<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • DAY TWO

  • 08:20

    Register; grab a coffee. Mix, mingle and say hello to peers old and new.

    Arrow
  • 08:50
    Jason Murrell_Photo - Edited

    Welcome from Corinium and the Chairperson

    Jason Murrell - Independent Chair - Cyber Security Certification Australia (CSCAU)

    Arrow
  • 09:00
    Joe Smith (1)

    Opening Keynote: Responding to Cyber Incidents: A Year of Insights

    Joe Smith - Assistant Secretary and Acting Deputy Cyber Security Coordinator - National Office of Cyber Security

    Arrow
    • Lessons learned from recent high-profile cyber incidents
    • How the National Office of Cyber Security helps coordinate responses to incidents
    • What's involved in effective consequence management
  • 09:25
    Matt Preswick-1

    Accelerating Cloud Security to enable AI: How Security teams can adopt a new operating model to enable agile AI adoption

    Matt Preswick - Enterprise Solutions Engineer - Wiz

    Arrow

    Cloud and Artificial Intelligence (AI) are empowering organisations to meet their business goals quickly and effectively, however, also presents a tectonic shift for cyber security teams. Today, CISO’s are forced to enable the adoption of Cloud and AI use cases at the speed of dev, requiring new operating models to continue to protect their environments and eliminate critical risks. Join this session to learn how you can enable your team to build faster in the cloud, ensuring security, Dev and DevOps can work together in a self-service model built for the scale and speed of your cloud and AI developments.

  • 09:50
    Sam Fariborz

    Building a cybersecurity program from scratch

    Sam Fariborz - CISO - David Jones

    Arrow

    Designing a cybersecurity operating model with people, processes, and technology at the core of your strategy is key. How to factor in the business strategy into the operating model, and how to take your business requirements as part of that process. During this session, we’ll explore strategies to:

    • Build a well-developed program that supports and is tailored to the organisation’s needs
    • Create a well-designed program with cooperation and support from stakeholders and management
    • Develop effective metrics and KPIs for program design, implementation, and management performance assessment
  • 10:15

    NETWORKING BREAK

  • Kostas Kyrifidis_Photo - Edited

    TRACK A - PRESENTATIONS

    Chair:
    Kostas Kyrifidis - President - VSI

    Arrow
  • 10:45
    Len Noe (1)

    2024: A Cyborg Odyssey

    Len Noe - Technical Evangelist, White Hat Hacker & Biohacker - Cyberark

    Arrow

    Futuristic threats are not reserved for the future anymore, augmented humans are real and pose a significant threat today. I currently have ten microchip implants within my body that are used for offensive security. I will show how the use of these devices allows me to bypass current security protocols and walk away. By remaining in the grey areas of law I will show how current health and privacy laws prevent discovery.

    In this session Len will demonstrate:

     

    • Implant instantiated attacks
       
      • Direct Download
      • Implant MiTM
      • Implant Phishing / Smishing
      • Implant Physical security bypass
    • Mitigations to Transhuman based attacks
  • 11:10
    Rob Testi_23-10-17_2041

    Navigating the Cyber Resilience Journey in M&A to Achieve Seamless Integration and Security Enhancement

    Rob Testi - Head of Cybersecurity - People First Bank

    Arrow

    Hear first-hand from someone 12 months from Day 1 of a merger about:

    • How to navigate the opportunities and pitfalls from achieving a unified approach to cyber when faced with bringing two disparate teams together following an M&A
    • How to manage the threats and risks that surface following the organisation's growing in size and market prominence
    • How to approach the need to consolidate cyber technologies, tools and controls whilst actively defending against attacks
    • What happens when you have two SOCs and need to get to one?
    • How to keep your people motivated on the merger journey?
  • 11:35
    Ben Verschaeren

    Risk and Vulnerabilities - Managing your attack surface and prioritising vulnerabilities

    Ben Verschaeren - Director of Sales Engineering APJ - Sophos

    Arrow

    In today's digital landscape, managing your attack surface and prioritizing vulnerabilities are crucial for robust cybersecurity. Join us for a 20-minute session where we'll explore effective strategies to identify, assess, and mitigate potential threats. Learn how to streamline your vulnerability management process and allocate resources efficiently to safeguard your organization against cyberattacks. 

