<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

EVENTS ARE BACK!

CISO SINGAPORE

Join infosec leaders and influencers at CISO Singapore!

21-22 September 2022
Grand Copthorne Waterfront
DOWNLOAD THE AGENDA
EXPLORE SPONSORSHIP
REGISTER

DOWNLOAD THE AGENDA TODAY

Plan each day with our downloadable agenda
DOWNLOAD THE AGENDA

AGENDA

  • Tuesday, 21 September, 2022
  • Wednesday, 22 September, 2022
7:30-8:30am AEST
VIP Breakfast

Invite only

8:20-8:50am AEST
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
08:50-9:00am AEST
Welcome from Corinium and the Chairperson
9:00-9:25am AEST
Opening Keynote: Top Cybersecurity Trends to Watch in 2022 and Beyond

During this session, we’ll explore the most considerable moves in cyber and information security, and how these are impacting strategic business decisions.

  • Where is cybersecurity technological improvement heading towards?
  • What are organisations with a top-notch security system doing to achieve effectiveness?
  • Emerging technologies and business practices that are here to stay – what these long-term trends mean for security
9:25-9:50am AEST
Keynote: How to Gain Company-Wide Support for Your Cybersecurity Strategies
  • What are the biggest challenges when getting buy-in from top management?
  • How to encourage everybody to take ownership of cyber?
  • Why leaders must be committed to continually improve their teams’ skills and knowledge in IT and cybersecurity – and how do to this?

Vijay Narayan, CISO, Environment Protection Authority Victoria

9:50-10:15am AEST
Partner Presentation: Is Security by Design the Answer to Cyber Risk Management?
  • Overcoming the challenges of implementing security by design
  • How to effectively translate threat to risk to the board and the teams
  • Human-issue in risk management – improving culture through intelligence models
  • Eliminating risks by improving your asset x threat x vulnerability model – hype or reality?

Senior representative, Okta

10:15-10:45am AEST
Morning tea ☕
10:45-11:10am AEST
Keynote: Mastering Difficult Conversations – How to Report Risks to the Board
  • Understanding cyber risks in a quantifiable way
  • How to demonstrate the value of risks to the executive management
  • What are the biggest challenges when getting buy-in from top management?
  • Communication effectiveness: putting yourself in the boss’ shoes and delivering the right message

Alex Adams, CISO & Deputy Commissioner, Service Operations, ATO

11:10-11:35am AEST
Partner Presentation: Threat Detection and Incident Response
  • High-level incident management and coordination
  • Technical analysis of the incident
  • Incident scoping to determine who or what was affected
  • Crisis communications to make sure information is released in a coordinated and beneficial manner
  • Legal response to determine any implications and prepare any needed response or action
  • Remediation and mitigation recommendations and actions to ensure a smooth recovery

Senior representative, Snyk

11:35am-12:10pm AEST
Keynote Panel: What CISOs Should Do When Cyber and Privacy Converge?
  • Combining cybersecurity and data protection to comply with increased data privacy regulations
  • How to adopt secure digital identity and mitigate privacy rights risks
  • Embedding the necessary protections into your identity verification systems
  • Implementing architecture systems that reduces overcollection during identity verification

Panel moderator:

Ron Gauci, President, AIIA

12:10-12:35pm AEST
Partner Presentation: Bringing Cross Functional Stakeholders Onboard Your Zero Trust Architecture Journey

During this session, we’ll discuss how ZT impacts your existing and future operating models. We’ll explore the innovation and change management aspects of ZT, which are key for bringing everyone on board. Join us to find out how your strategy can be best suited to deliver value and support organisation to deliver DevSecOps outcomes.

Senior representative, Dataminr

12:35-1:35pm AEST
Lunch
Breakout Sessions
TRACK A: Interactive case studies TRACK B: Group Discussions
1:35-2:00pm AEST
Threat Detection & Response – What Sets Success and Failure Apart?
 
Pros & Cons of Automating the SOC
What Sets Success and Failure Apart?
  • Pen-testing: do’s and don’ts
  • Benchmarking the most effective threat detection and response strategies
  • How to successfully implement detection, response and recovery plans
 

In a world where the pressure to deliver new and innovative ICT capability is only ever growing, and the threat actors are also increasingly sophisticated and pervasive, how can companies ensure they meet these challenges whilst still ensuring cyber resilience? During this session, you’ll hear experiences and lessons learned on Cyber Security Operations Centre (CSOC) automation and different ways of improving and driving efficiency of your CSOC. Our speakers will provide an interesting point of comparison as their CSOC capabilities are vastly different sizes with very different remits, but yet some lessons will prove universal.

