Join us at the 16th CIO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT professionals on the
2nd May 2023, Hilton Hotel, Sydney
Join us at the 16th CIO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT professionals on the
2nd May 2023, Hilton Hotel, Sydney
Summit Themes Key themes and topics are developed by our
standing committee and advisory board from
the country's most respected IT Leaders.
These will be addressed over the course
of the CIO Leaders Summit Australia.

 

Mobility

 

Cloud

 

Analytics

 

Cyber Security

 

Big Data

 

IT as a Service

 

Digital

 

Virtualisation

Join us at the 16th CIO Leaders
Australia Summit

BE PART OF THIS YEAR’S UPCOMING GATHERING
WHERE YOU WILL BE ABLE TO ENGAGE WITH
THE COUNTRY’S LEADING IT PROFESSIONALS ON THE
2nd May 2023, Hilton Hotel,
Sydney

Join the gathering

ABOUT THE EVENT

The 16th CIO Leaders Australia Summit, Sydney will take place on the 2nd of May 2023 at the Hilton Hotel in Sydney. The Summit will once again become THE MEETING PLACE for more than 150 of the country’s leading CIOs, Heads of IT, IT Directors and Technology Leaders and provide unrivalled networking opportunities.

This year’s Summit theme will look at 'Thriving In A Data-Driven Digital World' and this message will be delivered via a number of keynotes, workshops and targeted roundtables discussions taking place throughout day.

Attendees will have the opportunity to personalise their own agenda and maximise their time out of the office by engaging in only the most relevant sessions for their business.

Our networking drinks function will provide the chance to interact face to face with peers in a very relaxed setting.

Whilst we are all adjusting to the ‘new norm' and adapting to the challenges and opportunities that COVID-19 brought for us all, we are committed to deliver a great event in a well-managed and safe environment.

We have introduced new event protocols to safeguard the health and wellbeing of all our sponsors, attendees and staff whilst continuing to deliver strong opportunities and engagements.

You can download our Safe Event Guidelines here

SPEAKERS

Narelle Devine CSM
plus

Narelle Devine CSM

Chief Information Security Officer Asia Pacific, Telstra

Chris Bezuidenhout
plus

Chris Bezuidenhout

Managing Director, CIB CIO APAC & Emerging Markets, Deutsche Bank AG

Iain Hart
plus

Iain Hart

Head of Technology & CISO, The Australian Institute of Company Directors

Christopher Johnson
plus

Christopher Johnson

Head of Group Technology, Charter Hall

REGISTER YOUR INTEREST

PROGRAM

The summit program is a draft and is subject to change.

Registration, Badge Collection & Refreshments

30min

Master of Ceremonies, Main Plenary

Andrew Milroy, Chief Research Advisor, Focus Network
CISO Track   
Anthony Caruana, Chief Executive Officer, Media-Wize
CIO Track   

15min

Andrew Milroy

Andrew Milroy is Focus Network’s Chief Research Advisor. He is a well-known technology thought leader and speaker in the APAC region. He has [...]

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Opening Keynote Presentation – Building resiliency and adaptability in a post Covid work place

Mary-Beth Hosking, Chief Information Officer, PointsBet

Join Mary-Beth as she takes you on her own journey From Singer to CIO – A story of resiliency, transformation and recognising your value. As leaders, you must learn to respond and adapt to the challenges you face, and build resilience to help you bounce back in times of pressure.

In a post Covid world, leaders must build strategies to increase resiliency in the face of uncertainty, embrace an adaptive mindset to respond in times of adversity and provide guidance and strength in an ever-changing work environment.


30min

Mary-Beth Hosking

Mary-Beth Hosking is a pragmatic and seasoned technology leader with extensive experience in organisational transformations. Mary-Beth published [...]

Keynote Panel Discussion – Building a resilient data driven enterprise

Panellists:

Fahad Najeeb, Head of Data Platforms and Engineering, Latitude Financial Services
Khurram Waheed, Principal Security Architect, ExtraHop
Indika Delpachitra, Associate Director, National Australia Bank
Moderator:
Andrew Milroy, Chief Research Advisor, Focus Network
For today’s businesses, success means being data-driven. Generating value from vast amounts of data, engendering innovation and having agile and scalable business models necessitates the use of cloud technologies wherever possible. But adoption of new technologies creates risk which must be managed. Cybersecurity postures need to be transformed to ensure that enterprises have visibility across expanded attack surfaces and are able to minimize the damage caused by breaches. This session will discuss accelerated adoption of new technologies as businesses rapidly digitalize, as well as the new cybersecurity risks that are created. We will also discuss the best ways to manage these risks to build resilience into your organisation.  

35min

Fahad Najeeb

Fahad is a Technology Leader with 18 years experience in FSI, Startups, Telco, Government and Oil & Gas sectors. - Fahad is a regular [...]

Indika Delpachitra

I am an experienced and certified security professional having worked in Australia and New Zealand for over 18 years with management and [...]

