<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

 

CISO Logo (14)

9:30am - 1:30pm AEDT
11:30pm - 3:30pm NZDT

CLAIM YOUR FREE PLACE

REQUEST THE SPONSORSHIP PROSPECTUS

Day 1 - 9 February
09:30

KEYNOTE PANEL: Emerging cyber threats – how prepared are you?

  • What is the cyber threat landscape for 2021 and beyond?
  • Examples of how sophisticated cyber criminals and hackers are becoming – what it means to your business?
  • Assessing emerging strategies to improve your defences capabilities and prevent risks
  • How can Quantum cryptography and data encryption be employed for improved security?

Panel moderator:
Lech Janczewski, Associate Professor, Information Security, The University of Auckland

Panellists:
Garry Bentlin, CISO, Transgrid
Ashwin Ram, Cyber Security Evangelist, Office of the Chief Technology Officer, Check Point
Nalin A.G. Arachchilage
, Senior Research Fellow in Cyber Security, La Trobe University

KEYNOTE PANEL: Emerging cyber threats – how prepared are you?

February 9 | 09:30 - 10:05

  • What is the cyber threat landscape for 2021 and beyond?
  • Examples of how sophisticated cyber criminals and hackers are becoming – what it means to your business?
  • Assessing emerging strategies to improve your defences capabilities and prevent risks
  • How can Quantum cryptography and data encryption be employed for improved security?

Panel moderator:
Lech Janczewski, Associate Professor, Information Security, The University of Auckland

Panellists:
Garry Bentlin, CISO, Transgrid
Ashwin Ram, Cyber Security Evangelist, Office of the Chief Technology Officer, Check Point
Nalin A.G. Arachchilage
, Senior Research Fellow in Cyber Security, La Trobe University

CLAIM YOUR FREE PLACE

Speaking:

10:05

Finding Success by Adopting a SASE Architecture

In a world where digital transformation is accelerating, with our data no longer in an environment we control, this session will explore how security programs need to transform in order to address the challenges posed.

David Fairman, Chief Security Officer, Netskope

Finding Success by Adopting a SASE Architecture

February 9 | 10:05 - 10:35

In a world where digital transformation is accelerating, with our data no longer in an environment we control, this session will explore how security programs need to transform in order to address the challenges posed.

David Fairman, Chief Security Officer, Netskope

CLAIM YOUR FREE PLACE

Speaking:

10:35

International Keynote Session: Evolving your security plan for a post-pandemic world

  • Building your incident management processes and governance framework
  • Defining your company’s control and security policies
  • Breaking through the complexity and designing your governance and standards structure


Jason Elrod, Executive Director, Cybersecurity & Investigations, Sutter Health, Office of the General Counsel (US)

International Keynote Session: Evolving your security plan for a post-pandemic world

February 9 | 10:35 - 10:55

  • Building your incident management processes and governance framework
  • Defining your company’s control and security policies
  • Breaking through the complexity and designing your governance and standards structure


Jason Elrod, Executive Director, Cybersecurity & Investigations, Sutter Health, Office of the General Counsel (US)

CLAIM YOUR FREE PLACE

Speaking:

10:55

How to reduce risk, simplify IT and increase user productivity through a zero trust security model

Organisations are embracing digital transformation and moving applications out of traditional network boundaries. With rising cyber threats, how can organisations use a zero trust security model to reduce risk and simplify their IT, whilst increasing user productivity?

This session will explore:
  • Interpretation of the term "Zero Trust"
  • How Zero Trust architecture is evolving in a pandemic-hit world
  • Steps in starting your organisation's Zero Trust journey

Sudip Banerjee, Director, Transformation Strategy, Zscaler (Former Group CTO at Reliance Capital)

How to reduce risk, simplify IT and increase user productivity through a zero trust security model

February 9 | 10:55 - 11:20

Organisations are embracing digital transformation and moving applications out of traditional network boundaries. With rising cyber threats, how can organisations use a zero trust security model to reduce risk and simplify their IT, whilst increasing user productivity?

