Skip to main content
Cookies Policy
Detailed information on the use of cookies on this website is provided in our Privacy Policy. By closing this message and proceeding, you consent to our use of cookies in accordance with our Cookies Policy.
x

We have implemented new login procedure. Learn More

  • CONTACT US
  • icon-facebook
  • icon-linkedin
  • icon-twitter

Game Changing Fraud Aware Security for Your Business

ACS WA August Digital Leader's Breakfast

Event Start: Thu 15 Aug 07:00 AM AWST
Event Finish: Thu 15 Aug 09:00 AM AWST

Completed

Registration End Date: Thu 15 Aug 07:00 AM


<img alt="CIO August 2019 Breakfast" src="https://acsau.file.force.com/servlet/rtaImage?eid=7010o000001JLxB&amp;feoid=00N9000000EVCh7&amp;refid=0EM0o000001vW9N" style="height: 332px; width: 500px;"></img><br><br><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><b><span style="font-size: 10.0pt;"><span>According to CIO Magazine, of the 11 biggest issues IT faces today, new security threats is number one,<br>followed by data protection.</span></span></b></span></span><br><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><span style="font-size: 10.0pt;"><span>(Source – cio.com)</span></span></span></span><br><br><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><span style="font-size: 10.0pt;"><span><span style="color: black;">Thanks to the cloud adoption and mobile devices, organisations worldwide have an ever-expanding online footprint. Employees work online, customers and suppliers do business with organisations online. </span></span></span><b><span style="font-size: 10.0pt;"><span>However b<span style="color: black;">usiness reputation can be made or broken online</span></span></span></b><span style="font-size: 10.0pt;"><span><span style="color: black;">.  <br><br>Today’s cyberattacks are increasingly sophisticated and complex, driven by elaborate and resilient professional organisations that innovate faster than their targets. Hackers are not only after customers’ credit card details – they’re interested in any information that can be monetised in any way. The hacker’s motivation may be to get money, cause brand damage or just to have fun at someone’s expense. A cyberattack can have a domino effect on business culminating in loss of revenue and goodwill, regulatory scrutiny and fines, and even share price plunges. <br><br>A key consideration for an organisation assessing its cybersecurity is whether its measures are capable of preventing, detecting and adequately responding to attacks, rather than just complying with industry best practices. Compliance does not guarantee protection, and organisations with a mature approach to cybersecurity must go further. <br> <br>Operating in a digital world depends on the capability to maintain a secure and trusted environment. Fraud-aware security must be the foundation on which digital business should be built. Gone are the days when we could build a walled garden perimeter and feel secure. Today, businesses partner with others, outsource, have alliances, let customers access our systems and as we extend our reach – the perimeter of walled gardens is gone.<br><br>All security strategies must align with the changes in the way organisations conduct business and the surrounding environments. We must ensure that our security programs are fraud aware, leverage intelligent identity-based solutions, user behaviour analytics, monitor and understand what is happening in and to our environment.<br><br>We must work with the assumption we are being attacked and be prepared to offset those attacks with fraud aware security. The business should understand that their behaviour impacts the security of our environment. The business must be invested in security.  <br> </span></span></span></span></span><br><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><b><span style="font-size: 10.0pt;"><span>Key Learnings</span></span></b></span></span><br><br><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><span style="font-size: 10.0pt;"><span>Attendees will gain an understanding of current <span style="color: black;">dangers that</span> can<span style="color: black;"> impact </span>the organisation <span style="color: black;">and how game changing fraud-aware security </span>tools will allow your organisation to grow while mitigating the many growing cyber risks.<br><br>This event is ideally suited for <span style="color: black;">Chief Information Officers, Chief Digital Officers; Chief Technology Officers and Chief Talent /HR Officers</span> and anyone involved in IT Governance and compliance.<br><br><b>Proudly supported by<br><br><img alt="Diversus Logo" src="https://acsau.file.force.com/servlet/rtaImage?eid=7010o000001JLxB&amp;feoid=00N9000000EVCh7&amp;refid=0EM0o000001vW1x"></img></b></span></span></span></span>

