<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">


CISO MELBOURNE


Connecting you to what's next in information security

12-13 July 2022
Park Hyatt Hotel
EXPLORE SPONSORSHIP
DOWNLOAD THE AGENDA
REGISTER

DOWNLOAD THE AGENDA TODAY

Plan each day with our downloadable agenda
DOWNLOAD THE AGENDA  

AGENDA

  • Tuesday, 12 July, 2022
  • Wednesday, 13 July, 2022
7:30-8:30am AEST
VIP Breakfast

Hosted by Blackberry (Invite only)

8:20-8:50am AEST
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
08:50-9:00am AEST
Welcome from Corinium and the Chairperson

Mark Priebatsch, Regional Director Australia & New Zealand, Checkmarx

9:00-9:25am AEST
International Opening Keynote: Lessons Learned from the Equifax 2017 data breach

During the Equifax 2017 Data Breach (which exposed the sensitive information on 146 million US consumers), Graeme Payne was Senior Vice President and CIO of Global Corporate Platforms. He was fired the day before the former Chairman and CEO of Equifax testified to Congress that the root cause of the data breach was human error and technological failure. Graeme would later be identified as “the human error”. During this session, he’ll explore how the lessons learned from major cybersecurity breaches, including the Equifax 2017 Data Breach, can be applied to your company to “test and improve” your cybersecurity posture.

Graeme Payne, Author, The New Era of Cybersecurity Breaches: A Case Study and Lessons Learned

9:25-9:50am AEST
Keynote: Mastering Difficult Conversations – How to Report Risks to the Board
  • Understanding cyber risks in a quantifiable way
  • How to demonstrate the value of risks to the executive management
  • What are the biggest challenges when getting buy-in from top management?
  • Communication effectiveness: putting yourself in the boss’ shoes and delivering the right message

Mitchell White, Acting Assistant Commissioner for Cyber Security Governance & Operations, ATO

9:50-10:15am AEST
Cloud Security - lessons from the trenches and the necessity of innovative security tools and practices

Join us to learn about trends and observations from thousands of cloud environments. What are the common pitfalls? How many falls into common mistakes, and which could be devastating to an organization? See how the cloud allows a new generation of innovation in security tools to provide better comprehensive security with complete coverage and full context We will show and explain how an agentless approach to cloud security can tackle these challenges.

Gil Geron, CPO & Co-Founder, Orca Security

10:15-10:45am AEST
Morning tea ☕
10:45am-11:15pm AEST
Keynote Panel: What CISOs Should Do When Cyber and Privacy Converge?
  • Combining cybersecurity and data protection to comply with increased data privacy regulations
  • How to adopt secure digital identity and mitigate privacy rights risks
  • Embedding the necessary protections into your identity verification systems
  • Implementing architecture systems that reduces overcollection during identity verification

Panel moderator:

Kostas Kyrifidis, President, VSI

Panellists:

Grant Lockwood, CISO, Virtus Health

Damien Manuel, Adjunct Professor for Cyber Security Research and Innovation Centre (CSRI), Deakin University & Chairperson, AISA

Alison O’Hare, Senior Technical Director, Mimecast

11:15-11:40am AEST
Can we really trust developers to handle security?

A lot of things have changed: everything is code, our datacenters, our infrastructure, and of course our apps. It's all software….
So much software is being built and security teams can't keep up, nor do they have the resources to do so. Most companies have a ratio of 100:1 developers to security professionals, so why not empower developers to take action? It makes economic sense.
Here is the reality: If companies want to survive and thrive in this fast-paced digital world, not only should we trust developers to handle security but also empower them to fix security issues themselves.
In this session, Lawrence Crowther from Snyk will share some insights on how security teams can scale by empowering developers to create secure applications, including the use of modern cloud technologies that are used to deploy and run application workloads.

