<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

EVENTS ARE BACK!

CISO BRISBANE

Discuss Priorities & Share Intelligence to Reinforce Your Cybersecurity Resilience

6 September 2022
Hilton Brisbane
DOWNLOAD THE AGENDA
REGISTER
EXPLORE SPONSORSHIP

DOWNLOAD THE AGENDA TODAY

Plan each day with our downloadable agenda
DOWNLOAD THE AGENDA

AGENDA

  • Tuesday, 6 September, 2022
7:45-8:20am AEST
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
8:20-8:30am AEST
Welcome from Corinium and the Chairperson

Mark Priebatsch, Regional Director Australia & New Zealand, Checkmarx

8:30-8:55am AEST
International Keynote: Where privacy, regulations and cybersecurity meet

This overview will walk you through the essential steps in establishing a pragmatic privacy and cybersecurity program alignment for a business, starting with ways to identify goals, communicate with the executive teams, align and partner with IT, privacy asset valuation, threat and vulnerability assessments, environmental considerations (cloud, IoT, distributed workforce), control selection, incident response, people and cybersecurity, and program management.

Chris Moschovitis, Author, “Privacy, Regulations, and Cybersecurity: The Essential Planning Guide” (US)

8:55-9:20am AEST
Keynote Session: Strategies to manage the ‘often-unseen’ third-party security risks
  • Exploring common and out-of-sight cybersecurity risks of third party management
  • Understanding and addressing the cyber risks behind them
  • Challenges presented by third party identity management – and how to overcome it
  • How to ensure your organisation is complying with CDR rules when adopting this approach

Grae Meyer-Gleaves, CISO, Hollard

9:20-9:45am AEST
The Top Breach Paths You’re Missing in Cloud

Security breaches in the cloud usually don’t exploit a single misconfiguration or vulnerability but rather a toxic combination of multiple issues that in isolation wouldn’t raise a red flag given the tons of alerts security teams already get. In this session, we’ll discuss five common toxic combinations across internet exposure, identities and entitlements, software vulnerabilities, and misconfigurations that when combined represent an attacker's pathway to a breach.

Matt Preswick, Enterprise Solutions Engineer, APJ, Wiz

9:45-10:30am AEST
Inspirational presentation: Triumphing Over Firestorms

An inspiring keynote, showcasing how you can tap into and grow your resilience to overcome life's challenges, and enhance your leadership skills to lead people through the darkest of times. Daryl Elliott Green will walk you through his extraordinary life experience and the obstacle course he navigated over the decades which followed, after he was ambushed on duty and shot in the face from less than a metre away as a 27-year-old police officer.

Daryl Elliott Green, TWICESHOT.com

10:30-11:00am AEST
Morning Tea ☕
11:00-11:25am AEST
Keynote of success: Don’t blame the victim

During this session, Brad will share his personal when he was seriously injured in a bike accident’ He’ll share lessons learned, why cyber security professionals shouldn’t blame the victim and how to help their friends and organisations recover from data breaches and cyber-attacks.

Bradley Busch, CISO, Tyro Payments

11:25am-11:50pm AEST
Leverage ‘Ahead of Time’ Intelligence to Tackle Supply Chain Vulnerabilities

Open-source libraries have become an essential part of almost all modern applications. Without open-source, software development would be stuck in the slow lane. Not “reinventing the wheel” each time you need certain functionality in an app saves time and effort, and as a result, open-source isn’t going away anytime soon. If anything, it’s becoming more and more widespread. But there’s a certain amount of risk that comes with using open-source components, modules, and libraries. Today, it’s increasingly important to protect yourself from these risks.

In this session, we will discuss the importance and prevalence of open-source software as well as the ways you can protect yourself from its attendant risks and licensing issues. The goal is to catch issues or threats ahead of time before they can become fatal.

Michael Pogrebisky, Technical Director, Checkmarx

11:50-12:15pm AEST
Secrets to implement ransomware protection & recovery plans
  • An overview of the growth of ransomware attacks and how organisations are being impacted
  • Understanding the risks and complications of the amended Privacy Act and Notifiable Data Breach scheme
  • Can cyber insurance support the fight against ransomware?
  • Exploring successful cases of improving organisations’ ransomware protection posture

Mandy Turner, Senior Manager Cyber Security Operations Centre, The University of Queensland

12:15-12:40pm AEST
Identity at the Core of Zero Trust

Today, Zero Trust is no longer a theoretical idea—it’s an active initiative for virtually every company with a digital footprint. However, many organisations still have a long way to go to truly reap the rewards of an advanced Zero Trust security architecture with just under half of APAC organisations having a defined Zero Trust security initiative in place today (The State of Zero Trust Security 2022, Okta).