This session will explore:
  • Interpretation of the term "Zero Trust"
  • How Zero Trust architecture is evolving in a pandemic-hit world
  • Steps in starting your organisation's Zero Trust journey

Sudip Banerjee, Director, Transformation Strategy, Zscaler (Former Group CTO at Reliance Capital)

CLAIM YOUR FREE PLACE

Speaking:

11:20

Strengthening your organisation’s foreign interference response

  • Improving your cybersecurity controls
  • How to ensure your teams are keeping aware of foreign interference threats?
  • Assessing the company’s risk profile in current political environment

Rob Wiggan, Associate Director Information Security, QUT

Strengthening your organisation’s foreign interference response

February 9 | 11:20 - 11:40

  • Improving your cybersecurity controls
  • How to ensure your teams are keeping aware of foreign interference threats?
  • Assessing the company’s risk profile in current political environment

Rob Wiggan, Associate Director Information Security, QUT

CLAIM YOUR FREE PLACE

Speaking:

11:40

Securing the future of work with cyber AI

The future of work remains unpredictable. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of regional or even global crises, and while sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience.
In this session, learn about:

  • Emerging threats from the transition to remote work
  • How AI has adapted to new patterns of work
  • Darktrace’s use of Cyber AI to protect the dynamic workforce
  • Defensive Autonomous Response capabilities
Liam Demordy, Director of Threat Analysis, Australia and New Zealand (ANZ), Darktrace

Securing the future of work with cyber AI

February 9 | 11:40 - 12:10

The future of work remains unpredictable. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of regional or even global crises, and while sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience.
In this session, learn about:

  • Emerging threats from the transition to remote work
  • How AI has adapted to new patterns of work
  • Darktrace’s use of Cyber AI to protect the dynamic workforce
  • Defensive Autonomous Response capabilities
Liam Demordy, Director of Threat Analysis, Australia and New Zealand (ANZ), Darktrace
CLAIM YOUR FREE PLACE

Speaking:

12:10

New information security focus: IOT systems

In recent years we witness mass use of micro controllers (i.e. microchips) acting as sensors (or actuators). These chips are almost always part are part of a network, called Internet Of Things (IOT). Micro controllers could be remotely modified to produce false data or take unauthorized actions. There is an urgent need to incorporate that reality to the design and run of digital networks.

Lech Janczewski, Associate Professor, Information Security, The University of Auckland

New information security focus: IOT systems

February 9 | 12:10 - 12:30

In recent years we witness mass use of micro controllers (i.e. microchips) acting as sensors (or actuators). These chips are almost always part are part of a network, called Internet Of Things (IOT). Micro controllers could be remotely modified to produce false data or take unauthorized actions. There is an urgent need to incorporate that reality to the design and run of digital networks.

Lech Janczewski, Associate Professor, Information Security, The University of Auckland

CLAIM YOUR FREE PLACE

Speaking:

12:30

Exceptional Experiences... And the Art of Identity

Brad Brooks, CEO & President, OneLogin

Enterprises are facing challenges presented by the global pandemic and today’s businesses need to rely on the cloud more than ever before. With the move to remote work and evolving consumer demands, digital transformation is accelerating at a rapid pace. With employees accessing critical applications remotely, businesses can no longer afford to be tied down to legacy, on-premises systems. You need to provide access from any location on any device in a way that is secure and can scale as your business grows.

In this session, Brad Brooks will discuss:

  • How the constant state of workforce transition has impacted cloud migration
  • Current trends in cybersecurity and digital identity for businesses
  • The role of IAM technology in accelerating digital transformation and initiatives

 

Exceptional Experiences... And the Art of Identity

February 9 | 12:30 - 12:55

Brad Brooks, CEO & President, OneLogin

Enterprises are facing challenges presented by the global pandemic and today’s businesses need to rely on the cloud more than ever before. With the move to remote work and evolving consumer demands, digital transformation is accelerating at a rapid pace. With employees accessing critical applications remotely, businesses can no longer afford to be tied down to legacy, on-premises systems. You need to provide access from any location on any device in a way that is secure and can scale as your business grows.

In this session, Brad Brooks will discuss:

  • How the constant state of workforce transition has impacted cloud migration
  • Current trends in cybersecurity and digital identity for businesses
  • The role of IAM technology in accelerating digital transformation and initiatives

 

CLAIM YOUR FREE PLACE

Speaking:

12:55

Assessing the risks and implications of taking an agile IAM approach

  • How can we adopt agile IAM?
  • What are the risks and benefits of this approach?
  • Assessing the cybersecurity implications of agile IAM
  • Keys to success when implement identity management
Karthick Vankayala, Manager, Identity and Cybersecurity, Macquarie Group

Assessing the risks and implications of taking an agile IAM approach

February 9 | 12:55 - 13:15

  • How can we adopt agile IAM?
  • What are the risks and benefits of this approach?
  • Assessing the cybersecurity implications of agile IAM
  • Keys to success when implement identity management
Karthick Vankayala, Manager, Identity and Cybersecurity, Macquarie Group
CLAIM YOUR FREE PLACE

Speaking:

1:15

Effective security incident handling

Best practices to help you become both organisationally and technically ready

Fixing a breach is far more costly than prevention. Organisations are under pressure to act fast. More often than not though, it can be weeks or months before you’ve even realised that you’ve suffered one.

