Exchange Day One: Tuesday, 11th August 2020

Group 2

7:00 am - 7:45 am BREAKFAST

7:45 am - 8:10 am REGISTRATION

8:10 am - 8:20 am CHAIRPERSON’S OPENING REMARKS

Rob Wiggan - CISO, Queensland University of Technology

img

Rob Wiggan

CISO
Queensland University of Technology

8:20 am - 8:50 am KEYNOTE: Creating a Cybersecurity Culture Across the Business

Jeff Campbell - CISO, Horizon Power
Monitoring, repelling, and responding to cyber threats while meeting compliance requirements are wellestablished duties of Chief Information Security Officers (CISOs), or their equivalents, and their teams.
That is why CISOs need to take a stronger and more strategic leadership role. Inherent to this new role is the imperative to move beyond the role of compliance monitors and enforcers to integrate better with the business, manage information risks more strategically, and work toward a culture of shared cyber risk ownership across the enterprise.

In this keynote session, Jeff will explain what he’s doing at Horizon Power to create a culture of cybersecurity.

img

Jeff Campbell

CISO
Horizon Power

8:50 am - 9:30 am SPONSOR KEYNOTE: Conquering Cyber Risk in Third Party Communications: The Enterprise Content Firewall

Jonathan Yaron - Chairman and CEO, Accellion

img

Jonathan Yaron

Chairman and CEO
Accellion

9:30 am - 11:00 am BrainWeave: Security Metrics – What is Good Enough?
Simon Dalli - Group Head of IT - Cyber Security, Target & Kmart
Cybersecurity leaders are required to predict what a good system looks like, and if what they have in place is good enough to safeguard their businesses. Without a crystal ball, most of them find out how secure their companies are only when a breach, a leak or a system compromise happens. In this session, take a deep dive into the metrics your peers are using to identify if their organisations are secure. You will also explore if these metrics are effective and, if so, how effective. How do your peers know if ‘enough’ is being met? Moreover, how are they reporting the measurements back to the board to ensure the IT and Security teams havethe necessary support from the organization as a whole?

img

Simon Dalli

Group Head of IT - Cyber Security
Target & Kmart

9:30 am - 11:00 am 1:1 Business Meetings

9:30 am - 11:00 am 1:1 Business Meetings

10:30 am - 11:00 am MORNING TEA & NETWORKING BREAK

11:00 am - 11:30 am Cybersecurity on the Frontier - Effectively Training and Engaging the Workforce

Ivana Kvesic - Head of Cyber Culture and Education, Latitude Financial Services
In this presentation, get the latest insights on how to effectively manage and scale security capabilities within an organisation. With an ever-evolving threat landscape, it has never been more important to have a robust and nimble security function. With human-factor being the leading cause of cyber-attacks, effectively training and engaging the workforce is critical. Hear how to build teams that can scale to manage these threats by educating and empowering the workforce with a focus on bringing perspectives that are more diverse into the security industry.

img

Ivana Kvesic

Head of Cyber Culture and Education
Latitude Financial Services

The modern CISO is now the point person — with a target on their back — for managing security incidents or data breaches, and reporting security program issues to the company’s board of directors. In this panel discussion, practitioners will discuss how to prepare for reporting breaches and risks to the board of directors, the importance of using transparent data, the value of knowing your audience, and tips and tricks to make board reporting a success.

img

Rob Wiggan

CISO
Queensland University of Technology

img

Jeff Campbell

CISO
Horizon Power

img

Shane Watt

CISO
NewsCorp

img

Ben Doyle

CISO Asia Pacific
Thales

12:00 pm - 1:00 pm BrainWeave: Using Robotic AI, ML & Automation to Streamline Processes and Security Operations
Shane Watt - CISO, NewsCorp
Nidhin Tamil - Head of Cyber Defense, NewsCorp
  • Overcoming the challenges of integrating security tools with processes
  • Strengthening your cyber resilience by automating routine tasks, working smarter and responding faster
  • Creating efficient security and risk assessment processes
  • Employing data consolidation and analytics to generate detailed system of record for reporting and compliance
  • How emerging technologies can help detect and prevent hidden and complex exploit processes
  • Securing and controlling endpoint access by monitoring behavioral patterns, geolocation, time of login and many other variables
img

Shane Watt

CISO
NewsCorp

img

Nidhin Tamil

Head of Cyber Defense
NewsCorp

12:00 pm - 1:00 pm 1:1 Business Meetings

12:00 pm - 1:00 pm 1:1 Business Meetings

1:00 pm - 2:00 pm LUNCH & NETWORKING BREAK

2:00 pm - 2:30 pm The Convergence of Physical and Cybersecurity

Ben Doyle - CISO Asia Pacific, Thales
The popularity of IoT devices for physical security creates an entirely new set of vulnerabilities that hackers use to exploit systems. These new security devices are a liability. If they’re implemented properly, with the combination of physical and cybersecurity, they can be a security benefit to an organization. 

Convergence prevents physical and information security teams from seeing vulnerabilities from only one perspective, improving response rates to incidents that straddle real-world and IT-based systems. Convergence strengthens an organisation’s defenses against escalating threats.

In this session, hear how a holistic view of security will better prepare your organisation against tomorrow’s bad actors and threats.
img

Ben Doyle

CISO Asia Pacific
Thales

2:30 pm - 3:00 pm BrainWeave: Reserved for sponsor

2:30 pm - 3:00 pm 1:1 Business Meetings

2:30 pm - 3:00 pm 1:1 Business Meetings

3:00 pm - 4:00 pm AFTERNOON TEA & NETWORKING BREAK

4:00 pm - 4:30 pm Cloud Security: Stepping into the Cloud with Confidence

Venkat Balakrishnan - Head of Cyber Strategy & Threat Management, TAL Life
This presentation will discuss the evolving threat landscape that applies to enterprises as they shift to cloudbased infrastructures and direct-to-internet architectures. We will look at how security solutions must adapt to this by changing the enforcement points and providing ubiquitous control and visibility.

img

Venkat Balakrishnan

Head of Cyber Strategy & Threat Management
TAL Life

4:30 pm - 5:30 pm Lessons Learnt from a Cyber Breach
Ian McKenzie - CISO, Australian Parliament
In 2019 the Prime Minister announced that the Australian Federal Parliament had been the target of a cyber-breach perpetrated by a sophisticated state-sponsored actor.

The Chief information Security Officer from the Parliament will walk through the chain of events and will detail the lessons learnt in detecting and responding to a major cyber incident.
 
The session will detail what worked well and what was learnt as the situation unfolded. The session will provide practical advice for those organisations that in some point in the future may find themselves dealing with a significant cyber incident.

img

Ian McKenzie

CISO
Australian Parliament

4:30 pm - 5:30 pm 1:1 Business Meetings

4:30 pm - 5:30 pm 1:1 Business Meetings

5:30 pm - 6:30 pm NETWORKING DRINKS

6:30 pm - 6:30 pm GROUP SIT-DOWN DINNER