Factor Analysis of Information Risk (FAIR) make it possible for security teams to operationalize and quantify cyber resilience and bridge the gap between security and business goals. Through actionable insights and workflow-style demos, security practitioners will learn how to effectively prioritize risks, drive resilience, and lead with confidence in a proactive cyber risk informed environment. |
|
As cyber threats evolve, both technical and human factors play critical roles in security. Led by an experienced Red Teamer, this session explores the latest attack techniques, demonstrating how adversaries exploit vulnerabilities and human psychology. Key topics include red team methodologies for identifying security weaknesses, strategies for mitigating human-focused attacks, and integrating technical controls with human risk management. The session will also cover security awareness training, risk assessments, and proactive defense measures to enhance overall cybersecurity resilience. |
|
3:00pm |
Coffee Break |
The pace of innovation waits for no one, and neither do cyber threats. This session takes a forward-looking view of the critical issues shaping the next era of financial cybersecurity, from quantum computing to cloud complexities. Experts will share their strategies for navigating regulatory mazes, embracing emerging tech, and fostering a workforce that’s ready for whatever the future holds. Panelists:
Moderator:
|
|
|
|
4:45pm |
End of Conference |