This session will outline six fundamental actions you need to take as part of your security incident handling:

  • High-level incident management and coordination
  • Technical analysis of the incident
  • Incident scoping to determine who or what was affected
  • Crisis communications to make sure information is released in a coordinated and beneficial manner
  • Legal response to determine any implications and prepare any needed response or action
  • Remediation and mitigation recommendations and actions to ensure a smooth recovery

Neil Campbell, Vice President, Asia Pacific and Japan, Rapid7

Effective security incident handling

February 9 | 13:15 - 13:35

Best practices to help you become both organisationally and technically ready

Fixing a breach is far more costly than prevention. Organisations are under pressure to act fast. More often than not though, it can be weeks or months before you’ve even realised that you’ve suffered one.

This session will outline six fundamental actions you need to take as part of your security incident handling:

  • High-level incident management and coordination
  • Technical analysis of the incident
  • Incident scoping to determine who or what was affected
  • Crisis communications to make sure information is released in a coordinated and beneficial manner
  • Legal response to determine any implications and prepare any needed response or action
  • Remediation and mitigation recommendations and actions to ensure a smooth recovery

Neil Campbell, Vice President, Asia Pacific and Japan, Rapid7

CLAIM YOUR FREE PLACE

Speaking:

1:35

Exclusive Live Interview: Exploring effective cyber security management strategies

  • Assessing the technical, communicational and management skills and abilities required from CISOs
  • Incorporating cybersecurity into the broader risk management strategy
  • Effective cyber threat metrics and management strategies

Keith Howard, CISO, Commonwealth Bank of Australia

Speaking:

Keith Howard

CISO, Commonwealth Bank of Australia

Exclusive Live Interview: Exploring effective cyber security management strategies

February 9 | 13:35 - 13:55

  • Assessing the technical, communicational and management skills and abilities required from CISOs
  • Incorporating cybersecurity into the broader risk management strategy
  • Effective cyber threat metrics and management strategies

Keith Howard, CISO, Commonwealth Bank of Australia

CLAIM YOUR FREE PLACE

Speaking:

1:55

Close of Day One

Close of Day One

February 9 | 13:55

CLAIM YOUR FREE PLACE

Speaking:

Day 2 - 10 February
09:30

PANEL: Strengthening the culture and making cybersecurity a shared responsibility within the enterprise

  • What are the biggest challenges when creating risk awareness and building a cybersecurity driven culture?
  • How to encourage everybody to take ownership of cyber?
  • Why leaders must be committed to continually improve their teams’ skills and knowledge in IT and cybersecurity – and how do to this?
  • Exploring business cases of companies that are successfully achieving this
  • What will the future of work look like in 2021, and what challenges would these trends represent to cybersecurity executives?

Panel Moderator:

Phil Kowalik, President, AIPIO

Panellists:

Susie Costa, SVP, Head of Security Management, Sumitomo Mitsui Banking Corporation
Greg Sawyer, Director, Cybersecurity Program, CAUDIT
Paul McInerney, Vice-President, ITPA

PANEL: Strengthening the culture and making cybersecurity a shared responsibility within the enterprise

February 10 | 09:30 - 10:05

  • What are the biggest challenges when creating risk awareness and building a cybersecurity driven culture?
  • How to encourage everybody to take ownership of cyber?
  • Why leaders must be committed to continually improve their teams’ skills and knowledge in IT and cybersecurity – and how do to this?
  • Exploring business cases of companies that are successfully achieving this
  • What will the future of work look like in 2021, and what challenges would these trends represent to cybersecurity executives?

