-
DAY ONE
-
07:20
Cyber Leaders Private Breakfast (Invite Only)
-
08:20
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
08:50
Welcome from Corinium and the Chairperson
Louisa Vogelenzang - Head of Cybersecurity, APJ - Dayforce
-
09:00
Opening Keynote: Cyber strategy – creating robust and future-oriented frameworks
Nigel Hedges - CISO - Chemist Warehouse
Dive into a comprehensive exploration of strategic security planning amid the dynamic landscape of cyber threats. This session will discuss a useful framework of to-do’s for formulating a robust and future-oriented security strategies. By asking the right questions, we'll uncover critical insights and approaches that help your organisation anticipate and mitigate risk, thereby securing a more resilient future in an era of growing uncertainty.
-
09:25
Dynamic Risks, Strategic Moves - Embracing Change for Success
Dave Ormrod - Director Information Warfare - Defence SA
In this keynote, we unveil the shifting landscape of threats and their far-reaching impact on businesses. Gain insight into the world of threat actors, understanding the motivations driving their behaviours. Witness the transformational power of aligning technology risk with your core business strategy, forging a shield against emerging risks. Explore the art of effectively managing enterprise-scale cybersecurity risks, including the intricate web of third-party and supply chain considerations. And, finally, discover key factors to nurture a workforce primed to tackle the evolving challenges that await. Join Dr. Ormrod on the path to strategic resilience, where thriving amidst dynamic risks is the goal.
-
09:50
Securing the Future: Trust and Safety in AI Development
Lawrence Crowther - Head of Solutions Engineering - Snyk
-
10:15
NETWORKING BREAK
-
10:45
Leveraging cybersecurity as a business growth enabler
John Ellis - Adjunct Professor - Deakin University
- Getting senior management commitment and establishing the company’s risk appetite
- Aligning your security frameworks with key business requirements
- Successful practices governing policies for controls, regulations, and the strategy
- Implementing monitoring processes and metrics for effectiveness and continuous improvement
- How cyber can deliver value by fulfilling business objectives, which in turn increases customer trust
-
11:10
Mitigating Risk to the #1 Target for Attackers: Your Enterprise Identity System
Sean Deuby - Principal Technologist - Semperis
The foundational component of a modern security architecture is a secure identity system. And though most organizations are thinking "cloud first", identity doesn't start in the cloud - it starts on premises. And overwhelmingly that on-premises identity system is Microsoft’s Active Directory (AD).
AD is involved in more than 90% of all cyberattacks today because when it's compromised it gives attackers near-total control over your IT systems. And once crippled by a cyberattack, it requires an average of two weeks to rebuild and regain trust manually - while your business is down.
In this session, Sean will review:- Why AD is such a target
- How you can increase operational resilience of this mission critical identity system by
- Mitigating attacks against your AD
- Significantly reducing its recovery time objective (RTO)
-
11:35
Panel: Compliance burden – How much regulation is too much?
- Sharpening standards and compliance practices
- Assessing the cost-impact of compliance from a strategic perspective
- Complying with CPS 234, CPG 234, CPG 235, and other standards such as ISO27001, NIST and Essential 8
- Sharing information and intelligence to support the wider ecosystem
- How do industry and boards keep up with all the government led changes such as SoNs and the multiple reporting obligations across various government regimes?
Panellists:
Varun Acharya, CISO, Healthscope
Roshan Daluwakgoda, CISO, Eastern Health
Sourish Datta, CISO, Triple Zero Victoria
Grant Lockwood, CISO, Virtus Health
Sandeep Taileng, CISO, State Trustees VIC
-
12:10
The Best Kept Secret in Security
Grant Orchard - Field CTO APJ - HashiCorp
Credentials, API tokens, certificates, keys. All of these secrets are growing at a rapid rate as we work towards building least privilege patterns. This proliferation introduces significant challenges for visibility, lifecycle, and user experience, and poses significant risk when they fall into the hands of bad actors. In this talk, Grant Orchard, Field CTO for HashiCorp looks at the necessary shifts that you need to make to keep your secrets safe.
-
12:35
Embracing GRC as the secret weapon to boost cyber maturity
Andrew Morgan - CISO - La Trobe University
GRC is the super sexy discipline that most of us don’t even know we need. We tend to love shiny technologies, but does the rest of business see the same sparkle?
