The Extended Enterprise: managing cybersecurity risk beyond your walls

This presentation provides a strategic blueprint for guarding the digital gates organisations no longer directly control, a necessity given the increasing prevalence and systemic nature of third party cyber threats.

●      Systemic threat requires a new architecture.

●      Single vendor compromise impacts thousands.

●      DORA mandates shared vendor accountability.

●      Need Visibility, Collaboration, Automation.

●      Be the architect, not the gatekeeper.

Beyond the Perimeter: Proactive threat hunting for finance leaders

Financial organisations face relentless and increasingly sophisticated cyber threats. Reactive security measures aren’t enough to stop them. In this tech spotlight, Ryad Jawaheer from eSentire explains how finance IT leaders can stay ahead of attackers through managed detection and response (MDR), continuous threat management, and active threat hunting.

 

You’ll hear how eSentire’s team of experts detects and stops attacks in real time, helping financial institutions protect critical systems, meet regulatory demands, and strengthen resilience against disruption.

 

How to Sweep Vulnerabilities under the Rug – How to Properly manage vulnerabilities and effectively prioritize remediation

Edgescan delivers risk-prioritized vulnerability intelligence across applications, APIs, and infrastructure with manual validation baked in.

Let’s take a step back to some fundamentals.

  • A reality check and recap on the basics (Find, Prioritize, Fix).
  • How to deal with “Too Many Risk Scores”. Edgescan’s effort to simplify an approach to Risk.
  • Asset Context – how it plays into Risk and how AI and Metadata can help vulnerability prioritization.
  • How to quantify Risk and present options not just problems.

Interview: AI, Governance, and Cyber Security

  • Designing effective governance frameworks  from policy to implementation  for institutions at different stages of maturity
  • How security strategy, governance thinking and policy development is adapting to Ai functionality across major financial institutions
  • Practical lessons from early internal adoption, including colleague-facing change, operational readiness and evolving approaches to risk assessment
  • The key concerns shared by regulators and large institutions, such as safety, accountability, model transparency and systemic risk
  • The organisational impact of AI, from workforce considerations to skills, decision-making processes and oversight structures
  • The balance between innovation and regulatory expectations, and what responsible adoption looks like in real operational environments

AI Security: Between Science Fiction and Reality

  • Understanding how to frame AI security – novel challenges, similarities, and differences with traditional cybersecurity
  • Practical insights for designing safer, more trustworthy AI systems

Untangling the Supply Chain Problem in Financial Services

  • Explore how systemic supply chain risks are reshaping the financial services landscape, from corporate dependencies to software and logistical vulnerabilities.
  • Understand why traditional TPRM no longer protects interconnected financial ecosystems, and how collaboration is becoming the new resilience strategy.
  • Hear real-world insights from government and financial communities on tackling concentration risk and achieving shared visibility across suppliers.
  • Discover how network-based
  •  security models can strengthen regulatory compliance and operational resilience under frameworks like DORA.
  • Learn how to move beyond fragmented risk management and Defend-as-One against evolving third-party threats.

 

Managing risk in a shared responsibility model

As financial institutions deepen their reliance on cloud infrastructure, managing cyber risk becomes a shared responsibility, but where does the provider’s role end and the institution’s begin? This discussion explores how to cut through the noise of data and alerts to focus on what truly matters for business resilience.

  • Too much data, not enough clarity and how that overload hides real financial and operational exposure.
  • Cutting noise down to the risks that actually matter to revenue, operations, and regulators.
  • Exposing the unknown estate shadow IT, shadow APIs, and forgotten cloud services driving unseen risk.
  • Turning thousands of technical “criticals” into one clear, defensible, business-level risk picture.
  • Measuring what truly improves resilience: reduced exposure, faster remediation, better prioritisation, clearer audit trails.

Moderator: Jon Bernstein, Freelance Writer, Moderator and Digital Media Consultant