Speaking:
President, AIPIO
Head of Cyber Security, Threat Intelligence and Security Operations, Healthscope
Senior Regional Solutions Architect, Illumio
July 13 | 10:00 - 10:41
Speaking:
CISO, Fortinet
Director Operational Technology Strategy, Fortinet
Director Threat Intelligence, Fortinet
July 13 | 10:41 - 11:06
Speaking:
CISO, BUPA
Today’s critical infrastructure is a prime target for cyber criminals. As operational technology (OT) becomes more connected, the growing number of devices and endpoints offer a larger attack surface and create more vulnerabilities. Securing this space is no easy task but there is an opportunity to go beyond minimum compliance requirements and improve your overall security posture. This session will cover:
Speaking:
Vice President, Asia Pacific and Japan, Rapid7
July 13 | 11:30 - 11:44
Today’s critical infrastructure is a prime target for cyber criminals. As operational technology (OT) becomes more connected, the growing number of devices and endpoints offer a larger attack surface and create more vulnerabilities. Securing this space is no easy task but there is an opportunity to go beyond minimum compliance requirements and improve your overall security posture. This session will cover:
Speaking:
Chief Services Officer and Chief Risk Officer, Victorian Managed Insurance Authority
July 13 | 11:44 - 12:02
COVID-19 accelerated IT whether you were ready or not. With the rapid increase in remote work and business digitalization, tech leaders must future-proof their stack while ensuring management efficacy and security. In this presentation, Frederico will talk through the effects of the pandemic over organisations with complex Hybrid IT and multi-cloud environments and present IT strategies for long-term success in the new normal.
Speaking:
Group Product Marketing Manager, Okta
July 13 | 12:02 - 12:24
COVID-19 accelerated IT whether you were ready or not. With the rapid increase in remote work and business digitalization, tech leaders must future-proof their stack while ensuring management efficacy and security. In this presentation, Frederico will talk through the effects of the pandemic over organisations with complex Hybrid IT and multi-cloud environments and present IT strategies for long-term success in the new normal.
Industrial control systems (ICS) form the backbone supporting essential industries including electricity, gas, water and waste services, construction, agriculture, mining, manufacturing, transport, postal, and warehousing sectors. These industries not only significantly contribute to the Australian economy, but also support several other industries such as healthcare and tourism. Due to the criticality to everyday life and economy, ICS are usually considered by many as ‘critical infrastructure’. In this talk, I will cover the main threats critical infrastructure stakeholders are experiencing, and describe possible approaches to countering them. I will also demonstrate some recent works focusing on detecting these threats. I will also introduce the work conducted at the UQ Industry 4.0 Energy TestLab, a digital twin funded by the Australian Government’s Department of Industry, Science, Energy and Resources, UQ, and Siemens, with realistic scenarios supplied by several industry partners mimicking energy production and consumption, manufacturing and a wide range of control automation configurations.
Speaking:
Chair and Director of Cyber Security, University of Queensland
July 13 | 12:34 - 13:03
Industrial control systems (ICS) form the backbone supporting essential industries including electricity, gas, water and waste services, construction, agriculture, mining, manufacturing, transport, postal, and warehousing sectors. These industries not only significantly contribute to the Australian economy, but also support several other industries such as healthcare and tourism. Due to the criticality to everyday life and economy, ICS are usually considered by many as ‘critical infrastructure’. In this talk, I will cover the main threats critical infrastructure stakeholders are experiencing, and describe possible approaches to countering them. I will also demonstrate some recent works focusing on detecting these threats. I will also introduce the work conducted at the UQ Industry 4.0 Energy TestLab, a digital twin funded by the Australian Government’s Department of Industry, Science, Energy and Resources, UQ, and Siemens, with realistic scenarios supplied by several industry partners mimicking energy production and consumption, manufacturing and a wide range of control automation configurations.
Ransomware and other significant cyber breaches over the last year demonstrate weaknesses in the current state of our cybersecurity. For critical infrastructure this is an excellent opportunity for those that understand the challenges to make a shift and implement the cybersecurity capabilities necessary to protect and defend their organisations.
Speaking:
CISO, AMS and Public Sector, Zscaler
July 13 | 13:03 - 13:16
Ransomware and other significant cyber breaches over the last year demonstrate weaknesses in the current state of our cybersecurity. For critical infrastructure this is an excellent opportunity for those that understand the challenges to make a shift and implement the cybersecurity capabilities necessary to protect and defend their organisations.
Sophisticated hackers are often attacking silently, making it harder for organisations to realise that they’ve suffered a breach. Ensuring your company has an effective threat management and incident response plan is more critical now than ever before. During this session, we will explore effective strategies to implement successful detection, response and recovery plans.
Speaking:
President, Victorian Security Institute
Cyber Culture & Engagement Lead, Department of Premier and Cabinet (VIC)
Chief Executive Officer, AIIA
Associate Professor, Information Security, The University of Auckland
July 13 | 13:16 - 13:50
Sophisticated hackers are often attacking silently, making it harder for organisations to realise that they’ve suffered a breach. Ensuring your company has an effective threat management and incident response plan is more critical now than ever before. During this session, we will explore effective strategies to implement successful detection, response and recovery plans.
Speaking:
Head of ICT and Digital, Taylor Pass Honey Co
July 13 | 13:50 - 14:09
In recent years we witness mass use of micro controllers (i.e. microchips) acting as sensors (or actuators). These chips are almost always part are part of a network, called Internet of Things (IOT). Micro controllers could be remotely modified to produce false data or take unauthorized actions. There is an urgent need to incorporate that reality to the design and run of digital networks.
Speaking:
Associate Professor, Information Security, The University of Auckland
July 13 | 14:09 - 14:36
In recent years we witness mass use of micro controllers (i.e. microchips) acting as sensors (or actuators). These chips are almost always part are part of a network, called Internet of Things (IOT). Micro controllers could be remotely modified to produce false data or take unauthorized actions. There is an urgent need to incorporate that reality to the design and run of digital networks.
Terms & Conditions
The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.
Disclosure of your information
You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:
- Business partners
- Suppliers
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Brella or Webinar.net.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing inquiries@coriniumintel.com
Data protection
The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at info@coriniumintel.com