Contact Details

event sponsors

Share this event:

CPD HOURS

2

SKILL

Speaker

Rajan Barara

Rajan Barara

Rajan Barara is Senior Product Manager at Entrust Datacard where he leads the Global Authentication Cloud business segment. Before joining Entrust Datacard in 2016, Rajan held various leadership positions in Cloud and Managed Services segment. Rajan holds an MSc in Data Engineering from Keele University in UK and a B.E. in Electronics and Communication Engineering from Delhi College of Engineering.Rajan has many years of experience presenting to and interacting with enterprise customers globally at Senior Executive & CXO level.Specialties include Customer Engagement, Agile, Software Solutions Delivery, IAM, Authentication, Access Management  Technology Background Includes SaaS, Identity Management, Authentication, PSD2, FIDO, AI & Machine Learning.

Show More
60 Fraser Avenue,WEST PERTH,WA,Australia

  • where

  • Fraser's Kings Park
    60 Fraser Avenue
    WEST PERTH WA 6005
  • when

  • Event Start:
    Thu 15 Aug 07:00 AM AWST

    Event Finish:
    Thu 15 Aug 09:00 AM AWST
  • event price

  • Member: $40.00
  • Member-Concessional: $40.00
  • Non-Member: $60.00

  • * Your price may vary on registration depending on your membership type.

Recommended Events

Event Terms and Conditions

Disclaimer

  • ACS reserves the right to change the program at any time. Every effort will be made to ensure a program of equivalent standard and members are updated with changes.
  • All dietary requirements are considered, however we cannot guarantee a 100% allergen free environment.
  • ACS reserves the right to prohibit entry or eject any person from an ACS event based on behaviour deemed inappropriate by ACS staff, its agents and/or others working under its authority.
  • Filming or streaming by attendees is not permitted. If an attendee is found to be doing so they will be asked to leave the event immediately and further action may be taken.
  • Photography and/or filming may take place during this event, by accepting these terms you consent to this. Please let a member of ACS know if you do not want your picture taken.

COVID-19 Event Attendance Compliance

By registering to attend an ACS in person event you are agreeing to the below terms and conditions

  • If an attendee is displaying flu or cold like symptoms in the days leading up to the event and therefore is not able to attend, ACS will refund the registration fee.
  • If an attendee comes to an event and is displaying flu or cold like symptoms they will be asked to leave
  • We ask all ACS members to respect the social distancing guidelines, if an attendee repeatedly disregards these guidelines, they may be asked to leave
  • ACS reserves the right to cancel the event within 24 hours' notice if either the speaker or the event host has advised us that they are exhibiting flu or cold like symptoms
  • All attendees must provide a valid phone number and email address to be contacted on if there is reason to notify about a possible COVID-19 exposure

Personal information collection notice

By registering for this event, you are providing personal information to the Australian Computer Society. In accordance with the ACS Privacy Policy, ACS collects personal information through registrations and attendances at its events for the purposes of:

  • organising and providing the various professional development events held by the ACS (including for example, courses, conferences, seminars, workshops, launches);
  • processing and managing event registrations (including catering for dietary requirements);
  • maintaining event attendance records;
  • contacting registered event guests with information in regard to the event and seeking post-event feedback;
  • communicating with you to in relation to future events or ACS products, courses, services, promotions or other products or services that ACS reasonably thinks may be of interest to attendees;
  • processing and responding to attendee inquiries; and
  • conducting research to improve its events and better understanding needs. 

If the required information is not provided, we or any involved third parties, may not be able to respond to you, update you, or provide appropriate services or events to you.

We may obtain personal information directly from you or from someone who registers for the event on your behalf. If you provide us with personal information about another person, you must do so only with their consent and agree to make them aware of this privacy notice.

ACS may share your personal information with third parties for the collection purposes noted above or as set out in our Privacy Policy, where it is reasonably necessary for, or directly related to, one or more of our activities, or required by law.

When you register to participate in an overseas event, we may send personal information we collect overseas.

See our Privacy Policy at https://www.acs.org.au/privacy-policy.html for more information about our privacy practices.