LOADING

Type to search

<

Akolade’s 10th Annual Fraud and Risk Management Summit 2021 galvanises national and international senior fraud, risk management, and cyber security professionals to prepare for, and tackle intrusions in a hyper-connected, and increasingly vulnerable corporate environment.

The Summit addresses many of the challenges facing fraud, risk management, and cyber security professionals – with 40+ speakers sharing timely, relevant and cost-saving techniques to tackle illegal activity at all levels of business.

Key themes being explored include:

Strategy

Strengthen your fraud, risk management and cyber resilience strategy

Security

Protect your reputation and brand from fraudulent activity

Invest

Invest in agile and forward-thinking programs

Advance

Enhance your investigation, surveillance and tracking capability

Prevention

Prevent organisation-wide identity theft and digital fraud

Hear from 40+ fraud, risk and cyber security leaders:

Patricia McDonald SC

Commissioner

NSW Independent Commission Against Corruption

Luke Muffett

Acting Assistant Secretary Cyber Policy and Strategy Branch

Department of Home Affairs

Asaf Ahmad

Chief Information Security Officer, ICT Governance, Security and Risk

NSW Fire and Rescue

Serena Lillywhite

Chief Executive Officer

Transparency International

David Cullen

Head - Victorian Government Cyber Incident Response Service

Department of Premier and Cabinet VIC

Dr. Rani Yesudas

Cyber Security Architect

Australian Digital Health Agency

Bilal Ahmad

Cloud Solutions and Security Architect

National Australia Bank

Darren Jameson

Detective Chief Inspector

NSW Police Force

Raghu Gandhy

Head of Infrastructure and Cyber Security

Veolia Australia and New Zealand

Andrew Bornhorst

Head of Risk and insurance

Transgrid

Uttam Mukherjee

Chief Risk Officer

CBHS

Trevor Cushen

Head of Information Security

BPay

Mitra Minai

Chief Information Security Officer

Healthscope

Glen Rowe

Manager, Counter Fraud & Investigations

RACQ

Jo Stewart-Rattray

Chief Security Officer

Silver Chain

Anthony White

Manager Oceania – Fraud & Counterfeit & Chairperson

Canon & Australian Online Fraud Council

Dr. Nalin Asanka Gamagedara Arachchilage

Senior Research Fellow (Research Associate Professor) - Cyber Security

La Trobe University

Ken Gamble

Licenced Criminal Investigator (NSW), Executive Director & Australian Chairman

IFW Global

Chirag Joshi

CISA, CISM, CRISC, Business Information Security Officer

AMP
Best-Selling Author: 7 Rules to Influence Behaviour and Win at Cyber Securit

Lani Refiti

Chief Executive Officer

IoT Sec Australia

Linda Cavanagh

National Network Lead

AusCyber

Mick Symons

Managing Director

Anti-Corruption Consultants Australia

Nigel Phair

Director

UNSW Canberra Cyber

Udaya Wijesinghe

Senior Cyber Security Architect

Optus

Andrew Lawrence

Senior Legal Officer, (Commonwealth FraudPrevention Centre)

Attorney-General’s Department

Eliza Williams

Policy Officer, (Commonwealth FraudPrevention Centre)

Attorney-General’s Department

Tony Fitzgibbon

CEO

Data Zoo

Peter Philipp

General Manager - ANZ

Neo4j

Reinhart Hansen

Director of Technology, Office of the CTO

Imperva

John Karabin

Director Cybersecurity

NTT Ltd, Australia

Lakshika Nadarajah

Team Lead and Senior Account Executive

Darktrace

Nathan Ryan

Cyber-Security Technologist

Darktrace

Lawrence Crowther

Head of Solutions Engineering APJ

Snyk

*Subject to change

Agenda

8:00am

Registration opens

8:45am

Opening remarks from the Chair

Ken Gamble
Executive Director & Chairman
IFW Global

9:00am

Keynote

Strengthening your fraud and corruption control policy 
• Sharing clearly defined responsibilities to manage fraud and corruption
• Investing in risk-based preventative and detective controls
•  Reviewing the fraud and corruption control framework and reporting 