Lawrence Crowther, Head of Solutions Engineering APJ, Snyk

11:40-12:15am AEST
Panel Discussion: How to improve awareness of the cyber security industry?
  • How can we raise awareness of the cyber security industry?
  • How can people join the cyber security industry and what experiences can you share?
  • How can Executives or CISO’s support and what can be done to increase more awareness?
  • What can be done in the short term and long term?

Panel Moderator:

Daisy Wong, Security Culture and Engagement Lead, Flybuys

Panellists:

Jacqui Loustau, Founder, AWSN

Matt Tett, Co-Chair, AWSN

Jason Murrell, Cloud Branch Chair, AISA

12:15-12:40pm AEST
Making Zero Trust Possible

Many organisations today are looking to Zero Trust to better protect critical assets, but struggle to cut through the jargon and marketing smoke. In this session explore how to prevent crippling breaches through proactive controls and simplify the journey to Zero Trust.

Join to learn:

  • What should your Zero Trust ‘north star’ be
  • Critical elements of building Zero Trust controls
  • Outcomes of a deny by default vs detect and respond
  • How to apply your initial Zero Trust controls across hybrid environments

Dragan Vladicic, Director, Solutions Engineer, Okta

12:40-1:40pm AEST
Lunch
Breakout Sessions
TRACK A: Interactive Presentations TRACK B: Group Discussions
1:45-2:10pm AEST
Threat Detection & Response Strategies – What Sets Success and Failure Apart?
 
Pros & Cons of Automating the SOC
 
  • Building a culture of security resilience – the marriage of technology and capability
  • Beyond the SIEM alert – pivoting towards a threat hunting mindset
  • The well-read security analyst – the value of threat intelligence in a world that won’t stay still

 

 

In a world where the pressure to deliver new and innovative ICT capability is only ever growing, and the threat actors are also increasingly sophisticated and pervasive, how can companies ensure they meet these challenges whilst still ensuring cyber resilience? During this session, you’ll hear experiences and lessons learned on Cyber Security Operations Centre (CSOC) automation and different ways of improving and driving efficiency of your CSOC. Our speakers will provide an interesting point of comparison as their CSOC capabilities are vastly different sizes with very different remits, but yet some lessons will prove universal.

Varun Acharya, Deputy CISO, Healthscope

 

Samuel Morgan, Director Defence Security Operations Centre, Department of Defence

Nadia Taggart, Director Cyber Security Operations, Parliament House

 

2:10-2:35pm AEST

Dive deep into the world of blindspots, AI and automation

 

Continued...Pros & Cons of Automating the SOC

Blindspots. They can be literal, in that the organisation doesn't know what they don't know. They can lateral when it comes to malicious actors' encrypted movement across the network.

According to the Wall Street Journal, 62% of organisations list 'improving data analysis capabilities' as the top reason for AI adoption. How do you utilise AI correctly and effectively to find network threats in real-time, eliminate blind spots and leverage powerful investigation and forensics capabilities?

In this session delivered by Rohan Langdon and Khurram Waheed, they'll discuss what we see across the industry through the customer lens and delve into the world of blindspots, AI and automation regarding network security and delivering more for less within your SOC.
 

In a world where the pressure to deliver new and innovative ICT capability is only ever growing, and the threat actors are also increasingly sophisticated and pervasive, how can companies ensure they meet these challenges whilst still ensuring cyber resilience? During this session, you’ll hear experiences and lessons learned on Cyber Security Operations Centre (CSOC) automation and different ways of improving and driving efficiency of your CSOC. Our speakers will provide an interesting point of comparison as their CSOC capabilities are vastly different sizes with very different remits, but yet some lessons will prove universal.

