Hosted by Blackberry (Invite only)
Mark Priebatsch, Regional Director Australia & New Zealand, Checkmarx
During the Equifax 2017 Data Breach (which exposed the sensitive information on 146 million US consumers), Graeme Payne was Senior Vice President and CIO of Global Corporate Platforms. He was fired the day before the former Chairman and CEO of Equifax testified to Congress that the root cause of the data breach was human error and technological failure. Graeme would later be identified as “the human error”. During this session, he’ll explore how the lessons learned from major cybersecurity breaches, including the Equifax 2017 Data Breach, can be applied to your company to “test and improve” your cybersecurity posture.
Graeme Payne, Author, The New Era of Cybersecurity Breaches: A Case Study and Lessons Learned
Mitchell White, Acting Assistant Commissioner for Cyber Security Governance & Operations, ATO
Join us to learn about trends and observations from thousands of cloud environments. What are the common pitfalls? How many falls into common mistakes, and which could be devastating to an organization? See how the cloud allows a new generation of innovation in security tools to provide better comprehensive security with complete coverage and full context We will show and explain how an agentless approach to cloud security can tackle these challenges.
Gil Geron, CPO & Co-Founder, Orca Security
Panel moderator:
Kostas Kyrifidis, President, VSI
Panellists:
Grant Lockwood, CISO, Virtus Health
Damien Manuel, Adjunct Professor for Cyber Security Research and Innovation Centre (CSRI), Deakin University & Chairperson, AISA
Alison O’Hare, Senior Technical Director, Mimecast
A lot of things have changed: everything is code, our datacenters, our infrastructure, and of course our apps. It's all software….
So much software is being built and security teams can't keep up, nor do they have the resources to do so. Most companies have a ratio of 100:1 developers to security professionals, so why not empower developers to take action? It makes economic sense.
Here is the reality: If companies want to survive and thrive in this fast-paced digital world, not only should we trust developers to handle security but also empower them to fix security issues themselves.
In this session, Lawrence Crowther from Snyk will share some insights on how security teams can scale by empowering developers to create secure applications, including the use of modern cloud technologies that are used to deploy and run application workloads.
Lawrence Crowther, Head of Solutions Engineering APJ, Snyk
Panel Moderator:
Daisy Wong, Security Culture and Engagement Lead, Flybuys
Panellists:
Jacqui Loustau, Founder, AWSN
Matt Tett, Co-Chair, AWSN
Jason Murrell, Cloud Branch Chair, AISA
Many organisations today are looking to Zero Trust to better protect critical assets, but struggle to cut through the jargon and marketing smoke. In this session explore how to prevent crippling breaches through proactive controls and simplify the journey to Zero Trust.
Join to learn:
Dragan Vladicic, Director, Solutions Engineer, Okta
TRACK A: Interactive Presentations | TRACK B: Group Discussions |
Threat Detection & Response Strategies – What Sets Success and Failure Apart?
|
|
Pros & Cons of Automating the SOC
|
|
In a world where the pressure to deliver new and innovative ICT capability is only ever growing, and the threat actors are also increasingly sophisticated and pervasive, how can companies ensure they meet these challenges whilst still ensuring cyber resilience? During this session, you’ll hear experiences and lessons learned on Cyber Security Operations Centre (CSOC) automation and different ways of improving and driving efficiency of your CSOC. Our speakers will provide an interesting point of comparison as their CSOC capabilities are vastly different sizes with very different remits, but yet some lessons will prove universal. |
|
Varun Acharya, Deputy CISO, Healthscope |
|
Samuel Morgan, Director Defence Security Operations Centre, Department of Defence Nadia Taggart, Director Cyber Security Operations, Parliament House |
Dive deep into the world of blindspots, AI and automation |
|
Continued...Pros & Cons of Automating the SOC |
Blindspots. They can be literal, in that the organisation doesn't know what they don't know. They can lateral when it comes to malicious actors' encrypted movement across the network. According to the Wall Street Journal, 62% of organisations list 'improving data analysis capabilities' as the top reason for AI adoption. How do you utilise AI correctly and effectively to find network threats in real-time, eliminate blind spots and leverage powerful investigation and forensics capabilities? In this session delivered by Rohan Langdon and Khurram Waheed, they'll discuss what we see across the industry through the customer lens and delve into the world of blindspots, AI and automation regarding network security and delivering more for less within your SOC. |
