LOADING

Type to search

Protecting your critical infrastructure & information assets during Covid-19

24-26 November 2020

Event Overview

The Australian Government has earmarked $1.67 billion over the next 10 years to build Australia’s cyber-resilience while protecting critical infrastructure and information assets. This investment spotlights concerns organisations are vulnerable to attack by state-sponsored or malicious actors during the Covid-19 pandemic.

The high-profile cyber-attacks have impacted critical infrastructure and information assets across the Government, Defence, Financial Institutions, Roads, Transport, Energy Utilities, or Higher Education sectors.

The Cyber-Resilience & Security Summit is designed to help organisations strengthen their cyber-resilience and security capability – with a focus on practical case studies drawn from the public and private sectors and higher education.

The summit goes behind the news with independent insights from subject matter experts about the potential of cyber-threats, and why organisations are investing in cyber-security.

Key Takeaways

Strengthen your organisation’s cyber-resilience & security posture

Protect your enterprise in cyber-space & a hyper-connected world

Make cyber-resilience integral to ICT planning & implementation

Tackle cyber-attacks on critical infrastructure during Covid-19

Invest in trusted & fully integrated technology in cyber-space

Protect your organisation against state-sponsored or malicious attacks by malicious actors

Hear from 20 + cyber resilience & security leaders including:

Mike Pezzullo

AO, Secretary
Department of Home Affairs, (Australian Government)

Daniel Hooper

Chief Information Security Officer
Varo Money, USA

Jo Stewart-Rattray

Chief Security Officer
Silver Chain

Leon Cox


General Manager, Membership
Governance Institute of Australia

Angela
Donohoe

Chief Information Officer
BPay

Samantha
Gavel

Privacy Commissioner
Information and Privacy Commission NSW

Lani
Rafiti

Chief Executive Officer
IoT Sec Australia

Asaf
Ahmad

Chief Information Security Officer
ICT Governance Security & Risk,
Fire & Rescue NSW

Hai
Tran

Chief Executive Officer
Australian Cyber Collaboration Centre

Chirag
D Joshi

CISA, CISM, CRISC, Business Information Security Officer
AMP​

Dr Ian Martinus

DirectorWA
AustCyber
Innovation Hub

Damien
Manuel

Director of Cyber Security - Research and Innovation Centre
Deakin University

Ian
Cameron

Executive Manager
Cybersecurity Governance & Strategy, IAG

Bilal
Ahmed

Cloud Solutions and Security Architect
National Australia Bank

Emeritus Prof William Caelli

AO
Griffith University

David
Tregoning

System Architect:
Identity Evangelist
Nine

Dr. Mamoun Alazab

Associate Professor, Cybersecurity
Charles Darwin University​

Simon
Carabetta

Cyber-awareness Project & Engagement Lead
WA AustCyber Innovation Hub

Vijay Varadharajan

Global Innovation Chair & Professor in Cyber Security
University of Newcastle

Bob Dickinson

Chief Technology Officer
OneLogin

Loris Minassian

Founder and CEO
CyberStash

Kate Carruthers

CISM, Chief Data & Insights Officer
UNSW

Robinson Roe

Managing Director APJ | CIPP/E CIPM
OneTrust (Asia Pacific & Japan)

Chris Goldsmith

Senior Sales Engineer
Sophos

Mitra
Minai

Chief Information Security Officer (CISO)
Healthscope

Nathan
Morelli

Manager, Cyber Security
SA Power

Syd
Griffith

Former CTO
NSW Police

Simon Carabetta

Project and Engagement Coordinator
WA AustCyber Innovation Hub

Agenda

8:30 Registration Opens

9:00 Opening remarks from the Chair

Asaf Ahmad, Chief Information Security Officer, ICT Governance Security & Risk, Fire & Rescue NSW

DRIVERS FOR CYBERSECURITY: GOVERNMENT & INDUSTRY PERSPECTIVES

9:10 [Australian Government Keynote] Cyber-resilience reforms

  • Being recognized as the superhero of your organization
  • Never underestimating your skills
  • Communicating your value

Mike Pezzullo, AO, Secretary, Department of Home Affairs (Australian Government)

9:40 [Case Study] Strengthening strategies to measure and manage cyber risk

  • Reviewing your internal controls and digital profiles
  • Identifying internal vulnerabilities and external threats
  • Building a proactive cyber risk plan with regular monitoring

Asaf Ahmad, Chief Information Security Officer, ICT Governance Security & Risk, Fire & Rescue NSW

10:10 To Build Customer Trust – we need to be trustworthy

  • How well do we protect the Personal Data we collect?
  • Can we keep up with new technologies and increasing regulations?
  • Is our governance in silos: Security, Privacy, 3rdParty Risk, GRC?

