<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

 

CISO Logo (23)

CLAIM YOUR FREE PLACE

REQUEST THE SPONSORSHIP PROSPECTUS

Tuesday - 13 July
10:00

KEYNOTE PANEL: How vulnerable is our critical infrastructure to emerging cyber threats?

  • How could major cyber-attacks impact our societies, businesses and economies?
  • What can cross-sector organisations learn from each other and how can they work in collaboration to prevent cyber-attacks?
  • How secure are emerging technologies and what would the impact be if they get attacked?

Speaking:

Phillip Kowalick

President, AIPIO

Varun Acharya

Head of Cyber Security, Threat Intelligence and Security Operations, Healthscope

Andrew Latham

Senior Regional Solutions Architect, Illumio

KEYNOTE PANEL: How vulnerable is our critical infrastructure to emerging cyber threats?

July 13 | 10:00 - 10:41

  • How could major cyber-attacks impact our societies, businesses and economies?
  • What can cross-sector organisations learn from each other and how can they work in collaboration to prevent cyber-attacks?
  • How secure are emerging technologies and what would the impact be if they get attacked?
CLAIM YOUR FREE PLACE

Speaking:

10:41

Mitigating real world damage from a cyber-threat

  • How to keep OT and CI safe, secure, compliant and available focusing on questions the boards can ask to assess progress
  • The impact on critical infrastructure
  • Strategies that can help reduce business risk
  • Keeping it simple using security hygiene

Speaking:

Corne Mare

CISO, Fortinet

Andrew Sheedy

Director Operational Technology Strategy, Fortinet

Glenn Maiden

Director Threat Intelligence, Fortinet

Mitigating real world damage from a cyber-threat

July 13 | 10:41 - 11:06

  • How to keep OT and CI safe, secure, compliant and available focusing on questions the boards can ask to assess progress
  • The impact on critical infrastructure
  • Strategies that can help reduce business risk
  • Keeping it simple using security hygiene
CLAIM YOUR FREE PLACE

Speaking:

11:06

How to be strategic with cyber risks

  • Understanding cyber risks in a quantifiable way
  • How to demonstrate the value of risks to the executive management
  • Exploring efficient ways of managing risks

Speaking:

John Ellis

CISO, BUPA

How to be strategic with cyber risks

July 13 | 11:06 - 11:30

  • Understanding cyber risks in a quantifiable way
  • How to demonstrate the value of risks to the executive management
  • Exploring efficient ways of managing risks
CLAIM YOUR FREE PLACE

Speaking:

11:30

Go beyond compliance with your critical operational technology

Today’s critical infrastructure is a prime target for cyber criminals. As operational technology (OT) becomes more connected, the growing number of devices and endpoints offer a larger attack surface and create more vulnerabilities. Securing this space is no easy task but there is an opportunity to go beyond minimum compliance requirements and improve your overall security posture. This session will cover:

  • How the convergence of OT and IT affects your overall organisational cybersecurity
  • What you need to consider in your security planning
  • How to improve your visibility of vulnerabilities in a complex, converged environment, and enhance incident detection and response.

Speaking:

Neil Campbell

Vice President, Asia Pacific and Japan, Rapid7

Go beyond compliance with your critical operational technology

July 13 | 11:30 - 11:44

Today’s critical infrastructure is a prime target for cyber criminals. As operational technology (OT) becomes more connected, the growing number of devices and endpoints offer a larger attack surface and create more vulnerabilities. Securing this space is no easy task but there is an opportunity to go beyond minimum compliance requirements and improve your overall security posture. This session will cover:

  • How the convergence of OT and IT affects your overall organisational cybersecurity
  • What you need to consider in your security planning
  • How to improve your visibility of vulnerabilities in a complex, converged environment, and enhance incident detection and response.
CLAIM YOUR FREE PLACE

Speaking:

11:44

Incorporating cybersecurity into the broader risk management structure

  • Creating efficient risk assessment, monitoring and response processes
  • Refining the enterprise’s risk metrics to identify hidden and complex exploit points
  • Improving cyber risk management performance through effective governance

Speaking:

Charlotte Mills

Chief Services Officer and Chief Risk Officer, Victorian Managed Insurance Authority

