Mark Priebatsch, Regional Director Australia & New Zealand, Checkmarx
This overview will walk you through the essential steps in establishing a pragmatic privacy and cybersecurity program alignment for a business, starting with ways to identify goals, communicate with the executive teams, align and partner with IT, privacy asset valuation, threat and vulnerability assessments, environmental considerations (cloud, IoT, distributed workforce), control selection, incident response, people and cybersecurity, and program management.
Chris Moschovitis, Author, “Privacy, Regulations, and Cybersecurity: The Essential Planning Guide” (US)
Grae Meyer-Gleaves, CISO, Hollard
Security breaches in the cloud usually don’t exploit a single misconfiguration or vulnerability but rather a toxic combination of multiple issues that in isolation wouldn’t raise a red flag given the tons of alerts security teams already get. In this session, we’ll discuss five common toxic combinations across internet exposure, identities and entitlements, software vulnerabilities, and misconfigurations that when combined represent an attacker's pathway to a breach.
Matt Preswick, Enterprise Solutions Engineer, APJ, Wiz
An inspiring keynote, showcasing how you can tap into and grow your resilience to overcome life's challenges, and enhance your leadership skills to lead people through the darkest of times. Daryl Elliott Green will walk you through his extraordinary life experience and the obstacle course he navigated over the decades which followed, after he was ambushed on duty and shot in the face from less than a metre away as a 27-year-old police officer.
Daryl Elliott Green, TWICESHOT.com
During this session, Brad will share his personal when he was seriously injured in a bike accident’ He’ll share lessons learned, why cyber security professionals shouldn’t blame the victim and how to help their friends and organisations recover from data breaches and cyber-attacks.
Bradley Busch, CISO, Tyro Payments
Open-source libraries have become an essential part of almost all modern applications. Without open-source, software development would be stuck in the slow lane. Not “reinventing the wheel” each time you need certain functionality in an app saves time and effort, and as a result, open-source isn’t going away anytime soon. If anything, it’s becoming more and more widespread. But there’s a certain amount of risk that comes with using open-source components, modules, and libraries. Today, it’s increasingly important to protect yourself from these risks.
In this session, we will discuss the importance and prevalence of open-source software as well as the ways you can protect yourself from its attendant risks and licensing issues. The goal is to catch issues or threats ahead of time before they can become fatal.
Michael Pogrebisky, Technical Director, Checkmarx
Mandy Turner, Senior Manager Cyber Security Operations Centre, The University of Queensland
Today, Zero Trust is no longer a theoretical idea—it’s an active initiative for virtually every company with a digital footprint. However, many organisations still have a long way to go to truly reap the rewards of an advanced Zero Trust security architecture with just under half of APAC organisations having a defined Zero Trust security initiative in place today (The State of Zero Trust Security 2022, Okta).
Join this session to discover:
James Darwin, Senior Solutions Engineer, Okta
During this session, David will discuss the risks and potential costs of ransomware attacks, and how organisations can prepare for ransomware protection and response. Join him and explore effective practices to strengthen your organisation’s resilience.
David Chantler, Director of Information Security and Technology Risk, Queensland Treasury Corporation
Three-quarters of Australian CISOs see human error as their organisation’s biggest cyber vulnerability. It only takes one employee to click on a bad email to compromise your organisations entire network. Actors know what the weakest link is and they’ve long since shifted to exploiting the human. What if there was a way to stop rolling the human dice every day?
Learn how organisations can leverage advanced behavioral science and automation for informed and near instantaneous decision making on what is good and what is bad email. As well as removing the increasing burden that is placed on employees as a last line of defence.
