Day Two

08:15
Welcome coffee
08:50
Opening remarks from the chair

Greg Adamson GAICD
Enterprise Fellow Cyber Security, University of Melbourne
Chair, Special interest Group on Blockchain, IEEE

COLLABORATION AND PARTNERSHIPS FOR HOLISTIC PROTECTION
09:00
Using End Point Visibility to detect and orchestrate threat mitigation
  • If you cannot see what’s going on, how can you detect a threat and know if you are secure?
  • Endpoint data is able to provide very detailed insights into the behaviour of users and application. This data can be ingested and modelled into user and entity behaviour analysis for advanced threat detection and automated response
  • Providing security operations efficiency and automation to best respond to today’s threats
     

Brett Williams
SE Director, APJ
Carbon Black

Moe Ibrahim
SE Director, APJ
Exabeam

09:30
Cyber Security to Cyber Resilience
  • Improved collaboration for more effective, holistic protection
  • Improving collaboration between SMEs and large organisations as well as industry and government
  • Sharing information both within and outside of the organisation
     

Sandra Ragg,
Head, Office of the Prime Minister’s Cyber Security Special Adviser 
Lead Cyber Resilience Taskforce, Department of Prime Minister and Cabinet

10:00
FIRESIDE CHAT: BUILDING AN EFFECTIVE THREAT MANAGEMENT ORGANISATION
  • Enabling the instantaneous sharing of information across teams to drive faster, more informed decisions
  • Reprioritising threat intelligence to ensure teams stay focused on what matters most and even anticipate and prevent attacks in the future

Moderator:

Greg Adamson
GAICD, Enterprise Fellow Cyber Security, University of Melbourne,
Chair, Special interest Group on Blockchain, IEEE

Panellists:

James Tin
Cyber Security Advisor
Akamai

Skye Wu
Lead Discovery Analyst
Telstra

10:45
Morning tea and showcase viewing
11:15
Discovering anomalies that determine business risks
  • Identifying the tools and skills needed to discover unexpected unknown risks
  • Developing Intelligence strategies that help detected cyber risks
  • Discussing the need to educate and increase awareness around security risks and threats

Skye Wu
Lead Discovery Analyst
Telstra

 

11:45
Successful cyber resilience relies on executive sponsorship and leadership
  • Strong cyber resilience requires a cultural shift within the organisation
  • How to communicate risk properly
  • Managing risk - who has a seat at the table?
     

Stuart Mort 
Director Cyber Security 
Optus

 

RISK MANAGEMENT, GOVERNANCE AND RESILIENCE
12:15
Cyber strategies to meet cyber threats
  • Emerging risk in our information society
  • Innovating risk management to meet cyber threats
  • Blockchain as both opportunity and threat
     

Greg Adamson
GAICD, Enterprise Fellow Cyber Security, University of Melbourne,
Chair, Special interest Group on Blockchain, IEEE

12:45
Lunch and showcase viewing
13:45
FUNDAMENTAL TRUTHS
  • Identifying why organisations keep getting breached despite strong investments in cyber security and compliance
  • Understanding why organisations are failing to detect and respond to security threats in a timely manner

Carlo Minassian
Founder
LMNTRIX

14:15
PANEL: Challenges with integrating risk strategies at the board level
  • Addressing the negative impacts of cyber resilience not being driven by the board
  • Tactics to explain cyber security to an executive

Moderator:

Greg Adamson
GAICD, Enterprise Fellow Cyber Security, University of Melbourne
Chair, Special interest Group on Blockchain, IEEE
 

Panellists:

Moe Ibrahim
Sales Engineering Director 
Asia Pacific Japan Exabeam

Stuart Mort 
Director Cyber Security 
Optus

Carlo Minassian
Founder
LMNTRIX

 

15:00
Afternoon tea and networking
OUTSOURCING MANAGED SERVICES AND THE AGENCY PRINCIPAL PROBLEM
15:30
The push to the cloud
  • Outsourcing security maintenance to cloud providers - pros and cons of the push to the cloud
  • Balancing the cloud with your internal structure - considering partial vs full cloud
  • Strategies and tools for the move to the cloud from small business to established organization

Mike Johnstone
Associate Professor
Edith Cowan University

16:00
Considering managed services
  • Evading the Agency Principal Problem
  • Internal vs external services
  • Understanding how an external company protects and deals with cyber threats on your behalf to protect your assets
  • Questions to ask when developing partnerships
  • The importance of continuous feedback and updates once a contract is in place
     

Sharmila Packiaraja
NT Branch Chair 
Australian Information Security Association

16:30
Closing remarks from the Chair
16:40
End of Summit