Day 2 | Wednesday, 31 March 2021

9:00 am - 9:45 am SGT Realizing Cyber Security Resilience

David Soldani - Chief Security Officer and Chief Technology Officer, Huawei

Enterprise IoT is here. Cyber security executives know that the identity of each connected device makes the organization just as vulnerable as the identity of each connected human. The cloud can be seen as a means to make the enterprise less vulnerable than it was in a castle-moat reality. Is it possible then that the 5G cloud could thus be used as a means to make the collective more secure? The answer might not be in the tool, but how you use it.


  • Discussing major industry concerns and requirements 
  • Understanding how concerns are being addressed by standards
  • Introducing GSMA network assurance
  • Implementing a defense in depth strategy augmented by a zero trust model
  • Bolstering supply chain and third-party security 
  • Divining an end-to-end risk management and security framework 
  • Shifting towards collectively resilient cyber security
img

David Soldani

Chief Security Officer and Chief Technology Officer
Huawei

10:00 am - 10:45 am SGT Securing & Hardening 2021 Endpoints

Joseph Carson - Chief Security Scientist (CSS) & Advisory CISO, Thycotic

In 2021 endpoints will continue to be a top target for cybercriminals. Take a journey through the mind of an Ethical Hacker, how to exploit endpoints, what you can do to reduce the risks and improve endpoint protection.

 

This session is intended to provide a few of the attack paths that adversaries use to gain control and abuse endpoints so they can laterally move onto other sensitive systems within your network. It could lead to elevating privileges to steal the keys to the kingdom and gain full domain admin access, deploy nasty harmful Ransomware to bring your business to its knees until you pay a ransom or steal sensitive company data and threaten to release it publicly or abuse it.

 

Let’s get visibility into the how so you can put the strict security controls and harden your companies endpoints. Here are just a few of the risks that organizations face from cyberattacks. It is always important to take a risk-based approach and consider which of these risks pose the biggest threat to your business, employees, and customers:

  • Malware
  • Financial Fraud
  • Ransomware
  • Compliance Failure
  • Data Breach
  • Data Poisoning
  • Insider Threats
  • Service/Application Downtime
  • Revenue/Brand Loss
img

Joseph Carson

Chief Security Scientist (CSS) & Advisory CISO
Thycotic

11:00 am - 11:45 am SGT Threat Intelligence Case Study: A SIEM of SIEMs

Jeff Campbell - CISO, CSHub Executive Advisory Board Member, Horizon Power

When industry comes together with government through a true business case- a rising cyber security tide can indeed lift all boats. States across Australia are creating SOCs through integration with industry. Each organization is feeding actionable SIEM information through to those central SOCs so that they can then benefit from "SIEM of SIEM" integrated information. Horizon Power CISO, Jeff Campbell provides his point of view of what has been established in Western Australia, how the effort is being weaved through the greater country, lessons learned along the way and what steps should be taken next.

  • Simultaneously engaging industry, public entities and government for a collective benefit
  • Getting the organizational threat intelligence house in-order and sharing only actionable information
  • Bridging the industry together with public entities and government for collective intelligence
  • Gaining better organizational cyber security through receiving that holistic intelligence 
  • Understanding lessons learned from the two-year engagement
  • Realizing next steps from here
img

Jeff Campbell

CISO, CSHub Executive Advisory Board Member
Horizon Power