Incorporating cybersecurity into the broader risk management structure

July 13 | 11:44 - 12:02

  • Creating efficient risk assessment, monitoring and response processes
  • Refining the enterprise’s risk metrics to identify hidden and complex exploit points
  • Improving cyber risk management performance through effective governance
CLAIM YOUR FREE PLACE

Speaking:

12:02

Hybrid IT 2021 and beyond: post-pandemic strategies

COVID-19 accelerated IT whether you were ready or not. With the rapid increase in remote work and business digitalization, tech leaders must future-proof their stack while ensuring management efficacy and security. In this presentation, Frederico will talk through the effects of the pandemic over organisations with complex Hybrid IT and multi-cloud environments and present IT strategies for long-term success in the new normal.

Speaking:

Frederico Hakamine

Group Product Marketing Manager, Okta

Hybrid IT 2021 and beyond: post-pandemic strategies

July 13 | 12:02 - 12:24

COVID-19 accelerated IT whether you were ready or not. With the rapid increase in remote work and business digitalization, tech leaders must future-proof their stack while ensuring management efficacy and security. In this presentation, Frederico will talk through the effects of the pandemic over organisations with complex Hybrid IT and multi-cloud environments and present IT strategies for long-term success in the new normal.

CLAIM YOUR FREE PLACE

Speaking:

12:24

Break

Break

July 13 | 12:24 - 12:34

CLAIM YOUR FREE PLACE

Speaking:

12:34

An overview of cyber security threats to Industrial Control Systems and Critical Infrastructure

Industrial control systems (ICS) form the backbone supporting essential industries including electricity, gas, water and waste services, construction, agriculture, mining, manufacturing, transport, postal, and warehousing sectors. These industries not only significantly contribute to the Australian economy, but also support several other industries such as healthcare and tourism. Due to the criticality to everyday life and economy, ICS are usually considered by many as ‘critical infrastructure’. In this talk, I will cover the main threats critical infrastructure stakeholders are experiencing, and describe possible approaches to countering them. I will also demonstrate some recent works focusing on detecting these threats. I will also introduce the work conducted at the UQ Industry 4.0 Energy TestLab, a digital twin funded by the Australian Government’s Department of Industry, Science, Energy and Resources, UQ, and Siemens, with realistic scenarios supplied by several industry partners mimicking energy production and consumption, manufacturing and a wide range of control automation configurations.

Speaking:

Ryan Ko

Chair and Director of Cyber Security, University of Queensland

An overview of cyber security threats to Industrial Control Systems and Critical Infrastructure

July 13 | 12:34 - 13:03

Industrial control systems (ICS) form the backbone supporting essential industries including electricity, gas, water and waste services, construction, agriculture, mining, manufacturing, transport, postal, and warehousing sectors. These industries not only significantly contribute to the Australian economy, but also support several other industries such as healthcare and tourism. Due to the criticality to everyday life and economy, ICS are usually considered by many as ‘critical infrastructure’. In this talk, I will cover the main threats critical infrastructure stakeholders are experiencing, and describe possible approaches to countering them. I will also demonstrate some recent works focusing on detecting these threats. I will also introduce the work conducted at the UQ Industry 4.0 Energy TestLab, a digital twin funded by the Australian Government’s Department of Industry, Science, Energy and Resources, UQ, and Siemens, with realistic scenarios supplied by several industry partners mimicking energy production and consumption, manufacturing and a wide range of control automation configurations.

CLAIM YOUR FREE PLACE

Speaking:

1:03

Life on the frontlines: The CDC story and embracing the future of work with confidence

Ransomware and other significant cyber breaches over the last year demonstrate weaknesses in the current state of our cybersecurity. For critical infrastructure this is an excellent opportunity for those that understand the challenges to make a shift and implement the cybersecurity capabilities necessary to protect and defend their organisations. 

  • With more people working remotely, users and workflows are changing. Continuing to backhaul traffic to the data center is inefficient and costly, and forcing users onto VPN is slow and frustrating.
  • Legacy architectures are expensive, complex to manage, and inhibit productivity and business agility
  • Leveraging modern cyber security solutions, incorporating zero trust, allow organisations to enable digital transformation while enhancing security 
  • The Centre for Disease Control and Prevention (CDC) started leveraging cloud technologies in 2019, to support important initiatives while keeping up with evolving threats. Hear the CDC story.