Cyber is all about managing a risk that can shut down your company if you stuff it up. Governance creates the visibility and accountability for the entire business. The key point of risk is knowing you can’t stop everything while ensuring everyone agrees on how far you’re going to go to try and stop bad things from happening. Compliance allows you to ensure the laws that impact your business and the frameworks you’ve chosen to align with have been turned into a cyber security approach that gives regulators comfort that you’ve got your act together. -
13:00
Lunch
-
TRACK A - Critical Infrastructure
-
14:00
Speed Networking – Making new connections!
During this 10-minute networking session, the aim of the game is to go and meet three people you don't already know. Use the questions on the screen to guide your conversation. Have fun!
-
14:10
Improving cyber resilience strategy and effective board reporting
Roshan Daluwakgoda - CISO - Eastern Health
- Evaluating the threat landscape and how it can impact your business
- What the new regulatory requirements - such as SOCI Act Reform and the 2023-2030 Australian Cyber Security Strategy - mean for your enterprise
- Assessing your company’s risk exposure against the risk tolerance
- Bringing those two together and defining a robust roadmap
- Reporting to the board by presenting KPIs and maturity assessments for effective communication
-
14:35
Asset Intelligence: The Bedrock of Cyber Security
Paul Thomas - Senior Solutions Architect, ANZ - Axonius
Extensive knowledge of assets that need to be secured is foundational for any effort to secure any type of asset. It’s no surprise that the Security of Critical Infrastructure Act 2018 (SOCI) addresses this in its initial requirements and recommendations.
When an Asset Intelligence platform is implemented as the bedrock of a cyber security initiative asset information is continuously collected, aggregated, correlated and analysed making all subsequent activities easier.
Join me to learn what constitutes an Asset Intelligence platform and how specific capabilities optimise every step of the process to compliance.
-
15:00
Panel: Identifying and implementing the right controls for CI
- Building security from scratch – why common controls are not enough for CI, and identifying which ones are
- Strategies to reduce the attack surface, protect critical systems, separate environments, and contain a breach to prevent business interruption and disaster
- Exploring how innovative technologies can help your company achieve adaptability and resilience
Panel moderator:
Rachel Bailes, Delivery Manager, Compliance Policy and Reporting, Coles
Panellists:
Nitin Singh, CISO, Victoria University
Anafrid Bennet, Head - Technology, Security & Property, Greater Western Water
Grant-Ross Seegers, Head of Security Governance, Coles
Lee Barney, GM Tech Security, TPG Telecom
Dinesh Perera, Head of Risk Management, Compliance and Security, Pacific, Ingenico Financial Services
Simon Cowley, Principal Cybersecurity Officer & IMT, eHealth, Department of Health
-
15:25
Zero Trust in Critical Infra: from Cyber Conscious to Cyber Resilient
Andrew Kay - Director, Systems Engineering, APJ - Illumio
How cyber leaders in critical infrastructure organisations are adopting Zero Trust Segmentation as a simple way to not only protect themselves and the public interest from immediate and evolving threat, but also to strategically balance innovation and cyber risk. Rethinking security architectures for modern platforms that run critical infrastructure and economy vital systems - from conscious reaction to resilient anticipation.
-
TRACK B - Information Risk Management
-
14:00
Speed Networking – Making new connections!
During this 10-minute networking session, the aim of the game is to go and meet three people you don't already know. Use the questions on the screen to guide your conversation. Have fun!
-
14:10
Unleashing the Power of Offensive Security Teams
Eldar Marcussen - Head of Offensive Security - SEEK
Explore practical methods for optimizing the performance of offensive security teams within your organization. We will discuss fostering team culture and morale, alongside techniques for boosting technical expertise. Additionally, we'll examine ways to apply offensive security skills in unconventional contexts, expanding their impact beyond traditional penetration testing. By the end, you will have actionable insights to empower your offensive security teams to strengthen your organizational security. -
14:35
Setting security strategy by navigating the threat landscape
Partner session - Senior representative - Varonis
One of the aims of a security program is to address the risk associated with the ‘threat landscape’ faced by an organisation. But what is a threat landscape? In this talk, we will discuss some approaches on how to characterise and map the threat landscape, derive an organisational risk profile, and set objectives for a workable security program. We’ll look at how the characterisation of the threat landscape aligns with the desirable characteristics of a security program. This approach has a strategic focus and guarantees an optimal security spend in terms of product selection, implementation, and operational parameters for the program. -
15:00
Panel: Fostering synergy between boards, senior management, and across departments
- Effective ways to influence boards and senior management on how security is aligned with the business goals
- Engaging the Steering Committee: How to get cross-functional representatives to be security cheerleaders
- The power of joining forces to assess risks, implement security controls, and ensure tech infrastructure is compliant to regulations
Panel moderator:
Joss Howard, Global Cybersecurity Strategist
Panellists:
Sandy Aitken, Director, Technology Transformation, Tabcorp
Vijay Narayan, CISO, Mercy Health
Sara Abak, CISO, Intellihub Group
Robert Turney, Head of Cyber Security, iSelect
Indika Wimalasiri, CISO, Beyond Blue
Sanja Marais, Chief Technology and Security Officer, Aspen Medical
-
15:25
Secure as a Value Centre
Simon Hoare - Regional Sales Manager & David Taylor - Solution Architect - Aqua Security
Aqua will discuss the value a CISO brings across the enterprise.