Varun Acharya, Head of Cyber Security, Threat Intelligence and Security Operations, Healthscope

 

Samuel Morgan, Director Defence Security Operations Centre, Department of Defence

Nadia Taggart, Director Cyber Security Operations, Parliament House

 

2:00-2:25pm AEST

Cloud Conversations You Must Have With your Teams

 

Continued...Pros & Cons of Automating the SOC

  • Improving resilience and scalability through Cloud
  • Assessing your existing technical footprint and the cloud options to find a matching path to your organisation
  • Adopting and following the guidelines for cloud security based on standards & regulations for specific industry sectors 
 

In a world where the pressure to deliver new and innovative ICT capability is only ever growing, and the threat actors are also increasingly sophisticated and pervasive, how can companies ensure they meet these challenges whilst still ensuring cyber resilience? During this session, you’ll hear experiences and lessons learned on Cyber Security Operations Centre (CSOC) automation and different ways of improving and driving efficiency of your CSOC. Our speakers will provide an interesting point of comparison as their CSOC capabilities are vastly different sizes with very different remits, but yet some lessons will prove universal.

   

Samuel Morgan, Director Defence Security Operations Centre, Department of Defence

Nadia Taggart, Director Cyber Security Operations, Parliament House

 

2:25-2:50pm AEST

Challenges that Make your Vulnerability Management Less Effective

 

Got a Hybrid IT Environment? Learn What IAM Steps to Take

  • Adopting continuous testing, authentication safeguards and adherence to best programming practices
  • Detecting silent attacks and breaches before it’s too late
  • Advance your threat detection strategies and shift from reactive to proactive approach
 
  • How to avoid password fatigue
  • Managing visibility & remote work access
  • Pros and cons of automating provisioning and deprovisioning of SaaS applications

Shane Moffitt, Deputy CISO for Victorian State Government, Cyber Security Branch, Digital Victoria, Department of Premier and Cabinet

 

Senior representative, BigID

 

2:50-3:15pm AEST

Getting Prepared for the Rise in Supply Chain Attacks

 

Continued...Got a Hybrid IT Environment? Learn What IAM Steps to Take

During this presentation, we’ll explore how to build supply chain resilience and where it should sit within cybersecurity. We’ll also share good practices for data protection, data governance, fraud prevention and third-party risks to ensure your supply chain is secure.  
  • How to avoid password fatigue
  • Managing visibility & remote work access
  • Pros and cons of automating provisioning and deprovisioning of SaaS applications

 

 

Senior representative, BigID

 

3:15-3:45pm AEST
Afternoon tea ☕
3:45-3:55pm AEST
State of Ransomware Readiness Survey

Pete Murray, Managing Director, Australia & New Zealand, Veritas Technologies

3:55-4:20pm AEST
Security from scratch – what would you do if you were starting all over again with your security program?
  • How do you build a security program in 2022?  How has it changed?
  • People Process and Technology – what do you need to incorporate into your program?
  • What does ‘good enough’ look like and how do we measure it?  Risk, regulation, and strategy – making them all fit together.

Andrew Morgan, CISO, La Trobe University

4:20-4:45pm AEST
Keynote of Success: Learning from a CISO’s Lessons

Hear real-life experiences and lessons learned on tackling the biggest security challenges, building organisational cyber resilience, creating culture and improving awareness, and ensuring network protection and OT integrity.

Jo Steward-Rattray, CSO, Silver Chain

4:45-4:50pm AEST
Closing Remarks
4:50-6:00pm AEST
CISOs Cocktail Reception & Networking 🍾
Continue the conversations in a fun and entertaining way.
7:00-9:00pm AEST
Security Supper – VIP Dinner
Invite only
7:30-8:30am AEST
VIP Breakfast

Invite only

8:20-8:50am AEST
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
8:50-9:00am AEST
Welcome from Corinium and the Chairperson
9:00-9:25am AEST
International Opening Keynote: Creating your InfoSec Workforce Strategy

During this session, we’ll explore how to ensure your team has the technical and non-technical skills required to ensure success of your cybersecurity strategies. What role does organisational and change management planning play in getting your workforce strategy right? Why and how is strategy and planning the new trend in cybersecurity?

9:25-9:50am AEST
Defensive Weapon – Why D&I is Just What You Need to Advance Your Frontier Protection
  • Approaching diversity of thought and capabilities as a key element of success in cybersecurity
  • How different backgrounds and experiences can be an opportunity of developing the talents you need
  • Dealing with toxic cultures in your teams
  • Driving cultural change and strengthening your strategies through your people

Deepa Bradley, Head of Cyber Security Strategy and Programs, SEEK

9:50-10:15am AEST
Partner presentation: Simplifying cyber insurance complexities

The exponential growth of cyber-attacks creates vulnerabilities that the latest and greatest technologies may not be good enough to fix. During this session, we’re discussing the pros and cons of cyber insurance, clarifying misconceptions, and exploring if that might be what will save your organisation when everything else fails.