Patricia McDonald SC 
Commissioner
NSW Independent Commission against Corruption

9:30am

Planning against cyber attacks: Are you ready?
• Understanding the threat environment
• What to expect when a cyber attack occurs 
• Preparing your organisation to respond effectively 

David Cullen
Head – Victorian Government Cyber Incident Response Service
Department of Premier and Cabinet VIC

10:00am

Graph Technology in the Future of Anti-Money Laundering and Fraud Detection
• Demystifying Graph Technology: Emergence of many credible use cases show it is more versatile than you think
• From Panama Papers to FinCEN Files – how Graph has been working all along
• How Neo4j’s Graph Data Platform – which includes data visualization software – uncovers difficult-to-detect patterns that far outstrip the power of a relational database
• Variety in real-time: use cases in the fight against financial crimes, including first-party bank fraud, credit card fraud, ecommerce fraud, insurance fraud, and money laundering

Peter Philipp
General Manager – ANZ
Neo4j

10:30am

Panel Discussion

Streamlining the information-sharing, fraud detection and risk management channels  
• Taking an integrated approach to governance, risk, and compliance
• Streamlining the internal control frameworks, and risk management strategies 
• Protecting your lines of defence in a fast-changing world

Panellists:

Uttam Mukherjee
Chief Risk Officer
CBHS

Mitra Minai
Chief Information Security Officer
Healthscope 

Ken Gamble
Executive Director and Chairman
IFW Global

11:00am

Morning tea

Stream A:
Fraud and risk management

Stream B:
Cyber security and resilience planning

Tackling organisation-wide fraud and risk in a fast-changing environment  

Securing your IT networks, platforms and infrastructure in cyber space 

Stream Chair: 
Ken Gamble
Executive Director and Chairman
IFW Global

Stream Chair: 
Lani Rafiti
Chief Executive Officer
IoT Sec Australia 

11:30am

11:30am

Enhancing your information-security capabilities 
• Why information-security is critical to fraud detection and risk management
• How to build dialogue with law enforcement and industry stakeholders 
• Why streamline data sharing across the organisation 

Mitra Minai
Chief Information Security Officer
Healthscope 

Building your organisation’s cyber security capabilities 
• What comprises a good cyber security policy?  
• How do you build cyber awareness across your organisation? 
• Why gain buy-in with executives and boardrooms with your action plan? 

Linda Cavanagh
National Network Lead
AustCyber  

 

12:00pm

12:00pm

Q&A Interactive Panel Discussion

Integrating the operational and cyber security risk
• Pooling your operational and cyber security risk into an integrated plan
• Working across silos to share knowledge and corporate data
• Taking a coordinated approach to cyber security planning

Jo Stewart-Rattray
Chief Security Officer
Silver Chain

12:30pm

The changing landscape of fraud and risk
The impact of digitisation and the increase in fraud
• The importance of utilising compliant and reliable data
• How to protect your customers and your reputation
• Adapting to the complex and new regulatory environment

Tony Fitzgibbon
CEO
Data Zoo

12:30pm

Case Study: Protecting networks, internet access and IT systems
• Clarifying the parameters for IP network and security planning
• Managing your security architecture, auditing, penetration testing and risk assessment
• Securing the core and mobile networks, together with the routing and gateway design

Udaya Wijesinghe
Senior Cyber Security Architect
Optus

1:00pm

Networking luncheon

2:00pm

2:00pm

Tackling criminal activity with best-in-class investigations 
• Building high-performance investigative teams to tackle criminal activity
• Maximising the impact of anti-crime programs 
• Taking a resilient and innovative approach to problem-solving 

Darren Jameson
Detective Chief Inspector
NSW Police Force 

Strategies to identify and manage vulnerabilities across networks and systems
· Managing your network vulnerabilities
· Clarifying the security protocols, firewall, and security management
· Tackling the vulnerability scanning and assessment processes