In a world where the pressure to deliver new and innovative ICT capability is only ever growing, and the threat actors are also increasingly sophisticated and pervasive, how can companies ensure they meet these challenges whilst still ensuring cyber resilience? During this session, you’ll hear experiences and lessons learned on Cyber Security Operations Centre (CSOC) automation and different ways of improving and driving efficiency of your CSOC. Our speakers will provide an interesting point of comparison as their CSOC capabilities are vastly different sizes with very different remits, but yet some lessons will prove universal. |
|
Khurram Waheed, Principal Solution Architect, Extrahop |
Samuel Morgan, Director Defence Security Operations Centre, Department of Defence Nadia Taggart, Director Cyber Security Operations, Parliament House |
Developing and effective cyber security strategy |
|
Know Your Data |
Shane was responsible for developing the Victorian cyber security strategy. In this session Shane will talk about how to effectively align the strategy to your organisations purpose. Pulling cyber from “an IT problem” to a fully supported business enablement strategy that makes a real change. |
|
|
Shane Moffitt, Deputy CISO for Victorian State Government, Cyber Security Branch, Digital Victoria, Department of Premier and Cabinet |
|
Rade Bogdanovic, Director Alliances APJ, BigID Kum Fei Poon, Principal Solutions Consultant, BigID |
Getting Prepared for the Rise in Supply Chain Attacks |
|
Continued...Know Your Data |
During this presentation, we’ll explore how to build supply chain resilience and where it should sit within cybersecurity. We’ll also share good practices for data protection, data governance, fraud prevention and third-party risks to ensure your supply chain is secure. |
|
|
Brian Zerafa, Regional Director, Netskope |
|
Rade Bogdanovic, Director Alliances APJ, BigID |
Pete Murray, Managing Director, Australia & New Zealand, Veritas Technologies
Andrew Morgan, CISO, La Trobe University
With the threat of cyber warfare becoming ever more serious, every organisation needs a “this is not a drill” cyber-first recovery plan. If cyberattackers targeted your organisation, the most likely business-crippling scenario would be a direct attack on Active Directory (AD)—the system that authenticates users and grants access to business-critical applications and services. AD has become a prime target for cybercriminals—implicated in 90% of the incidents Mandiant researchers investigate—because it has systemic vulnerabilities and because it gives attackers the means to unleash devastating malware.
The NotPetya attack that crippled Maersk in 2017 was a harbinger of the chaos to come. In this session, we’ll examine the action plan every organisation needs to execute to protect against a business-disrupting cyber incident.
Sean Deuby, Director of Services, Semperis
Moderator:
Mark Priebatsch, Regional Director Australia & New Zealand, Checkmarx
Speakers:
Jo Steward-Rattray, CSO, Silver Chain
Mazino Onibere, Head of Cyber Security, Risk and Compliance, Regis Aged Care
Mark Priebatsch, Regional Director Australia & New Zealand, Checkmarx
Charles Gillman, CISO, Superchoice
During this session, we’ll explore how to ensure your team has the technical and non-technical skills required to ensure success of your cybersecurity strategies. What role does organisational and change management planning play in getting your workforce strategy right? Why and how is strategy and planning the new trend in cybersecurity?
Agnieszka Lecka, Strategy and Planning Senior Manager, Standard Chartered Bank (Poland)
Wai Kit Cheah, Senior Director, APAC Product Management & Security Practice, Lumen
Moderator:
Deepa Bradley, Cyber Security Strategy and Programs Specialist
Speakers:
Adam Hallyburton, Security Project Manager, SEEK
Sarah Iannantuono, Security Influencer, APAC Security, SEEK
Hashim Khan, Cybersecurity Projects and Governance Lead, SEEK
Security breaches in the cloud usually don’t exploit a single misconfiguration or vulnerability but rather a toxic combination of multiple issues that in isolation wouldn’t raise a red flag given the tons of alerts security teams already get. In this session, we’ll discuss five common toxic combinations across internet exposure, identities and entitlements, software vulnerabilities, and misconfigurations that when combined represent an attacker's pathway to a breach.