Join this session to discover:

  • What should your Zero Trust 'North Star' be?
  • Hear this year's top security strategy takeaways
  • Unpack the five phases of Zero Trust Maturity
  • Where does your business sit on the Maturity curve, and what does it mean for your security strategy

James Darwin, Senior Solutions Engineer, Okta

12:40-1:05pm AEST
Successful practices for effective ransomware prevention and response

During this session, David will discuss the risks and potential costs of ransomware attacks, and how organisations can prepare for ransomware protection and response. Join him and explore effective practices to strengthen your organisation’s resilience.

David Chantler, Director of Information Security and Technology Risk, Queensland Treasury Corporation

1:05-1:15pm AEST
The Future of Email Security

Three-quarters of Australian CISOs see human error as their organisation’s biggest cyber vulnerability. It only takes one employee to click on a bad email to compromise your organisations entire network. Actors know what the weakest link is and they’ve long since shifted to exploiting the human. What if there was a way to stop rolling the human dice every day?

Learn how organisations can leverage advanced behavioral science and automation for informed and near instantaneous decision making on what is good and what is bad email. As well as removing the increasing burden that is placed on employees as a last line of defence.

Join this session to understand:

  • How behavioural data science from the ad-tech world is being used to baseline normal in order to find what is abnormal
  • New insights and controls over protecting against supply chain attacks
  • Account takeover techniques and measures that can be taken to help protect against them

Tim Bentley, Regional Director APAC, Abnormal Security

1:15-1:50pm AEST
Keynote Panel: SOCI Act Reforms – What to do next?
  • What the Security Legislation Amendment (Critical Infrastructure) Bill 2021 means for your business
  • What do you need to know to about Positive Security Obligations and Government Assistance reforms?
  • What to do next if your company is part of the expanded coverage of specific entities
  • How well do these regulations address cybersecurity risks?

Panel moderator:

Mark Priebatsch, Regional Director Australia & New Zealand, Checkmarx

Panellists:

Jason Anderson, CISO, Australian Retirement Trust

Nikki Peever, Director, Cybersecurity Program, CAUDIT

Grae Meyer-Gleaves, CISO, Hollard

1:50-2:50pm AEST
Lunch
Breakout Sessions
TRACK A: Interactive case studies TRACK B: Solutions Clinic
2:50-3:10pm AEST
INTERACTIVE CASE STUDY: Military Mission Assurance through Cyberworthiness and Cyber Survivability
 
Practical & Holistic Zero Trust: Adopting a Consolidated Security Architecture
 
Join us for an inspiring presentation and in-depth dive into learning how the US and the Australian militaries manage cyber risks across their capability lifecycles. At the end of this brief, you’ll have the tools and insights to be analysing, prioritising, and mitigating your organisation’s mission risks with military precision to achieve and maintain an acceptable risk posture.  
  • How to develop a roadmap and implementing specific initiatives to your projects
  • Discover effective ways to build a zero-trust security framework
  • Identify key components of a zero-trust model to protect the current environment

Arjun Xavier, Staff Officer Cybersecurity and Cyberworthiness, Royal Australian Air Force

 

Andrew Abel, Security Strategy & Zero Trust Consultant

Andrew Toth, DevOps/SecOps Lead, Forwood

 

3:10-3:30pm AEST

INTERACTIVE CASE STUDY: The Five Best Practices for CISOs Adopting XDR

 

Continued...Practical & Holistic Zero Trust: Adopting a Consolidated Security Architecture

Any new technology enters the marketplace Amid a blaze of hype. This is as true for a new smartphone as it is for the latest games console or even the latest development in cybersecurity. That’s the case with eXtended Detection and Response (XDR), which has grown in profile over the last few years, to become the new buzzword in cybersecurity.

Join SentinelOne as we look at the rise of XDR and why it is more than a new trend. We’ll consider why it is emerging as the answer for CISOs, key considerations while adopting XDR as well five best practices for CISOs considering XDR.

It promises to be a through-provoking session.
 
  • How to develop a roadmap and implementing specific initiatives to your projects
  • Discover effective ways to build a zero-trust security framework
  • Identify key components of a zero-trust model to protect the current environment
Wayne Phillips, Directory Security Engineering, ANZ, SentinelOne  

Andrew Abel, Security Strategy & Zero Trust Consultant

Andrew Toth, DevOps/SecOps Lead, Forwood

 

3:30-3:50pm AEST

INTERACTIVE CASE STUDY: Programmed Inequality - why don’t women want to work in the IT sector?