Lani Rafiti
Chief Executive Officer
IoT Sec Australia

2:30pm

2:30pm

Panel Discussion: Securing the enterprise against fraud and risk
· Managing your investigation, security and risk
· Sharing information about risk across the enterprise
· Ensuring you invest in proactive planning and mitigation strategies Moderator

Ken Gamble
Executive Director and Chairman
IFW Global Panellists

Darren Jameson
Detective Chief Inspector
NSW Police Force

Trevor Cushen
Head of Information Security
BPay

Panel Discussion: Improving your organisation’s security and governance posture
· Maintaining the right systems and security levels across the enterprise
· Managing the design phase to reduce flaws with the auditing and controls
· Building customer trust by keeping information safe and secure

Linda Cavanagh
National Network Lead
AustCyber

Jo Stewart-Rattray
Chief Security Officer
Silver Chain

Udaya Wijesinghe
Senior Cyber Security Architect
Optus

3:00pm

Afternoon tea

3:30pm

Case Study: Navigating the maze of accountability in a risk-averse environment
• How do you ensure the right focus for risk management?
• What is needed to streamline operational and stakeholder risk?
• Why does branding and reputational risk matter
• Where is the right balance between business sustainability and community confidence?

Andrew Bornhorst
Head of Risk and Insurance
Transgrid

4:00pm

Case study: Securing your billing and payment systems against intrusions
• Ensuring information assets and critical infrastructure is fully protected
• Securing connectivity with customers, partners and service providers
• Integrating information management and security planning

Trevor Cushen
Head of Information Security
BPay

4:30pm

Technology Insights Edge to End – User to Data Tracking from On-premise to the Multi-Cloud 
• Understanding the challenges of linking a user’s application activity to the data access layer
• Solving this challenging problem and blind spot in data security
• Linking user activity from the network edge, through the Application/API and down to the data they touch in a data store layer
• Understanding how Edge-to-End telemetry helps drive effective and efficient Digital Forensics, Fraud Detection and Incident Response functions

Reinhart Hansen
Director of Technology, Office of the CTO
Imperva

John Karabin
Director Cybersecurity
NTT Ltd, Australia

5:00pm

Closing remarks from Chair and end of day one

8:00am

Registration opens

8:45am

Opening remarks from the Chair

Asaf Ahmad
Chief Information Security Officer, ICT Governance, Security and Risk
NSW Fire and Rescue

9:00am

Keynote Strengthening Australia’s cyber security strategy
• Mapping the escalation of state-based cyber-attacks
• Why tackling cyber security is a central priority for tactical response and planning
• Assessing the volume and belligerence of cyberattacks and planning for the future

Luke Muffett
Acting Assistant Secretary
Cyber Policy and Strategy Branch Department of Home Affairs

9:30am

Building a smarter security system to tackle ‘intelligent’ cyber threats
• Understanding new threats and how this impacts your organisation
• Why the threat landscape is constantly changing and how to prepare
• What is needed to be proactive and pre-empt emerging threats

Raghu Gandhy
Head of Infrastructure and Cyber Security
Veolia ANZ

10:00am

Case study: Managing security in a fully virtualised environment
• Tackling security in a virtualised environment
• Developed and testing the disaster recovery (DR) action plan
• Securing remote access to web applications and the intranet

Asaf Ahmad
Chief Information Security Officer
ICT Governance, Security and Risk NSW Fire and Rescue

10:30am

Technology Insights Securing the Future of Work with Cyber AI  
The future of work remains unpredictable. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of regional or even global crises, and while sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience.  

