CISOs committed to creating risk awareness and building a cybersecurity driven culture are facing a number of challenges, from getting senior management buy-in, to implementing organisational change and engaging employees. During this session, our panellists will share their experiences on:
Speaking:
Cyber Culture & Engagement Lead, Department of Premier and Cabinet (VIC)
CISO, TAL
Director, Cyber Security Research and Innovation Centre
CISO, AARNet
August 17 | 10:00 - 10:43
CISOs committed to creating risk awareness and building a cybersecurity driven culture are facing a number of challenges, from getting senior management buy-in, to implementing organisational change and engaging employees. During this session, our panellists will share their experiences on:
Speaking:
Global Advisory CISO, Duo Security at Cisco
August 17 | 10:43 - 11:10
Speaking:
CISO, QSuper
August 17 | 11:10 - 11:26
Ransomware and other significant cyber breaches over the last year demonstrate weaknesses in the current state of our cybersecurity. But this is an excellent opportunity for those that understand the challenges to make a shift and implement the cybersecurity capabilities necessary to protect and defend enterprises. Join Zscaler and Bupa as we take part in a panel to discuss:
Speaking:
CISO, BUPA
CISO, AMS and Public Sector, Zscaler
Country Manager, ANZ, Zscaler
August 17 | 11:26 - 11:44
Ransomware and other significant cyber breaches over the last year demonstrate weaknesses in the current state of our cybersecurity. But this is an excellent opportunity for those that understand the challenges to make a shift and implement the cybersecurity capabilities necessary to protect and defend enterprises. Join Zscaler and Bupa as we take part in a panel to discuss:
Speaking:
Senior Manager, Information Security, Pepper Financial Services
Join this session for a deep-dive on issues around emerging cyber threats & how an identity centric approach can mitigate risk, improve fraud detection & prevention and bridge the gap between physical and cybersecurity.
Speaking:
Chief Customer Information Officer, Ping Identity
August 17 | 11:57 - 12:22
Join this session for a deep-dive on issues around emerging cyber threats & how an identity centric approach can mitigate risk, improve fraud detection & prevention and bridge the gap between physical and cybersecurity.
Speaking:
Group Threat and Vulnerability Lead at Coca Cola Europacific Partners
Speaking:
CISO, Fortinet
August 17 | 12:41 - 13:02
Industrial control systems (ICS) form the backbone supporting essential industries including electricity, gas, water and waste services, construction, agriculture, mining, manufacturing, transport, postal, and warehousing sectors. These industries not only significantly contribute to the Australian economy, but also support several other industries such as healthcare and tourism. Due to the criticality to everyday life and economy, ICS are usually considered by many as ‘critical infrastructure’. In this talk, I will cover the main threats critical infrastructure stakeholders are experiencing, and describe possible approaches to countering them. I will also demonstrate some recent works focusing on detecting these threats. I will also introduce the work conducted at the UQ Industry 4.0 Energy TestLab, a digital twin funded by the Australian Government’s Department of Industry, Science, Energy and Resources, UQ, and Siemens, with realistic scenarios supplied by several industry partners mimicking energy production and consumption, manufacturing and a wide range of control automation configurations.
Speaking:
Chair and Director of Cyber Security, University of Queensland
August 17 | 13:02 - 13:31
Industrial control systems (ICS) form the backbone supporting essential industries including electricity, gas, water and waste services, construction, agriculture, mining, manufacturing, transport, postal, and warehousing sectors. These industries not only significantly contribute to the Australian economy, but also support several other industries such as healthcare and tourism. Due to the criticality to everyday life and economy, ICS are usually considered by many as ‘critical infrastructure’. In this talk, I will cover the main threats critical infrastructure stakeholders are experiencing, and describe possible approaches to countering them. I will also demonstrate some recent works focusing on detecting these threats. I will also introduce the work conducted at the UQ Industry 4.0 Energy TestLab, a digital twin funded by the Australian Government’s Department of Industry, Science, Energy and Resources, UQ, and Siemens, with realistic scenarios supplied by several industry partners mimicking energy production and consumption, manufacturing and a wide range of control automation configurations.
