LOADING

Type to search

The Cyber-Resilience & Security Virtual Summit 2020 is an information-packed summit that showcases practical case studies from the front-line organisation that’re building their cyber-resilience capability while ensuring information assets are protected in cyber-space.

Event Overview

The Australian Government has earmarked $1.67 billion over the next 10 years to build Australia’s cyber-resilience while protecting critical infrastructure and information assets. This investment spotlights concerns organisations are vulnerable to attack by state-sponsored or malicious actors during the Covid-19 pandemic.

The high-profile cyber-attacks have impacted critical infrastructure and information assets across the Government, Defence, Financial Institutions, Roads, Transport, Energy Utilities, or Higher Education sectors.

The Cyber-Resilience & Security Summit is designed to help organisations strengthen their cyber-resilience and security capability – with a focus on practical case studies drawn from the public and private sectors and higher education.

The summit goes behind the news with independent insights from subject matter experts about the potential of cyber-threats, and why organisations are investing in cyber-security.

Key Takeaways

Strengthen your organisation’s cyber-resilience & security posture

Protect your enterprise in cyber-space & a hyper-connected world

Make cyber-resilience integral to ICT planning & implementation

Tackle cyber-attacks on critical infrastructure during Covid-19

Invest in trusted & fully integrated technology in cyber-space

Protect your organisation against state-sponsored or malicious attacks by malicious actors

Hear from 20 + cyber resilience & security leaders including:

Gary Hayslip

CISSP, Chief Information Security Officer
SoftBank Investment, USA

Daniel Hooper

Chief Information Security Officer
Varo Money, USA

Samantha Gavel

Privacy Commissioner
Information and Privacy Commission NSW

Megan Motto

Chief Executive Officer
Governance Institute of Australia

Jo Stewart-Rattray

Chief Security Officer
Silver Chain

Angela Donohoe

Chief Information Officer
BPay

Lani Rafiti

Chief Executive Officer
IoT Sec Australia

Asaf Ahmad

Chief Information Security Officer
ICT Governance Security & Risk,
Fire & Rescue NSW

Hai Tran​

Chief Executive Officer
Australian Cyber Collaboration Centre

Mitra Minai

Chief Information Security Officer (CISO)
Healthscope

Chirag Joshi

CISA, CISM, CRISC, Business Information Security Officer
AMP​

Nish Chandran

Chief Information Officer
MLC Life
Insurance

Dr Ian
Martinus

DirectorWA
AustCyber
Innovation Hub

Damien
Manuel

Director of Cyber Security - Research and Innovation Centre
Deakin University

Ian
Cameron

Executive Manager
Cybersecurity Governance & Strategy, IAG

Kate Carruthers

CISM, Chief Data & Insights Officer
UNSW

Bilal
Ahmed

Cloud Solutions and Security Architect
National Australia Bank

Emeritus Prof William Caelli

AO
Griffith University

Mourad
Khali

Sr. Cyber Security Operations Lead, Critical Infrastructure
Collins Aerospace

David
Tregoning

System Architect:
Identity Evangelist
Nine Entertainment

Dr. Mamoun Alazab

Associate Professor, Cybersecurity
Charles Darwin University​

Simon
Carabetta

Cyber-awareness Project & Engagement Lead
WA AustCyber Innovation Hub

Vijay Varadharajan

Global Innovation Chair & Professor in Cyber Security
University of Newcastle

Bob Dickson

Chief Technology Officer
OneLogin

Loris Minassian

Founder and CEO
CyberStash

Agenda

9:00 Opening remarks from the Chair

Asaf Ahmad, Chief Information Security Officer, ICT Governance Security & Risk, Fire & Rescue NSW

DRIVERS FOR CYBERSECURITY: GOVERNMENT & INDUSTRY PERSPECTIVES

9:10 [Australian Government Keynote] Protecting critical infrastructure and information assets across domestic and international jurisdictions

  • The Australian Signals Directorate (ASD) is a vital member of Australia’s national security community, working across the full spectrum of operations required of contemporary signals intelligence and security agencies: intelligence, cybersecurity, and offensive operations in support of the Australian Government and Australian Defence Forces (ADF).

