10 - 12 August, 2020 | Mercure Resort Gold Coast

Conference Day Two: Wednesday, 12th August 2020

7:30 am - 8:15 am BREAKFAST

8:15 am - 8:20 am CHAIRPERSON’S OPENING REMARKS

8:20 am - 8:50 am KEYNOTE: How to Risk-Proof Your Privileged User and Access Management Strategies

  • Assessing how people are accessing data
  • Effectively managing privileged users – access management to customers’ privacy and sensitive data
  • Implementing access control to ensure only right people have access to privacy and sensitive data
  • Creating identity management systems that orchestrate with sophisticated and adaptive systems to reduce login risks and threats
  • Exploring multi factor authentication frameworks

8:50 am - 9:30 am Bringing Incident Response and Breach Assessment Capability Into Your Business

James Pemberton - Security Lead, Hydro Tasmania
It is often said that “it’s not a matter of if but when” in relation to security breaches. With many businesses being at heightened risk how do you ensure you have the processes, people and technology in place to help you respond when the WHEN happens.

  • Developing an Incident Response Plan and integrating it into your business
  • Overview of Security Monitoring implementation (What is used and what is collected)
  • Building a Digital Forensic and Incident Response Capability internally (not just for you but for those who will come to help you)
  • Building Breach Assessment Capability
  • Training (Driving personal development, mentoring and SANS FOR508)
  • Reviewing the Results
img

James Pemberton

Security Lead
Hydro Tasmania

9:30 am - 10:30 am BrainWeave: Reserved for sponsor

9:30 am - 10:30 am 1:1 Business Meetings

9:30 am - 10:30 am 1:1 Business Meetings

10:30 am - 11:00 am MORNING TEA & NETWORKING BREAK

We’ve all heard the adage that it’s not if it happens but when you are inevitably breached… Do you have a plan? Even a framework to go off? What do you include? Who do you include? How often should you be practicing this plan? Join our experts as they discuss incident response plans, who should be involved, best practices, and pitfalls.

img

Shafqat Mehmood

Cyber Threat Intelligence and Incident Response Manager
Australian Unity

11:30 am - 12:30 pm BrainWeave: Dealing with Third Party and Supply Chain Cybersecurity Challenges
Bianca Wirth - Cyber Security Strategy and Governance Manager, IAG
Learn the best end-to-end cybersecurity implementation practices when working with third parties to ensure a truly resilient and secure supply chain network.

  • How much of your data security is really under your control?
  • What is your risk management approach towards your suppliers?
  • How much third party governance is required?
  • How to secure your network and protect your sensitive data?
img

Bianca Wirth

Cyber Security Strategy and Governance Manager
IAG

11:30 am - 12:30 pm 1:1 Business Meetings

11:30 am - 12:30 pm 1:1 Business Meetings

12:30 pm - 1:30 pm LUNCH & NETWORKING BREAK

1:30 pm - 2:00 pm KEYNOTE: How to Quantify Cybersecurity Risks to the Business

Michael Collins - General Manager Information Security, HESTA
  • Strategies to measure, assess and communicate risks when stakeholders don’t understand technical terms
  • Translating cybersecurity risks to dollars’ terms
  • Assessing breaches probabilities to assess and manage cyber risks – percentage of risks versus possibly costs in dollars
  • What technologies and methodologies allow cybersecurity leaders to quantify cyber risks
img

Michael Collins

General Manager Information Security
HESTA

  • Are emerging technologies like AI & ML really the best choice?
  • What other technologies will be able to keep up with emerging threats and risks?
  • Will Zero Trust Security frameworks become essential security tools?
  • Is a ‘passwordless’ future the solution to mobile surfaces, considered the most vulnerable and fastestgrowing threat surfaces?
  • What are the short and long-term strategies for organisations to overcome the skills shortage?

img

Shafqat Mehmood

Cyber Threat Intelligence and Incident Response Manager
Australian Unity

img

Bianca Wirth

Cyber Security Strategy and Governance Manager
IAG

img

Michael Collins

General Manager Information Security
HESTA

img

Simon Dalli

Group Head of IT - Cyber Security
Target & Kmart

2:45 pm - 2:45 pm CHAIRMAN’S CLOSING REMARKS AND END OF EXCHANGE