Skip to main content
Cookies Policy
Detailed information on the use of cookies on this website is provided in our Privacy Policy. By closing this message and proceeding, you consent to our use of cookies in accordance with our Cookies Policy.

Game Changing Fraud Aware Security for Your Business

ACS WA August Digital Leader's Breakfast

Registration End Date: Thu, 15 Aug, 07:00 AM

  • where

  • Fraser's Kings Park
    60 Fraser Avenue
    WEST PERTH WA 6005
  • when

  • Event Start: Thu, 15 Aug, 07:00 AM
    Event Finish: Thu, 15 Aug, 09:00 AM
  • event price

  • Member: $40.00
  • Member-Concessional: $40.00
  • Non-Member: $60.00

  • * Your price may vary on registration depending on your membership type.

<img alt="CIO August 2019 Breakfast" src=";feoid=00N9000000EVCh7&amp;refid=0EM0o000001vW9N" style="height: 332px; width: 500px;"></img><br><br><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><b><span style="font-size: 10.0pt;"><span>According to CIO Magazine, of the 11 biggest issues IT faces today, new security threats is number one,<br>followed by data protection.</span></span></b></span></span><br><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><span style="font-size: 10.0pt;"><span>(Source –</span></span></span></span><br><br><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><span style="font-size: 10.0pt;"><span><span style="color: black;">Thanks to the cloud adoption and mobile devices, organisations worldwide have an ever-expanding online footprint. Employees work online, customers and suppliers do business with organisations online. </span></span></span><b><span style="font-size: 10.0pt;"><span>However b<span style="color: black;">usiness reputation can be made or broken online</span></span></span></b><span style="font-size: 10.0pt;"><span><span style="color: black;">.  <br><br>Today’s cyberattacks are increasingly sophisticated and complex, driven by elaborate and resilient professional organisations that innovate faster than their targets. Hackers are not only after customers’ credit card details – they’re interested in any information that can be monetised in any way. The hacker’s motivation may be to get money, cause brand damage or just to have fun at someone’s expense. A cyberattack can have a domino effect on business culminating in loss of revenue and goodwill, regulatory scrutiny and fines, and even share price plunges. <br><br>A key consideration for an organisation assessing its cybersecurity is whether its measures are capable of preventing, detecting and adequately responding to attacks, rather than just complying with industry best practices. Compliance does not guarantee protection, and organisations with a mature approach to cybersecurity must go further. <br> <br>Operating in a digital world depends on the capability to maintain a secure and trusted environment. Fraud-aware security must be the foundation on which digital business should be built. Gone are the days when we could build a walled garden perimeter and feel secure. Today, businesses partner with others, outsource, have alliances, let customers access our systems and as we extend our reach – the perimeter of walled gardens is gone.<br><br>All security strategies must align with the changes in the way organisations conduct business and the surrounding environments. We must ensure that our security programs are fraud aware, leverage intelligent identity-based solutions, user behaviour analytics, monitor and understand what is happening in and to our environment.<br><br>We must work with the assumption we are being attacked and be prepared to offset those attacks with fraud aware security. The business should understand that their behaviour impacts the security of our environment. The business must be invested in security.  <br> </span></span></span></span></span><br><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><b><span style="font-size: 10.0pt;"><span>Key Learnings</span></span></b></span></span><br><br><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><span style="font-size: 10.0pt;"><span>Attendees will gain an understanding of current <span style="color: black;">dangers that</span> can<span style="color: black;"> impact </span>the organisation <span style="color: black;">and how game changing fraud-aware security </span>tools will allow your organisation to grow while mitigating the many growing cyber risks.<br><br>This event is ideally suited for <span style="color: black;">Chief Information Officers, Chief Digital Officers; Chief Technology Officers and Chief Talent /HR Officers</span> and anyone involved in IT Governance and compliance.<br><br><b>Proudly supported by<br><br><img alt="Diversus Logo" src=";feoid=00N9000000EVCh7&amp;refid=0EM0o000001vW1x"></img></b></span></span></span></span>

Contact Details

event sponsors

Share this event:



SFIA Category

Portfolio, programme and project support (PROF) - 6


Rajan Barara

Rajan Barara

Rajan Barara is Senior Product Manager at Entrust Datacard where he leads the Global Authentication Cloud business segment. Before joining Entrust Datacard in 2016, Rajan held various leadership positions in Cloud and Managed Services segment. Rajan holds an MSc in Data Engineering from Keele University in UK and a B.E. in Electronics and Communication Engineering from Delhi College of Engineering.Rajan has many years of experience presenting to and interacting with enterprise customers globally at Senior Executive & CXO level.Specialties include Customer Engagement, Agile, Software Solutions Delivery, IAM, Authentication, Access Management  Technology Background Includes SaaS, Identity Management, Authentication, PSD2, FIDO, AI & Machine Learning.

Show More
60 Fraser Avenue,WEST PERTH,WA,Australia

Recommended Events