 

How the Convergence of your OT and IT Affects Cybersecurity

Cybersecurity is a male dominated industry. The gender gap in technology and data science has actually grown significantly over the last three decades, raising global concern about the state of open-mindedness of the information and tech industry. Computing occupations held by women have been declining since 1991.

Despite the critical skills shortage in the sector, women currently only make up 25% of the information security workforce globally and only 85 of the Fortune 500 companies have a female CISO.

Whilst this is an increase, of concern is that predictions suggest female representation in information security jobs will remain low unless proactive interventions are made.
  As operational technology (OT) becomes more connected, the growing number of devices and endpoints offer a larger attack surface and create more vulnerabilities. Securing this space is no easy task but there is an opportunity to go beyond minimum compliance requirements and improve your overall security posture. During this session, we’ll explore how to protect things outside the scope of traditional security.

Rosemary Cooper, Global Information Systems - Governance, Risk and Compliance, Sonic Healthcare

 

Tony Kitzelmann, CISO, Airservices Australia

Benjamin Di Marco, Cyber & Technology Risk Specialist, Willis Towers Watson

 

3:50-4:10pm AEST

INTERACTIVE CASE STUDY: Prioritising the prioritised

 

Continued...How the Convergence of your OT and IT Affects Cybersecurity

How to select the top ones from many cybersecurity priorities where everything is high-risk, urgent, and important. Can “high” ranking alone be enough to decide the priority of a cybersecurity initiative? What if we have 20 “high” ranking risks to address? Is finance the only other consideration or is the availability of resources is even more important?
Presented here is a framework to enable the decision-making process to prioritise the already prioritised cybersecurity initiatives, that is repeatable and defendable across its lifecycle.
  As operational technology (OT) becomes more connected, the growing number of devices and endpoints offer a larger attack surface and create more vulnerabilities. Securing this space is no easy task but there is an opportunity to go beyond minimum compliance requirements and improve your overall security posture. During this session, we’ll explore how to protect things outside the scope of traditional security.

Faisal Khan, Director Cyber Security, ICT Governance & Risk, Queensland Government

 

Tony Kitzelmann, CISO,Airservices Australia

Benjamin Di Marco, Cyber & Technology Risk Specialist, Willis Towers Watson

 

4:10-4:40pm AEST
Afternoon tea ☕
4:40-5:05pm AEST
Simplifying cyber insurance complexities
The exponential growth of cyber-attacks creates vulnerabilities that the latest and greatest technologies may not be good enough to fix. During this session, we’re discussing the pros and cons of cyber insurance, clarifying misconceptions, and exploring if that might be what will save your organisation when everything else fails.
  • What is cyber insurance and what is it for?
  • What you need to know about insurance underwriting for your business
  • What are the key considerations for organisations when thinking about cyber insurance?
  • Adopting cyber insurance as part of your risk management strategy
  • Strategies to be specific about your company’s needs to get premiums down

Rob Wiggan, Cyber Specialist, Willis Towers Watson

5:05-5:10pm
Partner session:

Tim Hartman, Head of Solution Architects, Infoblox Australia and New Zealand

5:10-5:35pm AEST
Cyber awareness – Leading from the board level

During this session, Professor Helge Janicke will share research-based strategies to increase cybersecurity awareness and get board-level buy-in. Join his session and get invaluable insights that will help you create risk awareness, drive change, and build a cybersecurity driven culture.

Helge Janicke, Research Director, Cyber Security Cooperative Research Centre

5:35-6:10pm AEST
Wrap-up Fireside chat: Can CEOs and CISOs work better together & collaborate?
  • How can CISOs speak the CEOs’ language
  • What does the board expect from CISOs when evaluating and reporting inherent and evolving risks?
  • How can the board support CISOs in conducting a cybersecurity mission & strengthening their posture?
  • Working together in mastering the company’s digital governance & risk management practices
  • Exploring challenges and opportunities to adopt a secure-by-design approach in the business

Panel moderator:

Jo Stewart-Rattray, CSO, Silver Chain

Panellists:

David Bunker, Strategy Consultant and Director

Tony Kitzelmann, CISO, Airservices Australia

Jason Anderson, CISO, Australian Retirement Trust

6:10-6:15pm AEST
Closing Remarks
6:15-7:00pm AEST
CISOs Cocktail Reception & Networking 🍾
Continue the conversations in a fun and entertaining way.