Panel Moderator:

Phil Kowalik, President, AIPIO

Panellists:

Susie Costa, SVP, Head of Security Management, Sumitomo Mitsui Banking Corporation
Greg Sawyer, Director, Cybersecurity Program, CAUDIT
Paul McInerney, Vice-President, ITPA

CLAIM YOUR FREE PLACE

Speaking:

10:05

Key considerations for 2021 – supporting the remote workforce and the unavoidable cloud adoption

Like many CISOs and Heads of cybersecurity in ANZ, as you head into 2021, you’ll need to solve the problem posed by the “new norm” of remote workforce and its long term impact on people, processes, technology as well as scalable security strategies to support it all.
In this special session, Morey Haber, CISO & CTO for BeyondTrust, will introduce key considerations for building a strategy that will enable your IT security department to be more efficient while effectively supporting employees in the year(s) ahead. Haber will cover several topics including:

  • Remote access strategies to support the remote workforce, without overloading your VPN
  • Considerations for an “endpoint privilege management” strategy to support the unavoidable cloud adoption
  • What are the key privilege access concerns you should keep in mind while expanding your remote workforce?
  • Best practices for enabling and expanding remote workforce

Morey Haber, Global CISO/CTO, BeyondTrust

Key considerations for 2021 – supporting the remote workforce and the unavoidable cloud adoption

February 10 | 10:05 - 10:30

Like many CISOs and Heads of cybersecurity in ANZ, as you head into 2021, you’ll need to solve the problem posed by the “new norm” of remote workforce and its long term impact on people, processes, technology as well as scalable security strategies to support it all.
In this special session, Morey Haber, CISO & CTO for BeyondTrust, will introduce key considerations for building a strategy that will enable your IT security department to be more efficient while effectively supporting employees in the year(s) ahead. Haber will cover several topics including:

  • Remote access strategies to support the remote workforce, without overloading your VPN
  • Considerations for an “endpoint privilege management” strategy to support the unavoidable cloud adoption
  • What are the key privilege access concerns you should keep in mind while expanding your remote workforce?
  • Best practices for enabling and expanding remote workforce

Morey Haber, Global CISO/CTO, BeyondTrust

CLAIM YOUR FREE PLACE

Speaking:

10:30

Threat management strategy – understanding the trends and creating a plan

  • Making security everyone's responsibility in the enterprise
  • Securing the code for cloud by ensuring DevSecOps is correctly implemented
  • Assessing the risks of tech trends and how to create a good threat response plan?
Bramley Maetsa, Head of DevOps Engineering, Sasol (South Africa)

Threat management strategy – understanding the trends and creating a plan

February 10 | 10:30 - 10:50

  • Making security everyone's responsibility in the enterprise
  • Securing the code for cloud by ensuring DevSecOps is correctly implemented
  • Assessing the risks of tech trends and how to create a good threat response plan?
Bramley Maetsa, Head of DevOps Engineering, Sasol (South Africa)
CLAIM YOUR FREE PLACE

Speaking:

10:50

Okta Customer Identity for simpler, more secure customer experiences

Digital is now the primary customer experience. Likewise, most workforces are committed to remaining permanently distributed. This means that any business or organisation planning for future success must ensure that its digital user experience is a wonderful one: frictionless, engaging and aligned to the brand. And, of course, it must be secure... more secure than ever. At the heart of this evolution is a modern, intelligent, flexible and scalable identity and access management system (IAM).
Okta’s presentation covers the critical considerations, the business-enabling opportunities and the latest practical insights around implementing future-proof IAM for your customers and workforce.

Leigh Doddy, Principal Sales Engineer, Okta

Okta Customer Identity for simpler, more secure customer experiences

February 10 | 10:50 - 11:15

Digital is now the primary customer experience. Likewise, most workforces are committed to remaining permanently distributed. This means that any business or organisation planning for future success must ensure that its digital user experience is a wonderful one: frictionless, engaging and aligned to the brand. And, of course, it must be secure... more secure than ever. At the heart of this evolution is a modern, intelligent, flexible and scalable identity and access management system (IAM).
Okta’s presentation covers the critical considerations, the business-enabling opportunities and the latest practical insights around implementing future-proof IAM for your customers and workforce.