Khurram Waheed, Principal Solution Architect, Extrahop

Rohan Langdon
, ANZ Country Manager, Extrahop

 

Samuel Morgan, Director Defence Security Operations Centre, Department of Defence

Nadia Taggart, Director Cyber Security Operations, Parliament House

 

2:35-3pm AEST

Developing and effective cyber security strategy

 

Know Your Data

Shane was responsible for developing the Victorian cyber security strategy. In this session Shane will talk about how to effectively align the strategy to your organisations purpose. Pulling cyber from “an IT problem” to a fully supported business enablement strategy that makes a real change.  
  • Explore the importance of knowing where your data is and how it can impact the business
  • Challenges faced with privacy and security regulations and requirements
  • Discuss where technology plays a role

Shane Moffitt, Deputy CISO for Victorian State Government, Cyber Security Branch, Digital Victoria, Department of Premier and Cabinet

 

Rade Bogdanovic, Director Alliances APJ, BigID

Kum Fei Poon, Principal Solutions Consultant, BigID

 

3pm-3:25pm AEST

Getting Prepared for the Rise in Supply Chain Attacks

 

Continued...Know Your Data

During this presentation, we’ll explore how to build supply chain resilience and where it should sit within cybersecurity. We’ll also share good practices for data protection, data governance, fraud prevention and third-party risks to ensure your supply chain is secure.  
  • Explore the importance of knowing where your data is and how it can impact the business
  • Challenges faced with privacy and security regulations and requirements
  • Discuss where technology plays a role

Brian Zerafa, Regional Director, Netskope

 

Rade Bogdanovic, Director Alliances APJ, BigID

Kum Fei Poon, Principal Solutions Consultant, BigID

 

3:25-3:55pm AEST
Afternoon tea ☕
3:55-4:05pm AEST
State of Ransomware Readiness Survey

Pete Murray, Managing Director, Australia & New Zealand, Veritas Technologies

4:05-4:30pm AEST
Security from scratch – what would you do if you were starting all over again with your security program?
  • How do you build a security program in 2022?  How has it changed?
  • People Process and Technology – what do you need to incorporate into your program?
  • What does ‘good enough’ look like and how do we measure it?  Risk, regulation, and strategy – making them all fit together.

Andrew Morgan, CISO, La Trobe University

4:30-4:55pm AEST
Keynote Presentation: Reducing Cyberattack Risk During Uncertain Times

With the threat of cyber warfare becoming ever more serious, every organisation needs a “this is not a drill” cyber-first recovery plan. If cyberattackers targeted your organisation, the most likely business-crippling scenario would be a direct attack on Active Directory (AD)—the system that authenticates users and grants access to business-critical applications and services. AD has become a prime target for cybercriminals—implicated in 90% of the incidents Mandiant researchers investigate—because it has systemic vulnerabilities and because it gives attackers the means to unleash devastating malware.

The NotPetya attack that crippled Maersk in 2017 was a harbinger of the chaos to come. In this session, we’ll examine the action plan every organisation needs to execute to protect against a business-disrupting cyber incident.

Sean Deuby, Director of Services, Semperis

4:55-5:40pm AEST
Fireside Chat: How to build your IAM strategy
  • Exploring the most common challenges when implementing your IAM strategy
  • How can teams overcome these challenges?
  • Advice for anyone starting the IAM journey
  • Lessons learned and final thoughts

Moderator:

Mark Priebatsch, Regional Director Australia & New Zealand, Checkmarx

Speakers:

Jo Steward-Rattray, CSO, Silver Chain

Mazino Onibere, Head of Cyber Security, Risk and Compliance, Regis Aged Care

5:40-5:45pm AEST
Closing Remarks
5:45-7:00pm AEST
CISOs Cocktail Reception & Networking 🍾
Continue the conversations in a fun and entertaining way.
6:30-8:30pm AEST
Security Supper – VIP Dinner
Invite only
8:20-8:50am AEST
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
8:50-9:00am AEST
Welcome from Corinium and the Chairperson

Mark Priebatsch, Regional Director Australia & New Zealand, Checkmarx

9:00-9:25am AEST
Opening Keynote Presentation: What makes a good cybersecurity strategy
  • Is the latest & greatest technology the holy grail of protection?
  • How to overcome implementation challenges
  • Strategies to address lack of skills and capabilities
  • Lessons learned from a CISO

Charles Gillman, CISO, Superchoice

9:25-9:50am AEST
International Keynote: Creating your InfoSec Workforce Strategy

During this session, we’ll explore how to ensure your team has the technical and non-technical skills required to ensure success of your cybersecurity strategies. What role does organisational and change management planning play in getting your workforce strategy right? Why and how is strategy and planning the new trend in cybersecurity?

