Invite only
During this session, we’ll explore the most considerable moves in cyber and information security, and how these are impacting strategic business decisions.
Vijay Narayan, CISO, Environment Protection Authority Victoria
Senior representative, Okta
Alex Adams, CISO & Deputy Commissioner, Service Operations, ATO
Senior representative, Snyk
Panel moderator:
Ron Gauci, President, AIIA
During this session, we’ll discuss how ZT impacts your existing and future operating models. We’ll explore the innovation and change management aspects of ZT, which are key for bringing everyone on board. Join us to find out how your strategy can be best suited to deliver value and support organisation to deliver DevSecOps outcomes.
Senior representative, Dataminr
TRACK A: Interactive case studies | TRACK B: Group Discussions |
Threat Detection & Response – What Sets Success and Failure Apart?
|
|
Pros & Cons of Automating the SOC
|
What Sets Success and Failure Apart?
|
In a world where the pressure to deliver new and innovative ICT capability is only ever growing, and the threat actors are also increasingly sophisticated and pervasive, how can companies ensure they meet these challenges whilst still ensuring cyber resilience? During this session, you’ll hear experiences and lessons learned on Cyber Security Operations Centre (CSOC) automation and different ways of improving and driving efficiency of your CSOC. Our speakers will provide an interesting point of comparison as their CSOC capabilities are vastly different sizes with very different remits, but yet some lessons will prove universal. |
|
Varun Acharya, Head of Cyber Security, Threat Intelligence and Security Operations, Healthscope |
|
Samuel Morgan, Director Defence Security Operations Centre, Department of Defence Nadia Taggart, Director Cyber Security Operations, Parliament House |
Cloud Conversations You Must Have With your Teams |
|
Continued...Pros & Cons of Automating the SOC |
|
In a world where the pressure to deliver new and innovative ICT capability is only ever growing, and the threat actors are also increasingly sophisticated and pervasive, how can companies ensure they meet these challenges whilst still ensuring cyber resilience? During this session, you’ll hear experiences and lessons learned on Cyber Security Operations Centre (CSOC) automation and different ways of improving and driving efficiency of your CSOC. Our speakers will provide an interesting point of comparison as their CSOC capabilities are vastly different sizes with very different remits, but yet some lessons will prove universal. |
|
Samuel Morgan, Director Defence Security Operations Centre, Department of Defence Nadia Taggart, Director Cyber Security Operations, Parliament House |
Challenges that Make your Vulnerability Management Less Effective |
|
Got a Hybrid IT Environment? Learn What IAM Steps to Take |
|
|
|
Shane Moffitt, Deputy CISO for Victorian State Government, Cyber Security Branch, Digital Victoria, Department of Premier and Cabinet |
|
Senior representative, BigID |
Getting Prepared for the Rise in Supply Chain Attacks |
|
Continued...Got a Hybrid IT Environment? Learn What IAM Steps to Take |
During this presentation, we’ll explore how to build supply chain resilience and where it should sit within cybersecurity. We’ll also share good practices for data protection, data governance, fraud prevention and third-party risks to ensure your supply chain is secure. |
|
|
|
|
Senior representative, BigID |
Pete Murray, Managing Director, Australia & New Zealand, Veritas Technologies
Andrew Morgan, CISO, La Trobe University
Hear real-life experiences and lessons learned on tackling the biggest security challenges, building organisational cyber resilience, creating culture and improving awareness, and ensuring network protection and OT integrity.
Jo Steward-Rattray, CSO, Silver Chain
Invite only
During this session, we’ll explore how to ensure your team has the technical and non-technical skills required to ensure success of your cybersecurity strategies. What role does organisational and change management planning play in getting your workforce strategy right? Why and how is strategy and planning the new trend in cybersecurity?
Deepa Bradley, Head of Cyber Security Strategy and Programs, SEEK
The exponential growth of cyber-attacks creates vulnerabilities that the latest and greatest technologies may not be good enough to fix. During this session, we’re discussing the pros and cons of cyber insurance, clarifying misconceptions, and exploring if that might be what will save your organisation when everything else fails.
Charles Gillman, CISO, Superchoice
Senior representative, WSO2
Remote work and relentless user-oriented attacks is putting cybersecurity professionals under incredible pressure. During this session, we’ll discuss the latest trends and insights into phishing and other cyber threats targeting your users based on survey data, simulated phishing exercises and real-world attacks. Our presenters will also share valuable actionable recommendations for you to take back to your organisation.
Panel moderator:
Kostas Kyrifidis, President, VSI
Panellists:
Daisy Wong, Cyber Culture and Engagement Lead, Department of Premier and Cabinet (Vic)
Jacqui Loustau, Founder, AWSN
Christie Wilson, Cyber Resilience Manager, UniSuper
TRACK A: Interactive case studies | TRACK B: Group discussions |
Choosing and building the right type of SOC for your business | Network & Operations Security | |
In face of increasing threats and attacks, it’s extremely challenging for teams to monitor and respond to all alerts. A great way to have better response is by moving human thinking into code and automate it, however, this move introduces a number of challenges. During this session, you’ll be able to share experiences and lessons learned on improving and driving efficiency of your SOC. |
|
|
Jalpa Bhavsar, Senior Security Analyst, Coles Group |
|
End Point & Mobile Security | Continued...Misunderstanding around security systems | |
|
|
|
Improving Your DevSecOps and Reducing Vulnerabilities | Continued...Misunderstanding around security systems | |
|
|
|
Chikonga Maimbo, Manager Information Security, Bank Australia |
Getting the Fundamentals of Application Security Right | Continued...Misunderstanding around security systems | |
|
|
|
John Ellis, CISO, BUPA