Matt Preswick, Enterprise Solutions Engineer, APJ, Wiz
Boards rely heavily on the advice and reporting from CISOs for strategic decision making and ensure appropriate governance regarding Cyber Security matters. Effective Board decisions require structures, policies, and relevant procedures initiated and adhered whilst collecting, organising, utilising and securing the reporting data. This sounds complex, but could what all of us have learned in kindergarten be applicable and the lens in which we should look through to simplify how CISOs should be communicated to Board, and to enable directors to take responsibility for the information they receive?
Arnold Wong, National Treasurer, ACS
Your Customer Identity and Access Management (CIAM) program doesn't have to be burdened with uncomfortable tradeoffs. You can achieve your security objectives AND deliver a low-friction customer experience (CX), extend the platform to suit your organization's needs, deploy it however your organization requires, and achieve a quick ROI. Learn how to achieve CIAM Without Compromise.
Robin Antony, Solutions Architect, WSO2
Remote work and relentless user-oriented attacks is putting cybersecurity professionals under incredible pressure. During this session, we’ll discuss the latest trends and insights into phishing and other cyber threats targeting your users based on survey data, simulated phishing exercises and real-world attacks. Our presenters will also share valuable actionable recommendations for you to take back to your organisation.
Panel moderator:
Ron Gauci, CEO, AIIA
Panellists:
Christie Wilson, Cyber Resilience Manager, UniSuper
Daniela Fernandez, Head of Information Security, PayPal Australia
Jo Steward-Rattray, CSO, Silver Chain
Matt Berry, Senior Pre-Sales Engineer, Abnormal Security
Three-quarters of Australian CISOs see human error as their organisation’s biggest cyber vulnerability. It only takes one employee to click on a bad email to compromise your organisations entire network. Actors know what the weakest link is and they’ve long since shifted to exploiting the human. What if there was a way to stop rolling the human dice every day?
Learn how organisations can leverage advanced behavioral science and automation for informed and near instantaneous decision making on what is good and what is bad email. As well as removing the increasing burden that is placed on employees as a last line of defence.
Join this session to understand:
TRACK A: Interactive Presentations | TRACK B: Presentations |
Into the Wild: Exploring Today's Top Threats | The Anatomy of a Ransomware attack | |
Today's elevated threat landscape has seen an increase of 136% in widespread attacks. This new normal demands a multi-faceted, context-aware approach to security. Rapid7’s Ken Mizota, Field CTO, Asia-Pacific & Japan, will explore how combining threat intelligence and vulnerability intelligence allows you to anticipate and prevent attacks in addition to detecting and recovering more quickly. |
|
Pete Murray of Veritas, on the back of his presentation yesterday on the results of the CISO survey of Ransomware Readiness, will have a fireside chat with the CEO of a Melbourne based provider of Data Protection as-a-Service about how they have helped many of their clients recover from Ransomware, profiling in particular the high profile case of a global logistics company who got compromised not once but twice, sharing the learnings from real-world Ransomware recovery. |
Ken Mizota, Chief Technology Officer, APAC, Rapid7 |
|
Pete Murray, Managing Director, Australia & New Zealand, Veritas Technologies David Duncan, CEO, Global Storage |
Building a robust and resilient SOC: An experienced SOC insider perspective | Are Information Security Audits evolving with the industry? | |
Cybersecurity leaders often struggle to convey the business value of their Security Operations Centers to the board which may result in reduced investment, poor collaboration and diminishing support. Hear from Jalpa Bhavsar, an experienced SOC analyst, who has worked at different types of SOC setup. She will share her experiences and lessons learned on choosing the right SOC model, improving and driving efficiency of SOC. | ||
Jalpa Bhavsar, Senior Security Analyst, Coles Group | Chikonga Maimbo, Manager Information Security, Bank Australia |
Strategies to Manage the ‘Often-Unseen’ Third-Party Security Risks | Practical & Holistic Zero Trust: Adopting a Consolidated Security Architecture | |
|
This Think Tank is designed for cybersecurity leaders who are currently investing in Zero Trust architecture models or planning to do this in the near future. During this practical, hands-on session, 10-15 executives will share their challenges and explore solutions on:
|
|
Daniela Fernandez, Head of information Security, PayPal Australia |
Abbas Kudrati, Executive Advisory Board for Cyber Security, Deakin University |