Agnieszka Lecka, Strategy and Planning Senior Manager, Standard Chartered Bank (Poland)

9:50-10:15am AEST
Strategies in addressing cyber risks from an expanding Attack Surface
  • With digitalization of business processes, increasing adoption of cloud services, and distributed workforce in a hybrid work model have all contributed to an expanded attack surface beyond your corporate network - the weakest link breaks
  • Are your Executive leadership and Board of Directors aware of the increasing cyber risks?
  • How would risk management and cybersecurity strategies be any different now? Lessons and sharing on how to translates those strategies into tactical and executable security controls

Wai Kit Cheah, Senior Director, APAC Product Management & Security Practice, Lumen

10:15-10:40am AEST
Fireside chat: Defensive Weapon – Why D&I is Just What You Need to Advance Your Frontier Protection
  • Approaching diversity of thought and capabilities as a key element of success in cybersecurity
  • How different backgrounds and experiences can be an opportunity of developing the talents you need
  • Dealing with toxic cultures in your teams
  • Driving cultural change and strengthening your strategies through your people

Moderator:

Deepa Bradley, Cyber Security Strategy and Programs Specialist

Speakers:

Adam Hallyburton, Security Project Manager, SEEK

Sarah Iannantuono, Security Influencer, APAC Security, SEEK

Hashim Khan, Cybersecurity Projects and Governance Lead, SEEK

10:40-11:05am AEST
The Top Breach Paths You’re Missing in Cloud

Security breaches in the cloud usually don’t exploit a single misconfiguration or vulnerability but rather a toxic combination of multiple issues that in isolation wouldn’t raise a red flag given the tons of alerts security teams already get. In this session, we’ll discuss five common toxic combinations across internet exposure, identities and entitlements, software vulnerabilities, and misconfigurations that when combined represent an attacker's pathway to a breach.

Matt Preswick, Enterprise Solutions Engineer, APJ, Wiz

11:05-11:35am AEST
Morning tea ☕
11:35am-12pm AEST
Keynote of success: “All I really need to know (about Cyber Security), I learned in kindergarten”

Boards rely heavily on the advice and reporting from CISOs for strategic decision making and ensure appropriate governance regarding Cyber Security matters. Effective Board decisions require structures, policies, and relevant procedures initiated and adhered whilst collecting, organising, utilising and securing the reporting data. This sounds complex, but could what all of us have learned in kindergarten be applicable and the lens in which we should look through to simplify how CISOs should be communicated to Board, and to enable directors to take responsibility for the information they receive?

Arnold Wong, National Treasurer, ACS

12pm-12:25pm AEST
How to achieve Customer Identity and Access Management (CIAM) without compromise

Your Customer Identity and Access Management (CIAM) program doesn't have to be burdened with uncomfortable tradeoffs. You can achieve your security objectives AND deliver a low-friction customer experience (CX), extend the platform to suit your organization's needs, deploy it however your organization requires, and achieve a quick ROI. Learn how to achieve CIAM Without Compromise.

Robin Antony, Solutions Architect, WSO2

12:25-1pm AEST
Keynote Panel: You Don’t Know What You Don’t Know! Increasing Awareness for Enhanced Resilience

Remote work and relentless user-oriented attacks is putting cybersecurity professionals under incredible pressure. During this session, we’ll discuss the latest trends and insights into phishing and other cyber threats targeting your users based on survey data, simulated phishing exercises and real-world attacks. Our presenters will also share valuable actionable recommendations for you to take back to your organisation.