  • What is cyber insurance and what is it for?
  • What you need to know about insurance underwriting for your business
  • What are the key considerations for organisations when thinking about cyber insurance?
  • Adopting cyber insurance as part of your risk management strategy
  • Strategies to be specific about your company’s needs to get premiums down
10:15-10:45am AEST
Morning tea ☕
10:45-11:10am AEST
Keynote Presentation: What Makes a Good Cybersecurity Strategy
  • Is the latest & greatest technology the Holy Grail of protection?
  • How to overcome implementation challenges
  • Strategies to address lack of skills and capabilities
  • Lessons learned from a CISO

Charles Gillman, CISO, Superchoice

11:10-11:35am AEST
Partner Presentation: But REALLY, How Effective is Your Cybersecurity Program?
  • Key milestones to measure the success of your cybersecurity strategies
  • Why leaders must be committed to continually improve their teams’ skills and knowledge in IT and cybersecurity – and how do to this?
  • Exploring business cases of companies that are successfully achieving this

Senior representative, WSO2

11:35am-12:10pm AEST
Keynote Panel: You Don’t Know What You Don’t Know! Increasing Awareness for Enhanced Resilience

Remote work and relentless user-oriented attacks is putting cybersecurity professionals under incredible pressure. During this session, we’ll discuss the latest trends and insights into phishing and other cyber threats targeting your users based on survey data, simulated phishing exercises and real-world attacks. Our presenters will also share valuable actionable recommendations for you to take back to your organisation.

Panel moderator:

Kostas Kyrifidis, President, VSI


Panellists:

Daisy Wong, Cyber Culture and Engagement Lead, Department of Premier and Cabinet (Vic)

Jacqui Loustau, Founder, AWSN

Christie Wilson, Cyber Resilience Manager, UniSuper

12:10-12:35pm AEST
Partner Presentation: Secrets to Implement an Effective Ransomware Protection
  • An overview of the growth of ransomware attacks and how organisations are being impacted
  • Understanding the risks and potential costs of attacks
  • How organisations can prepare for ransomware protection
  • Exploring successful cases of improving organisations’ ransomware protection posture
12:35-1:35pm AEST
Lunch
Breakout Sessions
TRACK A: Interactive case studies TRACK B: Group discussions

 

1:35-2:00pm AEST
Choosing and building the right type of SOC for your business   Network & Operations Security

In face of increasing threats and attacks, it’s extremely challenging for teams to monitor and respond to all alerts. A great way to have better response is by moving human thinking into code and automate it, however, this move introduces a number of challenges. During this session, you’ll be able to share experiences and lessons learned on improving and driving efficiency of your SOC.

 

  • Improving your network and OT security
  • What you need to consider in your security planning
  • Improving your visibility of vulnerabilities in a complex, converged environment, and enhancing incident detection and response

Jalpa Bhavsar, Senior Security Analyst, Coles Group

 

 

 

2:00-2:25pm AEST
End Point & Mobile Security   Continued...Misunderstanding around security systems
  • What you need to consider in your mobile security planning
  • Improving your visibility of vulnerabilities in a complex, converged environment
  • Enhancing your EDR for increased security
 
  • Darkweb
  • Breaches crypto
  • People don’t understand the security systems well enough
  • What do they need to know at a deeper level?
     

 

2:25-2:50pm AEST
Improving Your DevSecOps and Reducing Vulnerabilities   Continued...Misunderstanding around security systems
  • Adopting a modern security model that’s built-in to the product, not at final stages
  • Improving transparency and collaboration during development
  • Strategies to reduce DevOps supply chain risk
 
  • Darkweb
  • Breaches crypto
  • People don’t understand the security systems well enough
  • What do they need to know at a deeper level?
Chikonga Maimbo, Manager Information Security, Bank Australia    

 

2:50-3:15pm AEST
Getting the Fundamentals of Application Security Right   Continued...Misunderstanding around security systems
  • Key considerations when planning for short and long term
  • Introducing a secure software development life cycle
  • Leveraging your existing processes and capabilities
  • Maturing your AppSec practices
 
  • Darkweb
  • Breaches crypto
  • People don’t understand the security systems well enough
  • What do they need to know at a deeper level?
     

 

3:15pm-3:45pm AEST
Afternoon Tea ☕
3:45-4:10pm AEST
Keynote: InfoSec & Tech Risk Metrics
  • What metrics would you present to the board?
  • What are we actually measuring?
  • What happens when regulators need to be involved?
  • What would regulators say/expect?

John Ellis, CISO, BUPA

4:10-4:35pm AEST
Wrap-up Session: Quantum Computing: A Cybersecurity Problem or Solution?
  • An overview on how Quantum Computing is evolving
  • What are the potential risks and challenges of this innovation?
  • How can Quantum cryptography and data encryption be employed for improved security?
  • Where is Quantum Computing heading towards? Should you be investing in it and preparing for its take-off?
4:35-4:40pm AEST
CISO Melbourne Closing Remarks
4:40pm AEST
End of Event