-
Main Conference
-
08:30
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
09:00
Chair’s Welcome Address
Chirag Joshi - Founder & CISO - 7 Rules Cyber
-
9:10
Speed Networking | Making new connections!
In this 10-minute networking session, the goal is to connect with three new people. Let the questions on the screen spark your conversation. Enjoy the opportunity to expand your network!
-
09:20
Keynote Presentation
Unlocking the Blueprint: 2023–2030 Australian Cyber Security StrategyLieutenant General Michelle McGuinness - National Cyber Security Coordinator - Department of Home Affairs
-
09:50
Panel Discussion
Elevating Cyber Security from a Technical Concern to a Strategic Asset- Fostering engagement and awareness across all departments, transcending traditional IT boundaries, and emphasising the importance of cyber hygiene.
- Understanding organisational thought patterns, conversations, and behaviour concerning risk, to tailor awareness and education strategies for a security-conscious culture alignment.
- Integrating cyber security into the organisational journey positioning as a strategic asset rather than a mere compliance requirement
Moderator:
Gaurav Vikash, Head of Security & Risk, Axon
Panellists:
- Sam Mackay, CISO, NSW Department of Customer Service
- Roxanne Pashaei, CISO, NSW Rural Fire Service
- Doug Hammond, CISO, Uniting
-
10:20
NETWORKING BREAK
-
10:50
Demystifying Security Architecture
Ilya Polyakov - Chief Security Architect - NSW Department of Planning, Housing and Infrastructure
This presentation will cover the Security Architecture function including:
- Why is it important?
- Several misconceptions about what security architects do.
- 3 important jobs of security architect and how they differ.
- Making it easy and fast for business.
-
11:20
Securing Microsoft Co-Pilot: Preventing Prompt-Hacking and Data Exposure with Varonis
Scott Leach - VP APAC - Varonis
During this session, we'll show you just how easily your company's sensitive data can be exposed using Microsoft Copilot with simple prompts. We will share practical steps and strategies to ensure a secure Microsoft Copilot rollout and prevent prompt-hacking data exposure.
-
11:50
Panel Discussion
Invest Smart, Secure Smart: Maximising the Value through Strategic Resource Allocation- Discussing the significance of conducting risk assessments to identify critical assets and allocate limited resources judiciously, focusing on high-value targets.
- Exploring the cost-effective use of open-source security tools and solutions, such as intrusion detection systems (IDS) and security information and event management (SIEM) platforms.
- Emphasising the role of employee training in reducing the attack surface by enhancing their knowledge of cybersecurity best practices and threat recognition.
Panellists:
- Daniel Aldam, CISO, Keolis Downer
- Derek Chen, Head of IT Security & Governance, Team Global Express
-
12:20
LUNCH
-
13:05
From Silos to Synergy: Establishing Secure IT/OT Integration for a Future-Proof Operations
Asaf Ahmad - Senior Cyber Security Governance Officer - Pacific - Schneider Electric
-
13:35
Strengthening Your Defence: Understanding Supply Chain Attacks and Third-Party Risks
Gaurav Verma - Head of IT Risk and Security - AXE Group
In this presentation, we address the critical challenges posed by supply chain attacks and third-party risks, highlighting their potential financial, reputational, and operational impacts on organisations. We delve into the anatomy of supply chain attacks, emphasising the importance of robust risk assessment, due diligence, and continuous monitoring of third-party activities. Tailored mitigation strategies, including rigorous supplier vetting and adherence to Australian security standards, are crucial for enhancing resilience against these threats. By fostering awareness and implementing proactive measures, CISOs can effectively lead their organisations in mitigating evolving supply chain risks and safeguarding against cyber threats.
-
14:05
Take Control of the Unexpected: Enhancing Cyber Incident Excellence through Comprehensive Incident Plans
Simona Dimovski - Technology & Security Expert - ex Macquarie Bank, ex Ausgrid, ex Qantas, ex AMP. etc
- Exploring practical strategies for bolstering incident response plans and advancing cybersecurity maturity.
- Emphasising the importance of post-exercise analysis to refine response processes and highlight tools like network traffic analysis for swift incident detection and response.
- Addressing clear communication protocols, including secure channels and encryption standards
- Discussing the criticality of effective incident declaration processes for compliance and offer insights into advancing organizational maturity models.
-
14:35
AFTERNOON COFFEE
-
15:05
Case Study by Commonwealth Superannuation Corporation
Empowering Conversations and Talent Growth in CybersecurityAs cybersecurity threats continue to evolve, organisations must promote cybersecurity conversations and nurture talent. Join Daminda, Sophia and Adrian from CSC as they share their experiences and insights to address these challenges. The presentations focus on empowering employees through education and communication to fortify defences and exploring innovative strategies for attracting, retaining, and nurturing cybersecurity professionals, ultimately driving organisational cyber maturity.
Speakers:
- Daminda Kumara, CISO
- Adrian Kazias, Senior Manager Cyber Defence & Resilience
- Sophia Barbour, Cyber Awareness and Intelligence Lead
-
15:35
Panel Discussion
Evaluating AI for Defender Advantage in Holistic Cyber Risk Management- Delving into the intricacies of harnessing AI for dynamic adaptive countermeasures, including threat modelling, predictive analytics, and automated incident response orchestration.
- Discussing the potential risks associated with AI in cybersecurity, such as AI-generated phishing emails and malware attacks, adversarial attacks, data poisoning, data privacy concerns, and the need for robust model explainability and interpretability.
- Channelling AI's capabilities to amplify value realisation, enrich critical processes, empower internal capacity, streamline operations, bolster the effectiveness of existing controls, and ultimately fortify the security posture amidst an ever-evolving threat panorama.
Moderator: Chirag Joshi, Founder & CISO, 7 Rules Cyber
Panellists:
- Manasseh Paradesi, CISO, Tyro Payments
- Lee Barney, GM Technology Security, TPG Telecom
-
16:05
Panel Discussion
Championing Cyber Resilience as a Boardroom Imperative to Safeguard Together- Precisely aligning cybersecurity initiatives with strategic objectives, presenting proposals within the strategic context, demonstrating business relevance, and effectively communicating their impact to the board.
- Discussing the pivotal role of CISO in guiding boards in comprehending cyber security responsibilities and fulfilling their obligations in cybersecurity governance and risk management.
- Ensuring cybersecurity at the forefront of the board's decision-making, fostering a culture of cyber risk awareness, and driving the necessary investments to strengthen your organisation’s security posture.
Moderator:
Jess Thomas, Assistant Director Cyber Security Outreach, National Office of Cyber Security Department of Home Affairs
Panellists:
- Simon Smith, CIO, Pallion
- Anna Aquilina, CISO, University of Technology Sydney
- Vishwanath Nair, Former CISO NSW Electoral Commission
- Richard Bird, CSO, Traceable
-
16:35
Chair's Closing Remarks
Chirag Joshi - Founder & CISO - 7 Rules Cyber
-
16:45
Executive Network Party
-
17:45
Close of CISO Executive Network Sydney 2024
Not Found