Robinson Roe, Managing Director, OneTrust (Asia Pacific & Japan)

10:40 Coffee break

11:10 [Interactive Panel Discussion] Planning for cyber-attacks in a sophisticated and complex environment

  • Why CIOs & CISOs are pivotal to the cyber-threat planning conversation
  • What it takes to beat cyber-attackers at their own game
  • Strategies that work in a fast-changing threat landscape

Moderator

Dr Ian Martinus, Director, WA AustCyber Innovation Hub

Panellists

Raghu Gandhy, Head of Infrastructure and Cyber Security, Veolia Australia and New Zealand

Hai Tran, Chief Executive Officer, Australian Cyber Collaboration Centre

Angela Donohoe, Chief Information Officer, Bpay

Jo Stewart-Rattray, Chief Security Officer, Silver Chain

Syd Griffith PSM,Former CTO, NSW Police

►Delegates will participate online in these panels, with questions relayed through the moderator. As a virtual format, the focus is on interaction between panel members & delegates.

11:50 [Case Study] Investing in trusted technology to protect information assets

  • Providing a seamless migration for your ICT upgrades
  • Ensuring your information assets and critical infrastructure is fully protected
  • Securing connectivity with partners and service providers

Angela Donohoe, Chief Information Officer, Bpay

12:20 Lunch break

1:20 [Case Study] Securing your data assets as the security landscape changes

  • Adapting to data security issues during Covid-19
  • Investing in cyber-preparedness in a remote setting – people, process, and technology
  • Assessing strategies that protect data assets

Kate Carruthers, CISM, Chief Data & Insights Officer, UNSW

1:50 [Case Study] Reducing cyber risks through influencing user behaviour and effective awareness programs

  • Importance of human factor to cybersecurity and why most cyber awareness efforts fail
  • Tailoring security awareness programs to address cyber risks and business priorities
  • Strategies to influence behaviour and create a cyber-safe culture within large, complex organisations

Chirag D Joshi, CISA, CISM, CRISC, Business Information Security Officer & Best-selling Author: 7 Rules to Influence Behaviour & Win at Cyber-security Awareness

2:20 Coffee break

2:50  Forensic-State Post-Breach Compromise Assessments
 
• Forensically Establish Trust in your IT Environment for the Board and Executives
• Ascertain whether any Systems are Currently Compromised within your Business Environment
• Control Dwell-Time to 1 Day by Detecting and Responding to Sophisticated Attacks that are Designed to Evade Defensive Controls
 
Loris Minassian, Founder and CEO, CyberStash
 

3:20 [Interactive Panel Discussion] Streamlining the information management, governance, and security – who is in charge here?

  • What do we know about our information?
  • Where did this information come from?
  • Why is security, privacy, and governance critical?

Moderator

Asaf Ahmad, Chief Information Security Officer, ICT Governance Security & Risk, Fire & Rescue NSW

Panellists

Ian Cameron, Executive Manager, Cybersecurity Governance & Strategy, IAG

Samantha Gavel, Privacy Commissioner, Information and Privacy Commission NSW

Emeritus Professor William J (Bill) Caelli, AO, Adjunct Professor, Griffith University & Honorary Fellow Cyber Security, TAFE Queensland

► Delegates will participate online in these panels, with questions relayed through the moderator. As a virtual format, the focus is on interaction between panel members & delegates.

3:50 [Forecast] Security controls for computer systems, networks & critical infrastructure: are we there yet?