  • 12:00
    Greg Adamson-2

    Embracing AI with confidence – leveraging the benefits while mitigating the risks

    Greg Adamson - CISO - Department of Transport and Planning

    Arrow
    • What trends are we looking from a security perspective?
    • Understanding the risks and implications of offensive AI and how it will change our threat landscape
    • How CISOs can be prepared for potential risks
    • Strategies to use AI in cyber defence
  • 12:25
    Rhiannon Taylor

    Building cyber resilient organisations: beyond technical expertise

    Rhiannon Taylor - Program Director Cyber Security -

    Arrow

    During this presentation, we’ll discuss:

    • Resilient culture
    • Cybersecurity and leadership
    • Humans Factors
    • Interdisciplinary strategies
  • Jason Murrell_Photo - Edited

    TRACK B - PANEL DISCUSSIONS

    Chair:
    Jason Murrell - Independent Chair - Cyber Security Certification Australia (CSCAU)

    Arrow
  • 10:45
    Panel Discussion-1

    PANEL DISCUSSION: Evolving your supply chain security practices and advancing its maturity

    Arrow
    • How security is changing and how to ideally address it
    • The shift-left reality and how the solution didn't work
    • The cost implications of a wrong security workflow
    • How to make DevSecOps work, strategically 

    Panel moderator:

    Lisa Dethridge, Senior Research Fellow, RMIT University

    Panellists:

    Mazino Onibere, CISO, Regis Aged Care

    Pearse Courtney, Cyber Project Manager, AEMO

    Oliver Pettit, Senior Manager, Monitoring & Defence, Cyber Security, AGL

    David Plummer, Regional Director for ANZ, Cyfirma

  • 11:15
    Panel Discussion-1

    PANEL DISCUSSION: Reinforcing your Boundaries with IAM

    Arrow

    Many organisations are implementing an integrated identity access and governance management to overcome the challenges they face when upgrading business operations, modernising aging infrastructure, and protecting network perimeters. Join us to learn how IAM is successfully helping safeguard your organisation while scaling up.

    Panel moderator:

    Jason Murrell, Independent Chair, Cyber Security Certification Australia (CSCAU)  

    Panellists:

    Ad Wolst, Head of Cyber Security Engineering & Platform Services, Technology Security, Bupa

    James Byrne, Manager, Cybersecurity Architecture, AMPOL

    Chikonga Maimbo, Manager Information Security, Bank Australia

    Daniel Eastley, Cyber Security Services Manager, JB Hi-Fi and The Good Guys

    Aidan Turner, Manager, Identity and Access Management, Downer Group

    Ben King, VP of Security Trust & Culture, Okta

  • 11:45
    Panel Discussion-1

    PANEL DISCUSSION: Influencing Human Behaviour and Reducing Cyber Risks

    Arrow
    • Importance of human factor to cyber security and why most cyber awareness efforts fail
    • Tailoring security awareness programs to address cyber risks and business priorities
    • Strategies to influence behaviour and create a cyber-safe culture

    Panel moderator:

    Lisa Dethridge, Senior Research Fellow, RMIT University

    Panellists:

    Tara Dharnikota, Head of Information Security Management, PEXA

    Bethwyn Berry, Head of Cyber Security, PMO & Governance, BlueScope Steel

    May Mun, Senior Manager – Cyber Governance and Assurance, Transurban

    Sandeep Taileng, CISO, State Trustees VIC

    Daisy Wong, Former Security Culture & Awareness Lead, Flybuys

  • 12:15
    Panel Discussion-1

    PANEL DISCUSSION: The bright and dark side of AI

    Arrow

    AI is here to stay. How can we leverage its benefits while preventing its risks? Join us to discuss dos and don’ts of AI use in business. Exploring AI bright and dark side, from ChatGPT misuse to opportunities of bridging the talent gap

    • Can vendors fast track AI in cybersecurity tools?
    • What trends are we seeing from a security perspective?
    • What are the risks and implications of offensive AI and how it will change our threat landscape?
    • How CISOs can keep pace with AI evolution without being a blocker and a function of “no”
    • Ways to be prepared for potential risks, and strategies to use AI in cyber defence
    • You can’t ban AI – how to balance security & GRC to manage and govern risks

    Panel Moderator:

    Lama Tayeh, Founder, LULUMPR

    Panellists:

    Tony Lou, Cyber Security Manager, Bendigo Health

    Lisa Dethridge, Senior Research Fellow, RMIT University

    Deepa Bradley, CISO, South East Water

    Andrew Robinson, Founder And CISO, 6clicks

  • 12:50

    Lunch

  • 13:50
    Interactive Discussion Participation

    INTERACTIVE DISCUSSION: PAY THE RANSOM OR NOT?