Panel moderator:

Ron Gauci, CEO, AIIA


Panellists:

Christie Wilson, Cyber Resilience Manager, UniSuper

Daniela Fernandez, Head of Information Security, PayPal Australia

Jo Steward-Rattray, CSO, Silver Chain

Matt Berry, Senior Pre-Sales Engineer, Abnormal Security

1pm-1:25pm AEST
The Future of Email Security

Three-quarters of Australian CISOs see human error as their organisation’s biggest cyber vulnerability. It only takes one employee to click on a bad email to compromise your organisations entire network. Actors know what the weakest link is and they’ve long since shifted to exploiting the human. What if there was a way to stop rolling the human dice every day?

Learn how organisations can leverage advanced behavioral science and automation for informed and near instantaneous decision making on what is good and what is bad email. As well as removing the increasing burden that is placed on employees as a last line of defence.

Join this session to understand:

  • How behavioural data science from the ad-tech world is being used to baseline normal in order to find what is abnormal
  • New insights and controls over protecting against supply chain attacks
  • Account takeover techniques and measures that can be taken to help protect against them

Matt Berry, Senior Pre-Sales Engineer, Abnormal Security
1:25-2:25pm AEST
Lunch
Breakout Sessions
TRACK A: Interactive Presentations TRACK B: Presentations

 

2:25-2:50pm AEST
Into the Wild: Exploring Today's Top Threats   The Anatomy of a Ransomware attack
Today's elevated threat landscape has seen an increase of 136% in widespread attacks. This new normal demands a multi-faceted, context-aware approach to security. Rapid7’s Ken Mizota, Field CTO, Asia-Pacific & Japan, will explore how combining threat intelligence and vulnerability intelligence allows you to anticipate and prevent attacks in addition to detecting and recovering more quickly.

 

Pete Murray of Veritas, on the back of his presentation yesterday on the results of the CISO survey of Ransomware Readiness, will have a fireside chat with the CEO of a Melbourne based provider of Data Protection as-a-Service about how they have helped many of their clients recover from Ransomware, profiling in particular the high profile case of a global logistics company who got compromised not once but twice, sharing the learnings from real-world Ransomware recovery.

Ken Mizota, Chief Technology Officer, APAC, Rapid7

 

Pete Murray, Managing Director, Australia & New Zealand, Veritas Technologies

David Duncan, CEO, Global Storage

 

2:50-3:15pm AEST
Building a robust and resilient SOC: An experienced SOC insider perspective   Are Information Security Audits evolving with the industry?
Cybersecurity leaders often struggle to convey the business value of their Security Operations Centers to the board which may result in reduced investment, poor collaboration and diminishing support. Hear from Jalpa Bhavsar, an experienced SOC analyst, who has worked at different types of SOC setup. She will share her experiences and lessons learned on choosing the right SOC model, improving and driving efficiency of SOC.    
Jalpa Bhavsar, Senior Security Analyst, Coles Group   Chikonga Maimbo, Manager Information Security, Bank Australia

 

3:15-3:40pm AEST
Strategies to Manage the ‘Often-Unseen’ Third-Party Security Risks   Practical & Holistic Zero Trust: Adopting a Consolidated Security Architecture
  • Exploring common and out-of-sight cyber security risks of third-party management
  • Best practices to manage third party risk
  • How supporting small businesses to improve their cyber security can benefit your organisation
 

This Think Tank is designed for cybersecurity leaders who are currently investing in Zero Trust architecture models or planning to do this in the near future. During this practical, hands-on session, 10-15 executives will share their challenges and explore solutions on:

  • How to develop a roadmap and implementing specific initiatives to your projects
  • Discover effective ways to build a zero trust security framework
  • Identify key components of a zero trust model to protect the current environment

Daniela Fernandez, Head of information Security, PayPal Australia

  Abbas Kudrati, Executive Advisory Board for Cyber Security, Deakin University

 

3:40pm-3:45pm AEST
CISO Melbourne Closing Remarks
3:45pm AEST
End of Event