Khurram Waheed

* CyberSecurity (NDR) solutions architect * Award-winning specialist, and consistent over-achiever * Product experience with ExtraHop, Cisco, [...]

Andrew Milroy

Andrew Milroy is Focus Network’s Chief Research Advisor. He is a well-known technology thought leader and speaker in the APAC region. He has [...]

Workshop 1 – CIO Track – Redefining Data Migration for the Modern Enterprise

Simon Mitrevski, Manager, Solutions Consulting, Carbonite + Webroot, OpenText Security Solutions

Migrating workloads for any environment can be a resource intensive and expensive exercise to perform. For many organisations that run on legacy, on-premise technology stacks; moving to the cloud or other environments can potentially drive complete overhaul of operations if complexities are not managed correctly; increasing costs and impacting business continuity in the process.

Now you can achieve agile migration in a secure, scalable and simple manner using automation and real-time byte-level replication.

Join Simon Mitrevski, Manager, Solutions Consulting at Carbonite + Webroot, an OpenText company, to discover a painless way to migrate your data with minimal risk and near-zero downtime.

In our session, we unveil:

  • Best practices and tips to reduce the complexity of migrating workloads to the cloud, or from cloud-to cloud environments
  • How to reduce costs by aligning a fit-for purpose infrastructure for your workloads
  • Strategies to increase agility of operations and how to migrate at scale

30min

Simon Mitrevski

Simon Mitrevski is an experienced IT professional with more than ten years of presales experience in the ICT industry. His experience includes [...]

Workshop 1 – CISO Track – IT Risk and Cyber Security Risk: Perspectives from the Board and the C-Suite

Peter Deans, Director, Notwithoutrisk Consulting
Peter Deans will provide insights and advice on how CIOs and CISO can effectively engage with the C-Suite and Board. The session will cover the role of the board, effective risk management, effective communication, and reporting. Peter will draw from his 32-year career spanning banking and finance and risk management. More recently, Peter has been advising a range of private and public companies on the development, implementation and embedding of effective risk management frameworks.

30min

Peter Deans

Peter has over 32 years’ general management, risk management and banking experience. Peter is one of the region’s foremost experts in the [...]

Workshop 2 – CIO Track – How the modern-day CIO affects change across the wider business for success outcomes

Karl Neubauer, Chief Information Officer, Global Retail Brands

This workshop will focus on how CIO’s influence and direct change. It will delve into:

  • Comparing the past
  • Challenges
  • The logical level head of the business (as opposed to BlueSky thinking)
  • Keeping 3rd parties and vendors accountable
  • Contributing to the bottom-line

  • 20min

    Karl Neubauer

    Karl Neubauer is an ICT Executive with 20+ years of experience designing and delivering ICT strategy, solutions and transformation to drive [...]

    Workshop 2 – CISO Track – Managing Digital Risk in an ‘Assume Breach’ World – Lessons from the Optus Breach

    Andrew Milroy, Chief Research Advisor, Focus Network

    This workshop will focus on the need to shift to an 'assume breach' cybersecurity posture. It will discuss how more emphasis needs to be placed on detection and response as well as strictly controlling data held by organisations.

    Key discussion points will include:

    • Faster detection and response when breaches occur
    • Cybersecurity strategies
    • Involving the board in cybersecurity strategy and policy development
    • The need for tighter data privacy controls such as data minimisation and storage limitation
    • Lessons learned from the Optus breach.

    20min

    Andrew Milroy

    Andrew Milroy is Focus Network’s Chief Research Advisor. He is a well-known technology thought leader and speaker in the APAC region. He has [...]

    Networking Break

    20min

    One-to-One Meetings 1

    30min

    Roundtable Discussion – CISO Track – Perimeter Security is Dead: Addressing the Expanding Attack Surface

    Greg Newbegin, Security Lead, Lenovo
    Asbed Boymoushakian, Services Sales Manager, Lenovo

    The move to a hybrid working environment demonstrated that a mobile workforce was not just viable, but in many cases also beneficial. However, with users now outside of the protective borders of the corporate network, it also introduced a startling number of new threat vectors.

    In this session, we’ll take a look at several security concerns that are important to Australian businesses in modern times, including some less common considerations.

     

    30min

    Asbed Boymoushakian

    Asbed Boymoushakian is a Services Sales Manager at Lenovo taking care of the Global, Large Enterprise, Government and Education segments for [...]

    Greg Newbegin

    Greg’s background covers almost 20 years of IT sales experience, with the last 7 years laser focused on cyber security sales and consulting. As [...]

    Roundtable Discussion – CIO Track – Responding to Ransomware – Tools to Build Your Threat Defense Architecture

    Daniel Tymkin, Senior Systems Engineer, Cohesity

    Organizations are increasingly at risk from skillful attackers and potent cyberthreats. The cost of cyberattacks could go beyond millions of dollars to fix breaches. The potential breach of secure data, loss of intellectual and personnel data, and extreme remediation also come at a high price. This session explores:

    • The rise and the evolution of ransomware attack
    • How modern data protection capabilities can enhance an organization's security posture
    • Building a Threat Defence Architecture that brings SecOps and IT Ops together.

