Event Overview
Organisations across the globe have been forced to adapt in an ever changing post-pandemic climate. As we now look at the pandemic in our rear view mirror, we steadily approach a merit of new challenges in 2023. We stare in the face of economic uncertainty, cyber security threats and budget adjustments globally. Now more than ever, digital transformation, customer retention & security strategies are the main business focuses as we move into a year full of disruption and change. CIO's & CISO's are being urged to ensure a zero trust approach remains one of the key focus points for their organisations security strategy moving forward.
​
Join us at this months IT & Security Executive ANZ Event, as we get together to discuss:
​
-
The importance of a zero trust approach in uncertain and unstable times
- Implementing an effective security strategy to optimise growth and performance
-
Explore expert practices to enable business progress through secure innovation
-
Learning from 2022 and building an optimised security program for 2023
Agenda
8:30am - 9:10am
Registration
Registration & welcome coffee
9:10am - 9:15am
Start
Welcome address & introduction
9:15am - 9:40am
Partner
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
In 2023, Most organizations understand the basic concept of Zero Trust as granting access only after verifying identity and context continuously. However, confusion remains on where and how to implement. Businesses can start with simpler steps and invest in a composable, internet-native architecture to layer them over time for meaningful progress and internal buy-in. Join us to discuss this in addition to “quick wins” like: • Enforcing strong Zero Trust policies and multifactor authentication for critical applications. • Areas not always included in the Zero Trust conversation, like email and DNS. • More advanced steps like scanning SaaS apps via CASB, inspecting content via a Secure Web Gateway, or expanding strong MFA or ZTNA to all your apps.
Partner
Speaker
Moutasem Khater
Principal Solutions Engineer
Cloudflare
9:40am - 10:05am
Keynote
Digital innovation vs security - the paradoxical effect of securing IT environments while driving value through innovation
Security may be #1 on every CIO's agenda in 2023, however, CIO's must continue driving value through transformation and innovation. Newpath's Chief Innovation Officer, Ben Dexter, offers insight into how enterprises are tackling security governance without inhibiting technology advancements.
Speaker
Ben Dexter
Chief Innovation Officer
Newpath
10:05am - 10:30am
Partner
Responding to Ransomware - Tools to Build Your Threat Defense Architecture
Organizations are increasingly at risk from skillful attackers and potent cyberthreats. The cost of cyberattacks could go beyond millions of dollars to fix breaches. The potential breach of secure data, loss of intellectual and personnel data, and extreme remediation also come at a high price. This session explores:
-
The rise and the evolution of ransomware attack
-
How modern data protection capabilities can enhance an organization's security posture
-
Building a Threat Defence Architecture that brings SecOps and IT Ops together.
Partner
Speaker
Alexander Tso
Senior Systems Engineer
Cohesity
10:30am - 11:00am
Break
Morning Tea
11:00am - 11:25am
Partner
How prepared are you for a significant Cyber Security Incident?
Organizations are increasingly at risk from skillful attackers and potent cyberthreats. The cost of cyberattacks could go beyond millions of dollars to fix breaches. The potential breach of secure data, loss of intellectual and personnel data, and extreme remediation also come at a high price. This session explores:
-
The rise and the evolution of ransomware attack
-
How modern data protection capabilities can enhance an organization's security posture
-
Building a Threat Defence Architecture that brings SecOps and IT Ops together.
Partner
Speaker
Louise Hanna
Managing Consultant, Security Advisory Tesserent
11:25am - 11:50am
Keynote
A Threat centric approach to Cyber Security
Cybersecurity fundamentally boils down to one thing- the protection of systems (whether they are physical, digital or social) from loss, disclosure, disruption, theft, unauthorised access, modification and a raft of other concerns that impact organisations or our environments at large. We can keep buying technologies that have some marginal impact, employ unnecessarily large spreadsheets that absorb time and effort, or perhaps we can return to a first principles review to break down the problem. Threat centric approaches to cyber security return us to the problem at hand as opposed to an emphasis on solutions being fixated on threats or problems that don't exist. I wanted to take audiences through some of the criticisms I have with how we as an industry are engaging, and give attendees some tools and techniques to reorientate their thinking.
Speaker
Edward Farrell
(ISC)² - Board Member
Mercury - Director & Principal Consultant
HackHunter - Advisor
11:50am - 12:15pm
Partner
How to secure your business with the Content Cloud
Today’s companies need frictionless security
We all know that security is non-negotiable in today’s world. Our work is much more complex than it used to be, and organisations are facing unprecedented challenges to protect their content and maintain compliance. As technology has evolved along with the way we work, IT services have steadily moved from a centralised computing model to a highly decentralised one. Mobility, cloud services, consumer apps, and the widespread acceptance of e-signatures have all fueled the need for employees to be able to work anytime, anywhere, and from any device. In this segment we will discuss how to secure your content in the current economic climate and showcase some of Box’s latest product launches like Box Shield & Box Sign with unlimited e-signatures at no extra cost.
Partner
Speaker
Gavin Diamond
Regional Vice President
Box
12:15pm - 1:15pm
Break
Lunch & Networking Break
1:15pm - 1:40pm
Keynote
Building the Security & IT Team's to Implement Your Business Strategies
An effective cyber security operating model is essential for businesses to protect themselves against cyber threats and meet their strategic objectives. This model should encompass people, processes, and technology to create a comprehensive and holistic approach to security. To build an effective cyber security operating model, organisations must first identify their specific security risks and prioritise their resources accordingly. This may involve recruiting skilled personnel, implementing robust processes and procedures, and deploying advanced security technologies. The presentation will take the audience through how to build an effective cyber security operating model so that their organisations can protect their assets, reputation, and revenue, while also enabling growth and innovation.
Speaker
Chris Grisdale
Head Of Information Security
Hipages Group
1:40pm - 2:05pm
Keynote
Convincing CISO's & CIO's to start thinking outside the box
In today's rapidly evolving cyber threat landscape, traditional security measures are no longer enough to protect organisations. Therefore, it is important for leaders, particularly, CISO's and CIO's to start thinking outside the box and exploring unconventional security solutions. This presentation will discuss the benefits of adopting a creative and innovative approach to cybersecurity, including increased agility, adaptability, and effectiveness. It will also provide practical tips on how to effectively communicate this message to senior leadership, including the use of real-world examples and case studies. By encouraging and enabling CISO's and CIO's to step out of their comfort zones and embrace new ideas, organisations can better safeguard themselves against emerging threats.
Speaker
Gaurav Vikash
Head of Security and Risk - APAC
Axon
2:05pm - 3:05pm
Break
Cocktail & Networking Hour
3:05pm
End
Finish