- Being able to show risks that were picked up and prevented
- Being able to show a reduction of risky behaviours though monitoring, behaviour adjustment and enforcemen
- Reporting on attacks stopped
- Reducing time to remediate
- Consistent policy deployment (reduced time, clear protection)
- Integration into automation reducing engineering hours
- Consistent protection across clouds and lifetime of platforms
Speakers:
Simon Hoare, Regional Sales Manager, Aqua Security
David Taylor, Solution Architect, Aqua Security
-
TRACK C - Business Enabler
-
14:00
Speed Networking – Making new connections!
During this 10-minute networking session, the aim of the game is to go and meet three people you don't already know. Use the questions on the screen to guide your conversation. Have fun!
-
14:10
Scaling your SaaS business – securely!
Matt Archer - CTO - Quadrent
During this presentation, we’ll explore how Fintech businesses can mitigate information security risks when scaling within a SaaS environment by putting security at the core of their innovation and growth strategies. Join us to hear common challenges, objectives, and the key considerations to those going through a similar journey.
-
14:35
Why SaaS breaches are the best kept secrets
Jasper Chik - Senior Engineer - AppOmni
Secrets such as APIs, tokens, valid and stolen credentials act as keys to unlock protected resources. They are the leading threat vector for data exposures and breaches of enterprise SaaS applications. In this session, learn the anatomy of a SaaS breach and best practices to build a viable SaaS threat model.
-
15:00
Fireside chat: Educate, educate, educate – simple steps to improve accountability across the business
Effective ways to educate – engaging diverse people with cybersecurity and online safety
People centric – adopting an in-person tone and using real-life examples of how a cyberattack can impact everyone’s live
Relevant – what’s in it for them and why they should care
Providing resources – setting clear expectations and providing resources
Panel moderator:
Vriti Magee, Enterprise Security Architect, Transurban
Panellists:
John O'Driscoll, Victoria Government Chief Information Security Officer, Department of Premier and Cabinet
Vijay Krishnan, CISO, UniSuper
Joanne Lu, Manager Group Cyber Automation, Qantas
Fiona Collie, Cyber Awareness and Outreach Manager, Monash University
Raheem Sar, APAC Region Manager - Security, Risk & Compliance, The Access Group
Ryan Nera, BISO, Telstra
-
15:25
Bringing stakeholders together for a successful Zero Trust journey
Partner session - Senior representative - XM Cyber
- How to develop a roadmap and implementing specific initiatives to your projects
- Discover effective ways to build a zero-trust security framework
- Identify key components of a zero-trust model to protect the current environment
-
15:50
NETWORKING BREAK
-
TRACK A - Critical Infrastructure
-
16:10
What a practical approach to SOCI Act looks like in an enterprise
Sourish Datta - CISO - Triple Zero Victoria
While essential, the SOCI Act is still complex for many organisations across sectors. Having an effective plan in place is key when developing your compliance strategy and meeting critical infrastructure regulations and standards. During this session, we’ll discuss practical steps to be taken to ensure your enterprise is compliant with regulations and obligations.
-
16:35
PAM is the new Firewall
Daniel Comarmond - Cybersecurity Solution Engineer - Delinea
There’s more to privilege management than access - it’s protection.
Just like a firewall, privilege management segments your infrastructure by controlling who are the appropriate people and services, and how they use your powerful admin credentials.
Learn how Delinea uses identity intrinsically linked to privilege and authorisation that can, and should, be used as your primary defence.
