Fortifying secure access: Building enterprise and customer trust through efficiency, security and integrity

08 February 2022 (SGT) | Free CS Hub Online Event

Fawad Bayunus

Cluster Head, Information Security Risk Officer Standard Chartered Bank

Having over 18 years of experience with demonstrated success and accomplishments in Big4 & financial institutions. He is a specialist with a focus on composing and implementing security policies & procedures, performing security maturity assessments, conducting security audits, ensuring security control compliance, and leading security transformation projects.

Fawad is privileged with diversified experience having worked in compliance, risk, technology & audit functions for different organisations. He has been a regional security lead for The Bank of Tokyo Mitsubishi UFJ. - Oceania and Information Technology Security Officer (ITSO) for ABN AMRO Clearing Bank – APAC.

He has also worked as a compliance specialist for Westpac bank, IT Risk Assurance & Security specialist for ING Bank, security assurance expert at PricewaterhouseCoopers (PwC) Australia. Other organisations include Askari Bank Limited, Samba Bank Limited, Silk Bank Limited and Aussie Forex & Finance.

He is a Masters in Information & Technology from the university of Canberra and holds certificate courses in cybersecurity, Info. System Audit, Operational Risk, Compliance and many others.

He is passionate about cybersecurity and believes that meaningful language for the “c-suite” and continuous learning for security specialists is the key to any organisation’s cybersecurity capability enhancement.

Agenda: 8th February 2022 SGT

13:00 Implementing access governance as part of your Identity Access Management (IAM) by choosing the right solutions that fit your current architecture

To REGISTER and to access live presentation click here.

Losing control of who access what in an organization can cause a breach in private data and systems thus disrupting an entire organization. The role of access governance is to control these breaches and ensuring data will not be compromised as well as to minimize burden on IT administrators to control all access points. This session will address how to use access governance for efficient management which focuses on -

  • Cybersecurity risk-based approach - IAM policy and procedures
  • Key components of identity & access management and its importance.
  • Effectively managing different levels of access - using role-based approach on platforms
  • Highlights on data breaches of 21st century and its repercussions
  • Identify & selection of the right access governance solution to fit your current architecture