Speaking:
Data and Technology Operations Officer, Fisher Funds
Chief Security Officer, Silver Chain Group
Cyber Ambassador, AustCyber & Deputy Chair, AISA
Chief Security Scientist (CSS) and Advisory CISO, ThycoticCentrify
August 18 | 10:00 - 10:45
Last year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. What are the best-practice models for securing it? Why is continuing to rely on traditional approaches courting disaster? What are the steps you must take to implementing Zero Trust across your ecosystem? What are the top trends in Identity Management and how can your organisation leverage these for customer success? In this session, Sami will focus on:
Speaking:
Director, Technology Strategy, Okta
August 18 | 10:45 - 11:05
Last year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. What are the best-practice models for securing it? Why is continuing to rely on traditional approaches courting disaster? What are the steps you must take to implementing Zero Trust across your ecosystem? What are the top trends in Identity Management and how can your organisation leverage these for customer success? In this session, Sami will focus on:
Speaking:
Head of Cyber Security & Risk, Wesfarmers Industrial Safety
August 18 | 11:05 - 11:21
In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing - and the challenge has gone beyond one that is human-scalable. Organizations need to urgently rethink their strategy to ensure their systems, critical data and people are protected, wherever they are. Today’s Autonomous, Self-Learning defences are capable of identifying and neutralizing security incidents in seconds, not hours - before the damage is done
In this session, learn how self-learning AI:
Speaking:
Director of Industrial Security, APAC, Darktrace
August 18 | 11:21 - 11:44
In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing - and the challenge has gone beyond one that is human-scalable. Organizations need to urgently rethink their strategy to ensure their systems, critical data and people are protected, wherever they are. Today’s Autonomous, Self-Learning defences are capable of identifying and neutralizing security incidents in seconds, not hours - before the damage is done
In this session, learn how self-learning AI:
Speaking:
Security GRC Lead, Digi Telecommunications & Academics Director, ISACA Malaysia Chapter
August 18 | 11:44 - 12:00
Nearly every organisation today relies on software to operate. This software is a product of a complicated, interconnected supply chain in which organisations may not have visibility of the vulnerabilities. Yet, the consequences of successful cyber attacks through the supply chain can be severe. In this session Ken Mizota, Director, Platform at Rapid7, will cover why you should be focusing on your software sources and how to prevent, detect and respond to incidents in your supply chain.
Speaking:
Regional CTO, APAC, Rapid7
August 18 | 12:00 - 12:16
Nearly every organisation today relies on software to operate. This software is a product of a complicated, interconnected supply chain in which organisations may not have visibility of the vulnerabilities. Yet, the consequences of successful cyber attacks through the supply chain can be severe. In this session Ken Mizota, Director, Platform at Rapid7, will cover why you should be focusing on your software sources and how to prevent, detect and respond to incidents in your supply chain.
Speaking:
Director of Advanced Cyber Security Engineering, University of Newcastle
August 18 | 12:16 - 12:51
The adoption of open-source software continues to grow and creates significant security concerns for everything from software supply chain attacks in language ecosystem registries to cloud-native application security concerns.
In this talk, Lawrence Crowther, Head of Solutions Engineering, APJ @ Snyk will cover:
Speaking:
Head of Solutions Engineering APJ, Snyk
August 18 | 12:51 - 13:16
The adoption of open-source software continues to grow and creates significant security concerns for everything from software supply chain attacks in language ecosystem registries to cloud-native application security concerns.
In this talk, Lawrence Crowther, Head of Solutions Engineering, APJ @ Snyk will cover:
Speaking:
Vice President, IT Audit, BNP Paribas
Terms & Conditions
The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.
Disclosure of your information
You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:
- Business partners
- Suppliers
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Brella or Webinar.net.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing inquiries@coriniumintel.com
Data protection
The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at info@coriniumintel.com