Speaking:

Danny Connelly

CISO, AMS and Public Sector, Zscaler

Life on the frontlines: The CDC story and embracing the future of work with confidence

July 13 | 13:03 - 13:16

Ransomware and other significant cyber breaches over the last year demonstrate weaknesses in the current state of our cybersecurity. For critical infrastructure this is an excellent opportunity for those that understand the challenges to make a shift and implement the cybersecurity capabilities necessary to protect and defend their organisations. 

  • With more people working remotely, users and workflows are changing. Continuing to backhaul traffic to the data center is inefficient and costly, and forcing users onto VPN is slow and frustrating.
  • Legacy architectures are expensive, complex to manage, and inhibit productivity and business agility
  • Leveraging modern cyber security solutions, incorporating zero trust, allow organisations to enable digital transformation while enhancing security 
  • The Centre for Disease Control and Prevention (CDC) started leveraging cloud technologies in 2019, to support important initiatives while keeping up with evolving threats. Hear the CDC story.
CLAIM YOUR FREE PLACE

Speaking:

1:16

PANEL: Leading in crisis – all you need to know when creating incident response plans

Sophisticated hackers are often attacking silently, making it harder for organisations to realise that they’ve suffered a breach. Ensuring your company has an effective threat management and incident response plan is more critical now than ever before. During this session, we will explore effective strategies to implement successful detection, response and recovery plans.

Speaking:

Kostas Kyrifidis

President, Victorian Security Institute

Daisy Wong

Cyber Culture & Engagement Lead, Department of Premier and Cabinet (VIC)

Ron Gauci

Chief Executive Officer, AIIA

Lech Janczewski

Associate Professor, Information Security, The University of Auckland

PANEL: Leading in crisis – all you need to know when creating incident response plans

July 13 | 13:16 - 13:50

Sophisticated hackers are often attacking silently, making it harder for organisations to realise that they’ve suffered a breach. Ensuring your company has an effective threat management and incident response plan is more critical now than ever before. During this session, we will explore effective strategies to implement successful detection, response and recovery plans.

CLAIM YOUR FREE PLACE

Speaking:

1:50

Reducing inside threats, risks and human errors by understanding criminals’ behavior

  • Exploring how the hackers think to reduce targeted cyber-attacks as a result of human errors
  • Strategies to protect the data your workforce has access to
  • Improving visibility of risky behaviour to minimise inside threats
  • Assessing the benefits of people-based threat intelligence

Speaking:

Amanda White

Head of ICT and Digital, Taylor Pass Honey Co

Reducing inside threats, risks and human errors by understanding criminals’ behavior

July 13 | 13:50 - 14:09

  • Exploring how the hackers think to reduce targeted cyber-attacks as a result of human errors
  • Strategies to protect the data your workforce has access to
  • Improving visibility of risky behaviour to minimise inside threats
  • Assessing the benefits of people-based threat intelligence
CLAIM YOUR FREE PLACE

Speaking:

2:09

New information security focus: IOT systems

In recent years we witness mass use of micro controllers (i.e. microchips) acting as sensors (or actuators). These chips are almost always part are part of a network, called Internet of Things (IOT). Micro controllers could be remotely modified to produce false data or take unauthorized actions. There is an urgent need to incorporate that reality to the design and run of digital networks.

Speaking:

Lech Janczewski

Associate Professor, Information Security, The University of Auckland

New information security focus: IOT systems

July 13 | 14:09 - 14:36

In recent years we witness mass use of micro controllers (i.e. microchips) acting as sensors (or actuators). These chips are almost always part are part of a network, called Internet of Things (IOT). Micro controllers could be remotely modified to produce false data or take unauthorized actions. There is an urgent need to incorporate that reality to the design and run of digital networks.

CLAIM YOUR FREE PLACE

Speaking:

2:40

Close of the Event

Close of the Event

July 13 | 14:40 - 14:45

CLAIM YOUR FREE PLACE

Speaking:

Terms & Conditions

The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.

Disclosure of your information

You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:

- Business partners
- Suppliers
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Brella or Webinar.net.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing inquiries@coriniumintel.com

Data protection

The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at info@coriniumintel.com