Leigh Doddy, Principal Sales Engineer, Okta

CLAIM YOUR FREE PLACE

Speaking:

11:15

Strategies to minimise the impacts of cyber-attacks on your operations, customers and brand

  • How to be prepared to minimise the impacts on the company’s operations management
  • Increasing awareness and communicating to customers when managing, reporting and responding to incidents
  • Reducing risks of reputational and shareholder value loss as a result of cyber-attacks

Asaf Ahmad, CISO, Fire and Rescue NSW

Strategies to minimise the impacts of cyber-attacks on your operations, customers and brand

February 10 | 11:15 - 11:35

  • How to be prepared to minimise the impacts on the company’s operations management
  • Increasing awareness and communicating to customers when managing, reporting and responding to incidents
  • Reducing risks of reputational and shareholder value loss as a result of cyber-attacks

Asaf Ahmad, CISO, Fire and Rescue NSW

CLAIM YOUR FREE PLACE

Speaking:

11:35

How to combat fake news and disinformation being used to attack your organisation

A global cold war is being fought in cyberspace, and IT pros like you are finding themselves in the trenches. With all of this going on, how can you equip your employees and protect your networks from a malicious attack.
In this session Jacqueline Jayne, KnowBe4's Security Awareness Advocate takes a deep dive into how the technology we rely on every day is being exploited to deliver powerful disinformation, misinformation, fake news, and other malicious exploits.

  • How both facts and lies are weaponised
  • Types of delivery systems (email, social media, videos, deep fakes, and more)
  • What’s being done to address these trends
  • Tips to protect your organisation and build your human firewall

PLUS a very special guest Mr Kevin Mitnick, "The World's Most Famous Hacker" and KnowBe4's Chief Hacking Officer who will be there live to answer your questions

Jacqueline Jayne, Security Awareness Advocate, KnowBe4

How to combat fake news and disinformation being used to attack your organisation

February 10 | 11:35 - 12:00

A global cold war is being fought in cyberspace, and IT pros like you are finding themselves in the trenches. With all of this going on, how can you equip your employees and protect your networks from a malicious attack.
In this session Jacqueline Jayne, KnowBe4's Security Awareness Advocate takes a deep dive into how the technology we rely on every day is being exploited to deliver powerful disinformation, misinformation, fake news, and other malicious exploits.

  • How both facts and lies are weaponised
  • Types of delivery systems (email, social media, videos, deep fakes, and more)
  • What’s being done to address these trends
  • Tips to protect your organisation and build your human firewall

PLUS a very special guest Mr Kevin Mitnick, "The World's Most Famous Hacker" and KnowBe4's Chief Hacking Officer who will be there live to answer your questions

Jacqueline Jayne, Security Awareness Advocate, KnowBe4

CLAIM YOUR FREE PLACE

Speaking:

12:00

Exploring strategies to overcome the cybersecurity talent gap

  • Educating industries around the role of a cybersecurity executive to increase interest and attract talents
  • Benchmarking the tangible benefits of diversity and inclusion to the business
  • Assessing real-life results of your company’s training and upskilling strategies
  • Driving change by encouraging and recognising your teams’ successes and achievements

Narelle Devine, CISO, Telstra

Exploring strategies to overcome the cybersecurity talent gap

February 10 | 12:00 - 12:30

  • Educating industries around the role of a cybersecurity executive to increase interest and attract talents
  • Benchmarking the tangible benefits of diversity and inclusion to the business
  • Assessing real-life results of your company’s training and upskilling strategies
  • Driving change by encouraging and recognising your teams’ successes and achievements

Narelle Devine, CISO, Telstra

CLAIM YOUR FREE PLACE

Speaking:

12:30

KEYNOTE SPEECH: Emerging cyber threats – how prepared are we?

  • How vulnerable is Australia and NZ to cyber-attacks?
  • How could major cyber-attacks impact our societies, businesses and economies?
  • What can cross-sector organisations learn from each other and how can they work in collaboration to prevent cyber-attacks?
  • How secure are emerging technologies and what would the impact be if they get attacked?

Abigail Bradshaw, Head of the Australian Cyber Security Centre

KEYNOTE SPEECH: Emerging cyber threats – how prepared are we?

February 10 | 12:30 - 12:50

  • How vulnerable is Australia and NZ to cyber-attacks?
  • How could major cyber-attacks impact our societies, businesses and economies?
  • What can cross-sector organisations learn from each other and how can they work in collaboration to prevent cyber-attacks?
  • How secure are emerging technologies and what would the impact be if they get attacked?

Abigail Bradshaw, Head of the Australian Cyber Security Centre

CLAIM YOUR FREE PLACE

Speaking:

12:50

Close of Day Two

Close of Day Two

February 10 | 12:50

CLAIM YOUR FREE PLACE

Speaking:

Terms & Conditions

The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.

Disclosure of your information

You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:

- Business partners
- Suppliers
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Brella or Webinar.net.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing inquiries@coriniumintel.com

Data protection

The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at info@coriniumintel.com