Getting Digital Ready: Maturing Cyber Security Strategies, Policies, Capabilities & Culture For The Cloud-Centric Enterprise

16 February 2021
9:00 AM - 12:50 PM (AEDT) | Free to Attend

Virtual Summit Day One: 16th February, 2021

9:00 am - 9:10 am Opening Remarks

2021 and beyond requires a foundational change to how a cyber leader views their threatscape, engages the business and architects their processes for a secure cyber future. In this session, hear a panel of cyber execs opine on how exactly they are doing this to drive a future-proof cyber security function that enables sustainable business innovation moving forward. They will share views around:

• What changes do you anticipate in your threatscape over the next 5 years?

• What is the top challenge you are focused on addressing at your organisation?

• How do you envision your cyber security set up needing to change to support more proactivity into the future?

• What approaches are you using to improve top-down understanding and ownership of cyber-safe practices?

img

Marc Rogers

Vice President of Cyber Security
Okta

img

Asaf Ahmad

Chief Information Security Officer
Fire & Rescue NSW

img

Braam Broodryk

Head of Information Security Strategy
Transgrid

img

Matthew Lange

Head of Cyber Security Strategy, Architecture & Delivery
Australia Post

9:55 am - 10:25 am Changing Cyber Landscapes: The Battle of Algorithms

Jarryd Pagonis - Commercial Director, Darktrace

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes. 

In this session, learn about: 

·        Paradigm shifts in the cyber landscape 

·        Advancements in offensive AI attack techniques 

·        The Immune System Approach to cyber security and defensive, Autonomous Response capabilities 

·        Real-world examples of emerging threats that were stopped with Cyber AI 

img

Jarryd Pagonis

Commercial Director
Darktrace

Most organisations are well into their journey towards cloud, and are enjoying the advantages that cloud brings to business. We hear so much about ransomware and high profile product vulnerabilities that the challenge in securing cloud operations has almost become lost in the noise.


However cloud-derived breaches are some of the most high profile, and some of the most devastating in history. As cloud strategies evolve to meet contemporary realities like SDWAN and distributed workforces, the edge is likely to become one of our riskiest areas.

img

Corne Mare

Director of Security Solutions
Fortinet

img

Glenn Maiden

Director of Threat Intelligence
Fortiguard Labs Australia

11:00 am - 11:20 am Break

11:20 am - 11:50 am MinterEllison Case Study: Maximising Infosec ROI Through User Centricity and Automation To Manage Increasing Non-Standard Behaviours & Environments Across 2500 Staff

Sunil Saale - Head of Cyber & Information Security, MinterEllison

At MinterEllison, APAC’s largest law firm, Sunil’s working hard to ensure his cyber team is maximising security outcomes in a truly responsive manner whilst managing skillset constraints that challenge the infosec community globally. Add to these challenges a remote workforce with personal networks, disparate practices and ultimately a larger, complex threatscape generating approx. 2 billion events per month. In this session, learn how Sunil is leading his team for success by:

• Using foundations of user-centricity to increase security “barriers” without impacting staff outcomes and productivity

• Increasing the scope for automation to support resource shortages and improve infosec & cyber proactivity

• Overcoming challenges with improving staff awareness and behaviours around cyber risks

img

Sunil Saale

Head of Cyber & Information Security
MinterEllison

11:55 am - 12:25 pm EDR or XDR or MDR: Which Is Right for Your Organisation?

Phil Dimitriu - APJ Director Systems Engineering & Professional Services, Sophos

Historically, cybersecurity has focused on protection, preventing threats exploiting weaknesses within an organization. This is changing as organisations accept that due to gaps in defences allied with the attack's sophistication, threats will enter your organization and often remain undetected for weeks or months, exfiltrating data and moving across your assets. Businesses are increasingly focusing on threat detection and response to address this risk.


In this ever-evolving landscape, it is imperative to understand the right threat detection and response approach for your organisation; is it the Endpoint Detection and Response (EDR), or Extended Detection and Response (XDR) or Managed Detection and Response (MDR), and what are next-generation defences required. 

 

The session will discuss: 

 

  • The need and benefits of threat detection and response
  • Factors to consider and evaluate an appropriate approach to threat detection and response
  • Achieving operational efficiency while raising your security posture
img

Phil Dimitriu

APJ Director Systems Engineering & Professional Services
Sophos

12:30 pm - 1:00 pm BHP Case Study: Automating Unstructured Data Security & Loss Prevention Outcomes Across Internal & Third-Party Infrastructure Through Cyber Technology Integration & Cultural Transformation

Mathieu Lahierre - Principal, Application & Data Security, BHP

A robust data security strategy and capability is a perquisite for secure operations in a cloud-first future. At BHP, Mathieu has been leading the charge to bring more automation into how the organisation classifies, encrypts and protects data across internal and third party environments and overcomes challenges with securing endpoints sitting outside of the organisation’s network without impeding on the user experience. In this session, he’ll showcase the remarkable work done over the last 3 years around:

• Developing a solid, integrated foundation of security solutions for full control over data across internal and third-party environments

• Balancing confidentiality, availability, and business viability, from policy and appropriate access standpoints

• Taking staff through a cultural transformation journey to bring maturity into secure practices adoption

• Using DLP tools as a safety net rather than a blocker for user experience

img

Mathieu Lahierre

Principal, Application & Data Security
BHP

1:00 pm - 1:10 pm Closing Remarks and End of Day