Senior Executive, Australian Signals Directorate

9:55 [Case Study] Strengthening strategies to measure and manage cyber risk

  • Reviewing your internal controls and digital profiles
  • Identifying internal vulnerabilities and external threats
  • Building a proactive cyber risk plan with regular monitoring

Asaf Ahmad, Chief Information Security Officer, ICT Governance Security & Risk, Fire & Rescue NSW

10:40 Coffee break

11:10 [Interactive Panel Discussion] Planning for cyber-attacks in a sophisticated and complex environment

  • Why CIOs & CISOs are pivotal to the cyber-threat planning conversation
  • What it takes to beat cyber-attackers at their own game
  • Strategies that work in a fast-changing threat landscape

Moderator

Dr Ian Martinus, Director, WA AustCyber Innovation Hub

Panellists

Hai Tran, Chief Executive Officer, Australian Cyber Collaboration Centre

[International] Gary Hayslip, CISSP, Chief Information Security Officer, SoftBank Investment, California, USA

Angela Donohoe, Chief Information Officer, Bpay

Jo Stewart-Rattray, Chief Security Officer, Silver Chain

Nishanth Chandran, Chief Information Officer, MLC Life Insurance

►Delegates will participate online in these panels, with questions relayed through the moderator. As a virtual format, the focus is on interaction between panel members & delegates.

12:10 [Case Study] Investing in trusted technology to protect information assets

  • Providing a seamless migration for your ICT upgrades
  • Ensuring your information assets and critical infrastructure is fully protected
  • Securing connectivity with partners and service providers

Angela Donohoe, Chief Information Officer, Bpay

12:55 Lunch break

1:55 [Case Study] Securing your data assets as the security landscape changes

  • Adapting to data security issues during Covid-19
  • Investing in cyber-preparedness in a remote setting – people, process, and technology
  • Assessing strategies that protect data assets

Kate Carruthers, CISM, Chief Data & Insights Officer, UNSW

2:40 [Case Study] Protecting critical infrastructure from cyber threats

  • Understanding new threats and how they impact your organisation
  • Why the threat landscape is constantly changing and why prepare
  • What is needed to be proactive and pre-empt emerging intrusions

Mourad Khalil, Sr. Cyber Security Operations Lead, Critical Infrastructure, Collins Aerospace

3:25 Coffee break

3:35  Forensic-State Post-Breach Compromise Assessments
 
• Forensically Establish Trust in your IT Environment for the Board and Executives
• Ascertain whether any Systems are Currently Compromised within your Business Environment
• Control Dwell-Time to 1 Day by Detecting and Responding to Sophisticated Attacks that are Designed to Evade Defensive Controls
 
Loris Minassian, Founder and CEO, CyberStash
 

4:00 [Interactive Panel Discussion] Streamlining the information management, governance, and security – who is in charge here?

  • What do we know about our information?
  • Where did this information come from?
  • Why are security, privacy, and governance critical?

Moderator

Asaf Ahmad, Chief Information Security Officer, ICT Governance Security & Risk, Fire & Rescue NSW

Panellists

Ian Cameron, Executive Manager, Cybersecurity Governance & Strategy, IAG

Samantha Gavel, Privacy Commissioner, Information and Privacy Commission NSW

Emeritus Professor William J (Bill) Caelli, AO, Adjunct Professor, Griffith University & Honorary Fellow Cyber Security, TAFE Queensland

► Delegates will participate online in these panels, with questions relayed through the moderator. As a virtual format, the focus is on interaction between panel members & delegates.

4:55 [Forecast] Security controls for computer systems, networks & critical infrastructure: are we there yet?

  • Tackling the risks associated with the rapid growth of multi-access, resource-sharing computer systems, networks, and critical infrastructure
  • Securing the ‘primordial network ooze’ from which the Internet evolved
  • Assessing security problems in a hyper-connected but increasingly insecure world

Emeritus Professor William J (Bill) Caelli, AO, Adjunct Professor, Griffith University & Honorary Fellow Cyber Security, TAFE Queensland

5:15 Closing remarks from Chair

5:20 Close of Day one

9:00 Opening remarks from the Chair

Lani Rafiti, Chief Executive Officer, IoT Sec Australia

9:10 [International Case Study] Tackling cyber-security for online banking

  • How banks are dealing with the rise in cyber-attacks
  • Why this sector remains vulnerable in cyber-space
  • Why cyber-security is a growing priority in a digital environment

Daniel Hooper, Chief Information Security Officer, Varo Money, California

9:55 [Case Study] Protecting information assets in the cloud

  • Managing enterprise data security in the cloud
  • Ensuring your organisation adapts to cross-border data storage arrangements
  • Clarifying cloud sovereignty parameters with cloud service providers

Bilal Ahmed, Cloud Solutions and Security Architect, National Australia Bank

10:40 Coffee break

11:10 [Interactive Panel Discussion] Improving your organisation’s security and governance posture

  • Maintaining the right systems and security levels across the enterprise
  • Managing the design phase to reduce flaws with the auditing and controls
  • Building customer trust by keeping information safe and secure

Moderator

Megan Motto, Chief Executive Officer, Governance Institute of Australia

Panellists

Mitra Minai, Chief Information Security Officer (CISO), Healthscope

Daniel Hooper, Chief Information Security Officer, Varo Money, California

Bilal Ahmed, Cloud Solutions and Security Architect, National Australia Bank

Dr Mamoun Alazab, Associate Professor, Cybersecurity, Charles Darwin University

► Delegates will participate online in these panels, with questions relayed through the moderator. As a virtual format, the focus is on interaction between panel members & delegates.