    Arrow

    Your organisation confirms the breach, and you get contacted by the hacker asking for the ransom payment. Whatever decision you make comes with uncertainties and consequences. Join us for an interactive discussion around the challenges, concerns, and risks of paying – or not – the ransom.

    Moderator:

    Jason Murrell, Independent Chair, Cyber Security Certification Australia (CSCAU)  

    Panellists:

    Anya Avinash, Head of Cybersecurity, Bank First

    Vijay Narayan, CISO, Mercy Health

    Rob Wiggan, Experienced CISO

    Tim Hartman, Head of Solutions Architect – ANZ, Infoblox

  • 14:25
    Daniel Sutherland

    How to prepare for Quantum Computing

    Daniel Sutherland - RVP, Australia and New Zealand - DigiCert

    Arrow

    The technology migration required to address threats of quantum computing require organizations to start planning immediately. During this session we will discuss the quantum computing timelines, the impacts of quantum computing, what organizations are doing to prepare, and how you can get started on defining a migration strategy.

  • 14:50
    Will Sharpe

    Learnings from an unexpected CISO

    Will Sharpe - CISO - Telstra Health

    Arrow

    In the ever-evolving landscape of cybersecurity, the path to leadership is often as unpredictable as the threats we face. In this presentation, titled "Lessons from an unexpected CISO," I will share my journey from a rapid appointment to the role of Chief Information Security Officer (CISO) to becoming an effective leader in a critical domain.

    Through personal anecdotes and professional insights, I will explore the challenges and triumphs encountered when stepping into the CISO role under expedited circumstances. Attendees will gain a deeper understanding of the strategic and operational adjustments required, the importance of rapid learning and adaptation, and the value of leveraging diverse experiences to build a resilient security posture.

  • 15:15
    Ian Pham

    What can Cyber learn from Health in managing incidents

    Ian Pham - Head of Information Security - VMIA

    Arrow
    Analysis of how Victoria Health Services manage emergencies and highlighting transferable elements from their processes, systems, tools, and training for Cyber to adopt, aiming to improve incident response efficiencies and effectiveness.
  • 15:40

    NETWORKING BREAK

  • 16:05
    James Ng

    Practical approach to security operations and incident management

    James Ng - CISO - Insignia Financial

    Arrow
    • Strategies to uplift your incident response readiness through table-top and crises exercises
    • Creating documented procedures, consistent and easy to understand for relevant stakeholders –you’ll need them ready-to-go in case of an incident
    • Incorporating board and executive management into IR – what do they need to know and do
    • Take-aways and lessons learned – reviewing what went according to plan and what can be improved 
  • 16:30
    Panel Discussion-1

    Panel: Overcoming common IM issues

    Arrow
    • Assessing the status of your incident response capability: when should you perform read-through, table-top, and red team exercises
    • How can pen-testing and vulnerability management be most effective?
    • What are the challenges and benefits of CMDB from an IM perspective?
    • Incident Management Systems – benefits of EDR systems, IDPS, and other managed incident strategies
    • Reactive Incident response vs Proactive Incident response – how well organisation manage that and how well those tasks are defined and segregated among defensive teams

    Panel moderator:

    Jason Murrell, Independent Chair, Cyber Security Certification Australia (CSCAU)  

    Panellists:

    Deniz Molokov, CISO, Downer

    Sonomi Miyazaki, Senior Blue Team Manager, Attack & Response, TPG Telecom

    Jalpa Bhavsar, Senior Consultant, NAB

    Raymond Schippers, Head of Detection and Response, Canva

    Lama Tayeh, Founder, LULUMPR

  • 17:00

    Closing remarks

    Arrow