Join this session to understand:
Tim Bentley, Regional Director APAC, Abnormal Security
Panel moderator:
Mark Priebatsch, Regional Director Australia & New Zealand, Checkmarx
Panellists:
Jason Anderson, CISO, Australian Retirement Trust
Nikki Peever, Director, Cybersecurity Program, CAUDIT
Grae Meyer-Gleaves, CISO, Hollard
TRACK A: Interactive case studies | TRACK B: Solutions Clinic |
INTERACTIVE CASE STUDY: Military Mission Assurance through Cyberworthiness and Cyber Survivability
|
|
Practical & Holistic Zero Trust: Adopting a Consolidated Security Architecture
|
Join us for an inspiring presentation and in-depth dive into learning how the US and the Australian militaries manage cyber risks across their capability lifecycles. At the end of this brief, you’ll have the tools and insights to be analysing, prioritising, and mitigating your organisation’s mission risks with military precision to achieve and maintain an acceptable risk posture. |
|
|
Arjun Xavier, Staff Officer Cybersecurity and Cyberworthiness, Royal Australian Air Force |
|
Andrew Abel, Security Strategy & Zero Trust Consultant Andrew Toth, DevOps/SecOps Lead, Forwood |
INTERACTIVE CASE STUDY: The Five Best Practices for CISOs Adopting XDR |
|
Continued...Practical & Holistic Zero Trust: Adopting a Consolidated Security Architecture |
Any new technology enters the marketplace Amid a blaze of hype. This is as true for a new smartphone as it is for the latest games console or even the latest development in cybersecurity. That’s the case with eXtended Detection and Response (XDR), which has grown in profile over the last few years, to become the new buzzword in cybersecurity. Join SentinelOne as we look at the rise of XDR and why it is more than a new trend. We’ll consider why it is emerging as the answer for CISOs, key considerations while adopting XDR as well five best practices for CISOs considering XDR. It promises to be a through-provoking session. |
|
|
Wayne Phillips, Directory Security Engineering, ANZ, SentinelOne |
Andrew Abel, Security Strategy & Zero Trust Consultant Andrew Toth, DevOps/SecOps Lead, Forwood |
INTERACTIVE CASE STUDY: Programmed Inequality - why don’t women want to work in the IT sector? |
|
How the Convergence of your OT and IT Affects Cybersecurity |
Cybersecurity is a male dominated industry. The gender gap in technology and data science has actually grown significantly over the last three decades, raising global concern about the state of open-mindedness of the information and tech industry. Computing occupations held by women have been declining since 1991. Despite the critical skills shortage in the sector, women currently only make up 25% of the information security workforce globally and only 85 of the Fortune 500 companies have a female CISO. Whilst this is an increase, of concern is that predictions suggest female representation in information security jobs will remain low unless proactive interventions are made. |
As operational technology (OT) becomes more connected, the growing number of devices and endpoints offer a larger attack surface and create more vulnerabilities. Securing this space is no easy task but there is an opportunity to go beyond minimum compliance requirements and improve your overall security posture. During this session, we’ll explore how to protect things outside the scope of traditional security. |
|
Rosemary Cooper, Global Information Systems - Governance, Risk and Compliance, Sonic Healthcare |
|
Tony Kitzelmann, CISO, Airservices Australia Benjamin Di Marco, Cyber & Technology Risk Specialist, Willis Towers Watson |
INTERACTIVE CASE STUDY: Prioritising the prioritised |
|
Continued...How the Convergence of your OT and IT Affects Cybersecurity |
How to select the top ones from many cybersecurity priorities where everything is high-risk, urgent, and important. Can “high” ranking alone be enough to decide the priority of a cybersecurity initiative? What if we have 20 “high” ranking risks to address? Is finance the only other consideration or is the availability of resources is even more important? Presented here is a framework to enable the decision-making process to prioritise the already prioritised cybersecurity initiatives, that is repeatable and defendable across its lifecycle. |
As operational technology (OT) becomes more connected, the growing number of devices and endpoints offer a larger attack surface and create more vulnerabilities. Securing this space is no easy task but there is an opportunity to go beyond minimum compliance requirements and improve your overall security posture. During this session, we’ll explore how to protect things outside the scope of traditional security. | |
Faisal Khan, Director Cyber Security, ICT Governance & Risk, Queensland Government |
|
Tony Kitzelmann, CISO,Airservices Australia Benjamin Di Marco, Cyber & Technology Risk Specialist, Willis Towers Watson |
Rob Wiggan, Cyber Specialist, Willis Towers Watson
Tim Hartman, Head of Solution Architects, Infoblox Australia and New Zealand
During this session, Professor Helge Janicke will share research-based strategies to increase cybersecurity awareness and get board-level buy-in. Join his session and get invaluable insights that will help you create risk awareness, drive change, and build a cybersecurity driven culture.
Helge Janicke, Research Director, Cyber Security Cooperative Research Centre
Panel moderator:
Jo Stewart-Rattray, CSO, Silver Chain
Panellists:
David Bunker, Strategy Consultant and Director
Tony Kitzelmann, CISO, Airservices Australia
Jason Anderson, CISO, Australian Retirement Trust