12:10 Lunch break

1:10 [Case Study] Raising the industry’s cyber-security awareness – milestones and challenges

  • Assessing the economic impact of cyber attacks
  • Protecting your critical infrastructure and information assets in a fast-changing environment
  • Strengthening collaboration across the public-private sectors & education

Dr Ian Martinus, Director, WA AustCyber Innovation Hub

1:55 [Case Study] Reducing cyber risks through influencing user behaviour and effective awareness programs

  • Importance of human factor to cybersecurity and why most cyber awareness efforts fail
  • Tailoring security awareness programs to address cyber risks and business priorities
  • Strategies to influence behaviour and create a cyber-safe culture within large, complex organisations

Chirag D Joshi, CISA, CISM, CRISC, Business Information Security Officer & Best-selling Author: 7 Rules to Influence Behaviour & Win at Cyber-security Awareness

2:40 Coffee break

3:00 [Interactive Panel Discussion] Identity management during Covid-19

  • How to protect end-user identity when working remotely
  • Using the right tools and platforms to manage identity and access to corporate data
  • Streamlining remote access arrangements – what works and why

Moderator

Bob Dickson, Chief Technology Officer, OneLogin

Panellists

David Tregoning, System Architect: Identity Specialist, Nine Entertainment

Mourad Khalil, Sr. Cyber Security Operations Lead, Critical Infrastructure, Collins Aerospace

Damien Manuel, CISSP, CISM, CISA, CGEIT, CRISC, MBA, MAISA, GAICD, Director of Cyber Security – Research and Innovation Centre, Deakin University

Vijay Varadharajan, Global Innovation Chair & Professor in Cyber Security, University of Newcastle

► Delegates will participate online in these panels, with questions relayed through the moderator. As a virtual format, the focus is on interaction between panel members & delegates.

4:00 Closing remarks from Chair & Close of Conference

Separately bookable – Step-by-step guide to cyber-security planning and management

 

Workshop A

9am – 12pm

Cybercrime is on the rise, with Australians reporting cybersecurity incidents every 10 minutes, and costing businesses $29 billion each year. This workshop offers a practical guide to understanding the cyber landscape – with key learnings focusing on:

Introduction to cyber-security strategy

  • Why cybersecurity is important
  • Where governance and risk management play out in this space
  • How the cyber-security framework is evolving

Managing risk

  • What the risk management strategies entail
  • Analysis and risk management frameworks

Preventing cyber attacks

  • Dealing with risk
  • Cyber-security in the cloud
  • Stages of a cyber attack
  • Protecting your business
  • Prevention strategies and techniques

Simon Carabetta, Project and Engagement Coordinator, WA AustCyber Innovation Hub

 

12pm-1pm LUNCH BREAK

 

Workshop B 

1pm – 4pm 

Identifying and managing vulnerabilities in your networks and systems 

This workshop offers a practical guide to managing intrusions into critical infrastructure. This class is tailored for professionals with a step-by-step guide to: 

  • Understanding hackers’ tactics and strategies in cyber-space 
  • Locating vulnerabilities and intrusions within computer systems and networks 
  • Building your incident-handling plan with the right tracking tools 
  • Assessing the more insidious attacks involving malicious actors 
  • Responding to incidents with an inside view of how attackers undermine systems 
  • Building your detection and response capabilities 
  • concept of network vulnerability with reference to a computer and network security. 
  • Clarifying the security and firewall protocols 
  • Building a strong cyber security posture for enterprise systems 

Lani Rafiti, Chief Executive Officer, IoT Sec Australia

 

End of Workshop

Who Should Attend

CEOs, CTOs, CIOs, CISOs, CDOs, MDs, GMs, Directors and Managers of:


Cyber
Data Security
Data Analyst/Scientist
Data Architect
IT
Digital
Business Intelligence
Risk
Governance

Save

Early bird discount

Book now and save $300

Team discount

Register 3-4 delegates and receive an additional 10% DISCOUNT off the standard price
Register 5-7 delegates and receive an additional 15% DISCOUNT off the standard price
Register 8 or more delegates and receive an additional 20% DISCOUNT off the standard price

Countdown
To The Event.

Days
Hours
Minutes
Seconds

Sponsors