Every user, machine, role has an identity and has privileges that must be considered and used strategically.
-
17:00
Practical approach to OT risk – hype or reality?
Trevor Goldman - Technical Director OT Cybersecurity - Worley
Critical infrastructure owners and operators face specific challenges, and common security controls might not meet the enterprise’s requirements. During this session, we will explore how to adopt a holistic and practical approach to OT by involving business owners and architecture teams. We’ll also explore successful practices in mitigating third-party risks.
-
TRACK B - Information Risk Management
-
16:10
Advancing your cyber maturity through improved resilience
Toh Shang Yee - Head of Information Security (CISO) - MCIS Insurance Berhad (Malaysia)
- Developing risk assessment strategies with the emerging risks and threat landscape in mind
- Conducting gap analysis to identify where resilience can be improved
- Analysing metrics for visibility of the effectiveness of your cyber programs
- Selecting the best maturity model for your organisation and creating an advancement plan
-
16:35
Fortifying your Security Operations with Enhanced Visibility
Robin Long - Field CTO, APAC - Rapid7
Due to the constant evolution of our internal networks and in the face of an unforgiving threat landscape, Security Operations teams are constantly looking at new ways to enhance their visibility in order to better anticipate cyber threats. This session will explore the importance of how clarity of goals, visibility of your attack surface, and cyber threat intelligence can be helpful in better focusing your cyber security defences.
-
17:00
A risk-based approach to cybersecurity
- Streamlining your controls to avoid duplicative effort and align them with business objectives
- Influencing stakeholders to ensure a more business focused approach to cybersecurity
- Proactively managing for changes in the environment to ensure continuous compliance
- Building cyber risk awareness and culture to influence change
-
TRACK C - Business Enabler
-
16:10
Shifting cybersecurity from a cost centre to a business enabler
Charles Gillman - CISO - SuperChoice
- Building trust with clients and stakeholders
- Compliance as a key enabler
- Security & compliance as a competitive differentiator
- How security & compliance can enable sales
-
16:35
Defence in Depth – People, Technology and Process
Partner session - Senior representative - Ping Identity
During this session, we will explore how an approach that uses layered defensive mechanisms to protect systems and data can be effectively implemented in your organisation.
-
17:00
Improving cyber culture and awareness
Anne Sanduni Jayasooriya - Cybersecurity Engineer - Racing Victoria
-
17:25
Closing remarks
-
17:30
Day One Close and CISOs Cocktail Reception & Networking
Continue the conversations in a fun and entertaining way.
-
18:00
Cyber Leaders Private Dinner (Invite Only)
Not Found
-
DAY TWO
-
07:20
Cyber Leaders Private Breakfast
-
08:20
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
08:50
Welcome from Corinium and the Chairperson
Jason Murrell - Independent Chair - Cyber Security Certification Australia (CSCAU)
-
09:00
Opening Keynote: Responding to Cyber Incidents: A Year of Insights
Joe Smith - Assistant Secretary and Acting Deputy Cyber Security Coordinator - National Office of Cyber Security
- Lessons learned from recent high-profile cyber incidents
- How the National Office of Cyber Security helps coordinate responses to incidents
- What's involved in effective consequence management
-
09:25
Future-proofing cloud security: A new operating model
Matt Preswick - Lead Enterprise Solutions Engineer, APJ - Wiz
A successful cloud security strategy needs to evolve to meet the changing needs of the business and growth of the cloud. Cutting-edge security teams are coming up with new approaches and initiatives to improve their company’s agility through security and accelerate the business. In this session, learn how you can improve your cloud security operational efficiency by up to 10 times by operationalizing security and democratizing it across your organization. -
09:50
Building a cybersecurity program from scratch
Sam Fariborz - CISO - David Jones
Designing a cybersecurity operating model with people, processes, and technology at the core of your strategy is key. How to factor in the business strategy into the operating model, and how to take your business requirements as part of that process. During this session, we’ll explore strategies to:
- Build a well-developed program that supports and is tailored to the organisation’s needs
- Create a well-designed program with cooperation and support from stakeholders and management
- Develop effective metrics and KPIs for program design, implementation, and management performance assessment
-
10:15
NETWORKING BREAK
-
TRACK A - PRESENTATIONS
-
10:45
Making Information Security Your CFO’s Best Friend with Smarter Cost Optimisation
Eugene Ostapenko - CISO - illion Australia and New Zealand
The technological ecosystem continues to expand in complexity, threats to be mitigated and compliance requirements. Information Security leaders must navigate a tightrope between this expansion and the fact that the budgets will not grow fast enough to keep up with the rising costs. Thus, Information Security leaders must adopt smarter cost optimisation strategies to reduce costs while funding new growth to drive efficiency. You will learn how IT executives can improve their security posture while reducing or maintaining the overall cost:
- Implement product consolidation and procurement strategies
- Extend the use of lower-cost controls with process improvements
- Foster a security culture and engage stakeholders to co-fund security initiatives
-
11:10
Security integration with DevOps and DevSecOps – hype or reality?