In this session, learn about:  
• Emerging threats from the transition to remote work
• How AI has adapted to new patterns of work Darktrace’s use of Cyber AI to protect the dynamic workforce
• Defensive Autonomous Response capability

Lakshika Nadarajah
Team Lead and Senior Account Executive
Darktrace

Nathan Ryan
Cyber-Security Technologist
Darktrace

11:00am

Morning tea

Stream A:
Next step to fraud and risk management

Stream B:
Outlook for cyber resilience and security planning 

Growing the tactical defences to detect, tackle and manage fraud 

Drivers for cyber security in a post Covid-19 world

Chair: 
Ken Gamble
Executive Director and Chairman
IFW Global 

Chair: 
Asaf Ahmad
Chief Information Security Officer, ICT Governance, Security and Risk
NSW Fire and Rescue 

11:30am

11:30am

Why collaboration is key to fighting fraud 
• Tackling fraud attacks that leave organisation and employees more vulnerable
• Balancing the rate of digital adoption with fraud-fighting capabilities 
• Using the right tools and techniques to manage incidents

Anthony White
Manager Oceania – Fraud and Counterfeit (Legal Department)
Canon
Chairperson
Australian Online Fraud Council

Securing software applications to detect and manage security breaches 
• Improving the coding behaviour to secure software applications
• Managing the access and control functions 
• Establishing the identity upfront to protect against unauthorised access 
• Building the logging and intrusion detection capability 

Dr Nalin Asanka Gamagedara Arachchilage
Senior Research Fellow (Research Associate Professor) – Cyber Security
La Trobe University  

12:00pm

12:00pm

Tackling front-line crime investigations
• Lessons for government and law enforcement agencies
• Current and future challenges
• Uncovering and exposing fraud

Ken Gamble
Executive Director & Chairman
IFW Global

Technology Insights
Are we forever doomed to software supply chain security?
The adoption of open-source software continues to grow and creates significant security concerns for everything from software supply chain attacks in language ecosystem registries to cloud-native application security concerns.

This session explores:
• How developers are targeted as a vehicle for malware distribution
• Why we depend on open-source maintainers to release timely security fixes
• Where a race to the cloud creates new security concerns for developers
• What it takes for software-driven businesses to develop fast and stay secure

Lawrence Crowther
Head of Solutions Engineering APJ
Snyk

12:30pm

12:30pm

Panel discussion: Pooling resources to tackle risk, security breaches and intrusions 
• What does it take to pool corporate knowledge to tackle fraud?
• How does risk management, fraud detection and information security play out?  
• Why streamline your knowledge-sharing capabilities? 

Panellists:  

Reducing cyber risks through influencing user behaviour and awareness programs
• How the human factor plays out with cyber security planning
• Why some cyber resilience programs fail and what you can do about this
• What is needed to influence behaviour and create a cyber safe culture within large, complex organisations

Chirag D Joshi
Business Information Security Officer
AMP

Glenn Rower
Manager, Counter Fraud and Investigations
RACQ

Nigel Phair
Director
UNSW Canberra Cyber

Serena Lillywhite
Chief Executive Officer
Transparency International  

1:00pm

Networking luncheon

2:00pm

Tracking Australia’s performance to tackle corruption
• How Australia fares on the global corruption index
• Clarifying Australia’s National Integrity Systems: the blueprint for Action
• Mapping business integrity and bribery prevention across high-risk sectors

Serena Lillywhite
Chief Executive Officer
Transparency International

2:30pm

Case stdudy: Tackling fraud in the consumer space – perspectives from the insurance sector
• Estimating the cost of financial fraud involving consumers
• Investigating and acting on insurance applications or claims
• Countering fraud with a speedy response time and turnaround

Glen Rowe Manager
Counter Fraud and Investigations
RACQ 

3:00pm

Afternoon tea

3:30pm

Building cyber resilience for healthcare providers 
• Building your cyber resilience, compliance, and risk management capabilities
• Protecting the security architecture and inter-connected platforms
• Securing service delivery platforms in the digital age  

Dr Rani Yesudas
Cyber Security Architect
Australian Digital Health Agency 

4:00pm

Developments in testing fraud controls or pressure testing
• Tackling unseen or unchecked fraud
• Leveraging practical tools and guidelines to tackle fraud
• Learning f rom counter-fraud investment cases

Andrew Lawrence
Senior Legal Officer (Commonwealth Fraud Prevention Centre)
Attorney-General’s Department

Eliza Williams
Policy Officer
Attorney-General’s Department

4:30pm

Closing remarks from the Chair and end of day two

Asaf Ahmad
Chief Information Security Officer
ICT Governance
Security and Risk NSW Fire and Rescue

For more information, request a brochure:

Who should attend?