  • Tackling the risks associated with the rapid growth of multi-access, resource-sharing computer systems, networks, and critical infrastructure
  • Securing the ‘primordial network ooze’ from which the Internet evolved
  • Assessing security problems in a hyper-connected but increasingly insecure world

Emeritus Professor William J (Bill) Caelli, AO, Adjunct Professor, Griffith University & Honorary Fellow Cyber Security, TAFE Queensland

4:20 Closing remarks from Chair

4:30 Close of Day one

8:30 Registration opens

9:00 Opening remarks from the Chair

Lani Rafiti, Chief Executive Officer, IoT Sec Australia

9:10 [International Case Study] Tackling cyber-security for online banking

  • How banks are dealing with the rise in cyber-attacks
  • Why this sector remains vulnerable in cyber-space
  • Why cyber-security is a growing priority in a digital environment

Daniel Hooper, Chief Information Security Officer, Varo Money, California

9:40 [Case Study] Protecting information assets in the cloud

  • Managing enterprise data security in the cloud
  • Ensuring your organisation adapts to cross-border data storage arrangements
  • Clarifying cloud sovereignty parameters with cloud service providers

Bilal Ahmed, Cloud Solutions and Security Architect, National Australia Bank

10:10 Protecting your sensitive data and securing critical IT infrastructure

  • Coordinating defense against advanced attacks
  • Identifying and thwarting the attacks
  • Strengthening your incidence response and reporting
  • Protecting data on multiple devices

Chris Goldsmith, Senior Sales Engineer, Sophos 

10:40 Coffee break

11:10 [Interactive Panel Discussion] Improving your organisation’s security and governance posture

  • Maintaining the right systems and security levels across the enterprise
  • Managing the design phase to reduce flaws with the auditing and controls
  • Building customer trust by keeping information safe and secure

Moderator

Leon Cox, General Manager, Membership, Governance Institute of Australia

Panelists

Robinson Roe, Managing Director APJ | CIPP/E CIPM, OneTrust

Mitra Minai, Chief Information Security Officer (CISO), Healthscope

Daniel Hooper, Chief Information Security Officer, Varo Money, California

Bilal Ahmed, Cloud Solutions and Security Architect, National Australia Bank

Dr Mamoun Alazab, Associate Professor, Cybersecurity, Charles Darwin University

Nathan Morelli, Manager, Cyber Security, SA Power

► Delegates will participate online in these panels, with questions relayed through the moderator. As a virtual format, the focus is on interaction between panel members & delegates.

12:00pm Lunch break

1:00pm [Case Study] Raising the industry’s cyber-security awareness – milestones and challenges

  • Assessing the economic impact of cyber attacks
  • Protecting your critical infrastructure and information assets in a fast-changing environment
  • Strengthening collaboration across the public-private sectors & education

Dr Ian Martinus, Director WA AustCyber Innovation Hub

1:30pm Strategies to identify and manage vulnerabilities across networks and systems

  • Managing your network vulnerabilities
  • Clarifying the security protocols, firewall, and security management
  • Tackling the vulnerability scanning and assessment processes

Lani Rafiti, Chief Executive Officer, IoT Sec Australia

2:00 [Interactive Panel Discussion] Identity management during Covid-19

  • How to protect end-user identity when working remotely
  • Using the right tools and platforms to manage identity and access to corporate data
  • Streamlining remote access arrangements – what works and why

Moderator

Bob Dickinson, Chief Technology Officer, OneLogin

Panellists

David Tregoning, System Architect: Identity Specialist, Nine

Damien Manuel, CISSP, CISM, CISA, CGEIT, CRISC, MBA, MAISA, GAICD, Director of Cyber Security – Research and Innovation Centre, Deakin University

Vijay Varadharajan, Global Innovation Chair & Professor in Cyber Security, University of Newcastle

Simon Carabetta, Project and Engagement Coordinator WA, AustCyber Innovation Hub

► Delegates will participate online in these panels, with questions relayed through the moderator. As a virtual format, the focus is on interaction between panel members & delegates.

3:00 Cyber Security Business Essentials

  • Why be prepared for cyberattacks?
  • Australian Government Information Security Manual (ISM)
  • Essential 8 Cyber Security Controls
  • The 9thattack vector – Social Media

Simon Carabetta, Project and Engagement Coordinator, WA AustCyber Innovation Hub

3:30 Closing remarks from Chair & Close of Conference

Separately bookable – Step-by-step guide to cyber-security planning and management

Workshop A

9am – 12pm

Cybercrime is on the rise, with Australians reporting cybersecurity incidents every 10 minutes, and costing businesses $29 billion each year. This workshop offers a practical guide to understanding the cyber landscape – with key learnings focusing on:

Introduction to cyber-security strategy

  • Why cybersecurity is important
  • Where governance and risk management play out in this space
  • How the cyber-security framework is evolving

Managing risk

  • What the risk management strategies entail
  • Analysis and risk management frameworks
  • Preventing cyber attacks

Dealing with risk

  • Cyber-security in the cloud
  • Stages of a cyber attack
  • Protecting your business
  • Prevention strategies and techniques

Simon Carabetta, Project and Engagement Coordinator, WA AustCyber Innovation Hub

12pm-1pm LUNCH BREAK

Workshop B 

1pm – 4pm 

Identifying and managing vulnerabilities in your networks and systems 

This workshop offers a practical guide to managing intrusions into critical infrastructure. This class is tailored for professionals with a step-by-step guide to: 

  • Understanding hackers’ tactics and strategies in cyber-space 
  • Locating vulnerabilities and intrusions within computer systems and networks 
  • Building your incident-handling plan with the right tracking tools 
  • Assessing the more insidious attacks involving malicious actors 
  • Responding to incidents with an inside view of how attackers undermine systems 
  • Building your detection and response capabilities 
  • Concept of network vulnerability with reference to a computer and network security. 
  • Clarifying the security and firewall protocols 
  • Building a strong cyber security posture for enterprise systems 

Lani Rafiti, Chief Executive Officer, IoT Sec Australia

End of Workshop

Who Should Attend

CEOs, CTOs, CIOs, CISOs, CDOs, MDs, GMs, Directors and Managers of:


Cyber
Data Security
Data Analyst/Scientist
Data Architect
IT
Digital
Business Intelligence
Risk
Governance

Save

Early bird discount

Book now and save $100

Team discount

Register 3-4 delegates and receive an additional 10% DISCOUNT off the standard price
Register 5-7 delegates and receive an additional 15% DISCOUNT off the standard price
Register 8 or more delegates and receive an additional 20% DISCOUNT off the standard price

Countdown
To The Event.

Days
Hours
Minutes
Seconds

Sponsors

Platinum Sponsor

OneTrust is the #1 fastest growing and most widely used technology platform to help organizations be more trusted, and operationalize  privacy, security, data governance, and compliance programs. More than 6,000 customers, including half of the Fortune 500, use OneTrust to build integrated programs that comply with the CCPA, GDPR, LGPD, PDPA, ISO27001 and hundreds of the world’s privacy and security laws. The OneTrust platform is backed by 115 patents and powered by the OneTrust Athena™ AI and robotic automation engine.  Our offerings include OneTrust Privacy Management Software; OneTrust PreferenceChoice™ consent and preference management; OneTrust Vendorpedia™ third-party risk exchange; OneTrust GRC integrated risk management; OneTrust Ethics compliance and ethics; OneTrust DataGuidance™ regulatory research; OneTrust DataDiscovery™ AI-powered discovery and classification software; and OneTrust DataGovernance governance and metadata management .

Silver Sponsors

OneLogin manages and secures millions of identities around the globe by bringing speed and integrity to the modern enterprise with an award-winning Identity & Access Management (IAM) solution. Our Trusted Experience Platform secures connections across users, devices, and applications, helping enterprises drive new levels of business integrity, operational velocity, and team efficiency across all their cloud and on-premise applications. Risk-based authentication, mobile identity management, and real-time directory synchronization add an extra layer of protection. The ability to handle on-premises and cloud/SaaS applications makes OneLogin the Identity as a Service (IDaaS) vendor of choice for the hybrid enterprise.

CyberStash is a young and upcoming innovative Cybersecurity company based in Sydney and operating within APAC. While offering traditional security consulting and managed security services, it’s leading the market with the following two unique services which it specialises in:
 1 – Forensic-State Compromise Assessment Service
2 – Managed Threat Intelligence Gateway Service

Sophos evolves to meet every new challenge, protecting more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyber threats. Powered by SophosLabs, our cloud-native and AI-enhanced solutions are able to adapt and evolve to secure endpoints and networks against never-before-seen cybercriminal tactics and techniques. Managed through our award-winning, cloud-based platform, Sophos Central, our best-of-breed products work together through our unique Synchronized Security system to share threat intelligence and respond to evolving threats. The Sophos suite of products secures networks and endpoints against automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.

Media Partners