Exchange Day Two: Wednesday, 12th August 2020

Group 2

7:30 am - 8:15 am BREAKFAST

8:15 am - 8:20 am CHAIRPERSON’S OPENING REMARKS

Rob Wiggan - CISO, Queensland University of Technology
img

Rob Wiggan

CISO
Queensland University of Technology

8:20 am - 8:50 am KEYNOTE: How to Risk-Proof Your Privileged User and Access Management Strategies

Rob Wiggan - CISO, Queensland University of Technology
  • Assessing how people are accessing data
  • Effectively managing privileged users – access management to customers’ privacy and sensitive data
  • Implementing access control to ensure only right people have access to privacy and sensitive data
  • Creating identity management systems that orchestrate with sophisticated and adaptive systems to reduce login risks and threats
  • Exploring multi factor authentication frameworks
img

Rob Wiggan

CISO
Queensland University of Technology

8:50 am - 9:30 am Bringing Incident Response and Breach Assessment Capability Into Your Business

James Pemberton - Security Lead, Hydro Tasmania
It is often said that “it’s not a matter of if but when” in relation to security breaches. With many businesses being at heightened risk how do you ensure you have the processes, people and technology in place to help you respond when the WHEN happens.

  • Developing an Incident Response Plan and integrating it into your business
  • Overview of Security Monitoring implementation (What is used and what is collected)
  • Building a Digital Forensic and Incident Response Capability internally (not just for you but for those who will come to help you)
  • Building Breach Assessment Capability
  • Training (Driving personal development, mentoring and SANS FOR508)
  • Reviewing the Results
img

James Pemberton

Security Lead
Hydro Tasmania

9:30 am - 10:30 am BrainWeave - The Future of Authentication
James Hebert - Enterprise Solutions Engineer, OneLogin
Passwords typically lead the entryway for accessing a company’s assets. However, with the increase in data breaches due to weak passwords, organisations are looking for better alternatives when it comes to authentication. Learn how modern identity platforms like OneLogin leverage the newest technologies to help organisations move away from passwords and towards a reduced password environment. Topics will include biometrics, certificate-based authentication as well as password-less authentication flows all utilising AI/ML based contextual awareness to determine the most seamless and secure user experience.
img

James Hebert

Enterprise Solutions Engineer
OneLogin

9:30 am - 10:30 am 1:1 Business Meetings

9:30 am - 10:30 am 1:1 Business Meetings

10:30 am - 11:00 am MORNING TEA & NETWORKING BREAK

We’ve all heard the adage that it’s not if it happens but when you are inevitably breached… Do you have a plan? Even a framework to go off? What do you include? Who do you include? How often should you be practicing this plan? Join our experts as they discuss incident response plans, who should be involved, best practices, and pitfalls.

img

Shafqat Mehmood

Cyber Threat Intelligence and Incident Response Manager
Australian Unity

11:30 am - 12:30 pm BrainWeave: Dealing with Third Party and Supply Chain Cybersecurity Challenges
Michael Taylor-Ford - Cyber Security Strategy and Governance Manager, IAG
Learn the best end-to-end cybersecurity implementation practices when working with third parties to ensure a truly resilient and secure supply chain network.

  • How much of your data security is really under your control?
  • What is your risk management approach towards your suppliers?
  • How much third party governance is required?
  • How to secure your network and protect your sensitive data?
img

Michael Taylor-Ford

Cyber Security Strategy and Governance Manager
IAG

11:30 am - 12:30 pm 1:1 Business Meetings

11:30 am - 12:30 pm 1:1 Business Meetings

12:30 pm - 1:30 pm LUNCH & NETWORKING BREAK

1:30 pm - 2:00 pm KEYNOTE: How to Quantify Cybersecurity Risks to the Business

Michael Collins - General Manager Information Security, HESTA
  • Strategies to measure, assess and communicate risks when stakeholders don’t understand technical terms
  • Translating cybersecurity risks to dollars’ terms
  • Assessing breaches probabilities to assess and manage cyber risks – percentage of risks versus possibly costs in dollars
  • What technologies and methodologies allow cybersecurity leaders to quantify cyber risks
img

Michael Collins

General Manager Information Security
HESTA

  • Are emerging technologies like AI & ML really the best choice?
  • What other technologies will be able to keep up with emerging threats and risks?
  • Will Zero Trust Security frameworks become essential security tools?
  • Is a ‘passwordless’ future the solution to mobile surfaces, considered the most vulnerable and fastestgrowing threat surfaces?
  • What are the short and long-term strategies for organisations to overcome the skills shortage?

img

Rob Wiggan

CISO
Queensland University of Technology

img

Shafqat Mehmood

Cyber Threat Intelligence and Incident Response Manager
Australian Unity

img

Michael Taylor-Ford

Cyber Security Strategy and Governance Manager
IAG

img

Michael Collins

General Manager Information Security
HESTA

img

Simon Dalli

Group Head of IT - Cyber Security
Target & Kmart

2:45 pm - 2:45 pm CHAIRMAN’S CLOSING REMARKS AND END OF EXCHANGE