Partner session - Senior representative - TBA
- Exploring the pros and cons of development frameworks from a security perspective
- How IT delivery is evolving and what it means for security
- Enabling speed, quality & security with DevOps
- Strategies to embed security into your digital delivery journey
- Effective ways for DevSecOps roadmap design
-
11:35
Embracing AI with confidence – leveraging the benefits while mitigating the risks
Greg Adamson - CISO - Department of Transport and Planning
- What trends are we looking from a security perspective?
- Understanding the risks and implications of offensive AI and how it will change our threat landscape
- How CISOs can be prepared for potential risks
- Strategies to use AI in cyber defence
-
12:00
Minimising exposure to threats by strengthening your weakest link – the people
Partner session - Senior representative - TBA
- Account takeover techniques and measures that can be taken to help protect against them
- New insights and controls over protecting against supply chain attacks
- The accuracy of advanced behavioural data science in identifying anomalous behaviour
-
12:25
Building cyber resilient organisations: beyond technical expertise
Rhiannon Taylor - Cyber Security Program Manager - Airservices Australia
During this presentation, we’ll discuss:
- Resilient culture
- Cybersecurity and leadership
- Humans Factors
- Interdisciplinary strategies
-
TRACK B - PANEL DISCUSSIONS
-
10:45
PANEL DISCUSSION: Evolving your supply chain security practices and advancing its maturity
- How security is changing and how to ideally address it
- The shift-left reality and how the solution didn't work
- The cost implications of a wrong security workflow
- How to make DevSecOps work, strategically
Panel moderator:
Lisa Dethridge, Senior Research Fellow, RMIT University
Panellists:
Mazino Onibere, CISO, Regis Aged Care
Pearse Courtney, Cyber Project Manager, AEMO
Oliver Pettit, Senior Manager, Monitoring & Defence, Cyber Security, AGL
-
11:10
PANEL DISCUSSION: Reinforcing your Boundaries with IAM
Many organisations are implementing an integrated identity access and governance management to overcome the challenges they face when upgrading business operations, modernising aging infrastructure, and protecting network perimeters. Join us to learn how IAM is successfully helping safeguard your organisation while scaling up.
Panellists:
Ad Wolst, Head of Cyber Security Engineering & Platform Services, Technology Security, Bupa
James Byrne, Manager, Cybersecurity Architecture, AMPOL
Chikonga Maimbo, Manager Information Security, Bank Australia
Daniel Eastley, Cyber Security Services Manager, JB Hi-Fi and The Good Guys
-
11:35
PANEL DISCUSSION: Influencing Human Behaviour and Reducing Cyber Risks
- Importance of human factor to cyber security and why most cyber awareness efforts fail
- Tailoring security awareness programs to address cyber risks and business priorities
- Strategies to influence behaviour and create a cyber-safe culture
Panel moderator:
Lisa Dethridge, Senior Research Fellow, RMIT University
Panellists:
Tara Dharnikota, Head of Information Security Management, PEXA
Bethwyn Berry, Head of Cyber Security, PMO & Governance, BlueScope Steel
May Mun, Senior Manager – Cyber Governance and Assurance, Transurban
Sandeep Taileng, CISO, State Trustees VIC
Daisy Wong, Security Culture & Awareness Lead, Flybuys
-
12:00
PANEL DISCUSSION: The bright and dark side of AI
AI is here to stay. How can we leverage its benefits while preventing its risks? Join us to discuss dos and don’ts of AI use in business. Exploring AI bright and dark side, from ChatGPT misuse to opportunities of bridging the talent gap
- Can vendors fast track AI in cybersecurity tools?
- What trends are we seeing from a security perspective?