Heads of and Specialists in:

Government 

Banking

Superannuation

Insurance

 

Funds Management

Technology and Telecommunications

Retail

Property

Energy/Utilities/Mining

Healthcare

Casinos and Gaming

Who you will meet?

Fraud 

Risk

Cyber Security

Investigation

Compliance

Governance

Information Security

Identity Management

Data and Analytics

Forensics

Loss Prevention

Verification and Assurance

Anti-money Laundering

 

Location

89-113 Kent St
Millers Point
NSW 2000

Countdown
To The Event

Days
Hours
Minutes
Seconds

Sponsorship opportunities

Events and experiences improve how audiences feel about brands. They also give you a strong push when it comes to driving sales.

Over 90% of consumers feel positive about brands after participating in an event, while around 85% will likely buy from you.

Get in touch with us
Email: spex@akolade.co
Phone: +612 9247 6000

Sponsors

Knowledge Partner

Neo4j enables organizations to unlock the business value of connections, influences and relationships in data: through new applications that adapt to changing business needs, and by enabling existing applications to scale with the business. Headquartered in San Mateo, USA, Neo4j has offices in Sweden, the UK and Germany.

Our vision is to help the world make sense of data.

Gold Sponsor

Founded in 2013 by mathematicians and cyber experts from government intelligence backgrounds, Darktrace was the first company to apply AI to the challenge of cyber security.

With its Immune System platform, Darktrace has fundamentally transformed the ability of organizations to defend their most critical assets in the face of rising cyber-threat.

Imperva is the cybersecurity leader whose mission is to protect data and all paths to it. We protect customers from cyber attacks through all stages of their digital transformation. Our teams develop award-winning technologies. We earned our experience through 18 years of security excellence. Everyday, we work hard to live up to our values: Innovation, Customer Obsession, Sense of Urgency, Collaboration, Community.

Silver Sponsor

Data Zoo is the best solution for any organisations with AML/KYC obligations. With access to more than 5 billion individuals globally, we are the leading Asia Pacific provider – covering over 95% of the population. Instantly verify your customers through reliable and independent data sources & meet all compliance requirements. 

Snyk was built on the belief that security must be integrated into the development process and that. Our team combines developer tooling and UX expertise with deep cyber security knowledge to deliver a developer-first solution they can use every day to stay secure — without slowing down development. By using Snyk’s flexible CLI, workflow integrations and API, developers can easily add projects to be tested, quickly.

Networking Drinks Sponsor

The SCANTEK advanced ID processing and facial biometric system is 100% digital so there is no need for manual handling. Our advanced machine learning updates in real time. 

Scantek is the fastest, most secure solution on the market. With multiple device options, facial biometric matching technology and secure data handling, there really is no alternative when it comes to identity verification.

Supporting partner

 

The Alternative Investment Management Association (AIMA) is the global representative of the alternative investment industry, with around 2,000 corporate members in over 60 countries. AIMA’s fund manager members collectively manage more than $2 trillion in hedge fund and private credit assets.

AIMA draws upon the expertise and diversity of its membership to provide leadership in industry initiatives such as advocacy, policy and regulatory engagement, educational programmes and sound practice guides. AIMA works to raise media and public awareness of the value of the industry.

Media partners

MySecurity MarketPlace

infosec-conferences.com

Contact us

+61 02 9247 6000

Attendance

In-person or virtual

Location

Mercure Hotel, Sydney

Tweet about this event

Use hashtag #FraudRiskSummit21

Sign up for FREE to have full access and get a weekly e-newsletter!