The Future of Digital Risk Protection in Financial Services

As financial services firms continue to digitise, their exposure now stretches far beyond the traditional perimeter. From the dark web to domain impersonation and unpatched vulnerabilities, risks can emerge anywhere your brand or data appear online.

This session explores how organisations can harness diverse intelligence sources – including the dark web – to uncover hidden risks and strengthen their digital resilience. Through real-world examples, we’ll show how Digital Risk Protection (DRP) turns threat data into clear, actionable insight that helps financial institutions stay ahead of attackers

Keynote Presentation – Inside the Inbox: Real Attacks Hitting Financial Services in 2025

Attackers are bypassing legacy tools with business email compromise (BEC), account takeover (ATO), QR code phishing, and OAuth consent scams at increasing scale. We will share anonymized, recent cases from financial services environments, including how a global firm saw advanced attacks bypass a traditional secure email gateway and what actually stopped them. Co-presented by Abnormal AI and BlueFort, attendees leave with a practical playbook: the signals to look for, the controls that work, and how to achieve time-to-value without added friction.

The Confidence Illusion: Rethinking How We Assess Technical Risk

The financial services market has driven major security improvements through frameworks such as CBEST and TIBER, with its behaviour helping raise standards across other sectors. But does confidence still outpace reality? This session explores the blind spots that remain, including fragile supply chains, hidden attack paths, and vendor risks, while challenging what resilience and true assurance mean in complex, real-world environments

The Extended Enterprise: managing cybersecurity risk beyond your walls

This presentation provides a strategic blueprint for guarding the digital gates organisations no longer directly control, a necessity given the increasing prevalence and systemic nature of third party cyber threats.

●      Systemic threat requires a new architecture.

●      Single vendor compromise impacts thousands.

●      DORA mandates shared vendor accountability.

●      Need Visibility, Collaboration, Automation.

●      Be the architect, not the gatekeeper.

Beyond the Perimeter: Proactive threat hunting for finance leaders

Financial organisations face relentless and increasingly sophisticated cyber threats. Reactive security measures aren’t enough to stop them. In this tech spotlight, Ryad Jawaheer from eSentire explains how finance IT leaders can stay ahead of attackers through managed detection and response (MDR), continuous threat management, and active threat hunting.

 

You’ll hear how eSentire’s team of experts detects and stops attacks in real time, helping financial institutions protect critical systems, meet regulatory demands, and strengthen resilience against disruption.

 

How to Sweep Vulnerabilities under the Rug – How to Properly manage vulnerabilities and effectively prioritize remediation

Edgescan delivers risk-prioritized vulnerability intelligence across applications, APIs, and infrastructure with manual validation baked in.

Let’s take a step back to some fundamentals.

  • A reality check and recap on the basics (Find, Prioritize, Fix).
  • How to deal with “Too Many Risk Scores”. Edgescan’s effort to simplify an approach to Risk.
  • Asset Context – how it plays into Risk and how AI and Metadata can help vulnerability prioritization.
  • How to quantify Risk and present options not just problems.