- What are the risks and implications of offensive AI and how it will change our threat landscape?
- How CISOs can keep pace with AI evolution without being a blocker and a function of “no”
- Ways to be prepared for potential risks, and strategies to use AI in cyber defence
- You can’t ban AI – how to balance security & GRC to manage and govern risks
Panellists:
Tony Lou, Cyber Security Manager, Bendigo Health
Lisa Dethridge, Senior Research Fellow, RMIT University
-
12:25
PANEL DISCUSSION: Improving application security to support business value delivery
The software development and application security testing landscapes have changed significantly over the years. Application security, however, has not quite kept up and doing security is still an onerous and frustrating process, with security still slowing development down. During this session, we’ll share different approaches to application security and the application's supply chain.
Panellists:
Neha Malik, Head of Application Security, REA Group
-
12:50
Lunch
-
13:50
INTERACTIVE DISCUSSION: PAY THE RANSOM OR NOT?
Your organisation confirms the breach, and you get contacted by the hacker asking for the ransom payment. Whatever decision you make comes with uncertainties and consequences. Join us for a heated discussion around the challenges, concerns, and risks of paying – or not – the ransom.
Panellists:
Anya Avinash, Head of Cybersecurity, Bank First
Vijay Narayan, CISO, Mercy Health
Ashutosh Kapsé, CISO, Statrys
Gaurav Vikash, Head of Security and Risk, APAC, Axon Enterprise
Rob Wiggan, Cybersecurity Specialist, WTW
-
14:25
Ransomware, risk, and recovery: how secure is your Hybrid Active Directory (AD)?
Partner session - Senior representative - TBA
- Clear and straightforward action steps you can take to reduce your AD risk profile include
- Identifying and addressing common AD security gaps
- Continuously monitoring your AD environment for evidence of in-progress attacks
- Developing a tested AD disaster recovery plan that will recover your entire AD forest to a known-secure state in hours (or minutes)
-
14:50
Navigating the Cyber Resilience Journey in M&A to Achieve Seamless Integration and Security Enhancement
Rob Testi - Head of Cybersecurity - People First Bank
Hear first-hand from someone 12 months from Day 1 of a merger about:
- How to navigate the opportunities and pitfalls from achieving a unified approach to cyber when faced with bringing two disparate teams together following an M&A
- How to manage the threats and risks that surface following the organisation's growing in size and market prominence
- How to approach the need to consolidate cyber technologies, tools and controls whilst actively defending against attacks
- What happens when you have two SOCs and need to get to one?
- How to keep your people motivated on the merger journey?
-
15:15
Creating robust and future-oriented frameworks
Will Sharpe - CISO - Telstra Health
Dive into a comprehensive exploration of strategic security planning amid the dynamic landscape of cyber threats. This session will discuss a useful framework of to-do’s for formulating a robust and future-oriented security strategies. By asking the right questions, we'll uncover critical insights and approaches that help your organisation anticipate and mitigate risk, thereby securing a more resilient future in an era of growing uncertainty.
-
15:40
NETWORKING BREAK
-
16:10
Effective Data Breach Response and Incident Management
Ian Pham - Head of Information Security - VMIA
-
16:35
Practical approach to security operations and incident management
James Ng - CISO - Insignia Financial
- Strategies to uplift your incident response readiness through table-top and crises exercises
- Creating documented procedures, consistent and easy to understand for relevant stakeholders –you’ll need them ready-to-go in case of an incident
- Incorporating board and executive management into IR – what do they need to know and do
- Take-aways and lessons learned – reviewing what went according to plan and what can be improved
-
17:00
Panel: Overcoming common IM issues
- Assessing the status of your incident response capability: when should you perform read-through, table-top, and red team exercises
- How can pen-testing and vulnerability management be most effective?
- What are the challenges and benefits of CMDB from an IM perspective?
- Incident Management Systems – benefits of EDR systems, IDPS, and other managed incident strategies
- Reactive Incident response vs Proactive Incident response – how well organisation manage that and how well those tasks are defined and segregated among defensive teams
Panellists:
Deniz Molokov, General Manager, Cyber Security Operations, Downer
Sonomi Miyazaki, Senior Blue Team Manager, Attack & Response, TPG Telecom
Salvatore Trimboli, Chief Information Technology Officer, TLC Healthcare
Raymond Schippers, Security Engineering Director – Detection & Response, Canva
-
17:40
Closing remarks
Not Found