    30min

    Daniel Tymkin

    Bio coming [...]

    Roundtable Discussion – CIO Track – Driving continuous innovation in times of austerity, skill shortage and security threats

    Richard Davies, Director of Digital Transformation, OutSystems
    Martin Cooperwaite, Co-Founder/Director, Kiandra

    When budgets are unconstrained, skilled resources are abundant, any digital transformation can be funded and  innovation comes thick and fast. Not every idea makes it but as long as one or two does, then it's deemed a success.

    Faced with budget cuts, challenges with talent and constant security threats, businesses have to be much more selective about what innovation they invest in.

    So, how can IT leaders drive continuous innovation and deliver impactful competitive advantage?


    30min

    Richard Davies

    As the OutSystems Director of Digital Transformation for APAC, Richard helps organisations strategically adopt the OutSystems platform. A [...]

    Martin Cooperwaite

    Martin‘s IT story started over 30 years ago when he wrote adventure computer games for his 2nd grade primary school friends. Inherent to [...]

    Roundtable Discussion – CISO Track – Top 5 Cloud Threats and how to Identify them

    Tarek Ibrahim, Enterprise Solutions Engineering, APJ, WIZ

    Cloud adoption is expanding rapidly, and with that expansion comes new complexities, such as an exploding number of technologies, architectures, and cloud users. The speed of growth and change in the cloud creates an ever-changing threat landscape.

    Wiz is on the forefront of the threat landscape in the cloud, as we are behind the discovery of vulnerabilities like ChaosDB and OMIGOD.

    At this roundtable, we will cover the top 5 cloud threats seen in the wild, from supply chain risks to data exposure, and give practical tips on how to protect your environment against them.


    30min

    Tarek Ibrahim

    Tarek Ibrahim has over 21 years’ experience within Cyber Security and Networking. He spent the first eight years of his career working for [...]

    Workshop 3 – CIO Track – Big Things Have Small Beginnings

    Alex Ji, Chief Information Officer, New Aim

    Join Dr Alex Ji, Chief Information Officer at New Aim, Australia’s largest and fastest-growing private ecommerce company. Speaking from personal experiences at NAB and Vocus Group, where he respectively built artificial intelligence models of automated capability and data science teams from scratch, Alex will address the tough questions including, ‘what should a CIO focus on first’.

    Irrespective of industry – finance, telecommunications or ecommerce – Alex will share how the highest-performing digital and analytics teams approach business decisions in exactly the same way. It all comes down to starting with something small but critical.

    Alex will delve into specific applications of this mental model and why measurable value from beginning to end is also crucial.


    20min

    Alex Ji

    Alex Ji brings more than a decade's experience in data and information technology to Australian ecommerce enabler New Aim. A proven leader in [...]

    Workshop 3 – CISO Track – Security Conscious Corporate Culture

    Ellis Brover, Independent Advisor, Former Chief Information Officer of Toyota, Brover Advisory

    Ellis is an experienced IT advisor and seasoned technology executive, supporting organisations to deliver superior business value through a modern technology function. He utilises his extensive lived experience to provide pragmatic advice in the areas of cyber strategy, digital capability, IT operating models and technology leadership advice.

    Ellis is a recognised IT leader with a track record over three decades of building and leading world-class IT organisations, driving transformational change, and delivering tangible business value. His experience spans a range of roles and industries, across a range of organisational scales from start-ups to multi-nationals.

    Most recently Ellis was CIO of Toyota Australia, where he led a transformation of the IT function from an internally focused service provider to a strategic enabler, driver of digital innovation, and role model for outstanding customer service.

    In this session Ellis will cover the importance of culture in securing your organisation, the key success factors, real-life examples of what happens when they are not in place, and advice to improve them.



    20min

    Ellis Brover

    Ellis is an independent IT advisor, supporting organisations to deliver superior business value through a modern technology function. He utilises [...]

    Workshop 4 – CIO Track – Security And IT Ops Convergence Will Drive The Future Of Endpoint Management

    James Sillence, VP Technical Account Management, Tanium

    Security and IT operations are critical for enterprises, but up until now, most organizations have handled them separately. With remote and hybrid work here to stay, a constantly evolving threat landscape, and increased pressure to reduce costs, that needs to change.

    As organizations modernize their approach to endpoint management, they’re increasingly looking at new technologies and processes to manage and secure their environments.

    Strong collaboration between IT ops and security will prove essential to their success.

     

    20min

    James Sillence

    James has over 36 years of IT experience spanning diverse areas such as Cybernetics and Control Systems, Network and Application Performance, [...]

    Workshop 4 – CISO Track – Scaling Digital Twins

    Hind Benbya, Professor | Head of IS & Business Analytics, Deakin University

    Digital twins (DTs) combine multi-physics simulation, data analytics, AI/machine learning and other related digital capabilities to enable the continuous monitoring of systems and machines and the provision of predictive and prescriptive outcomes.

    Despite the increasing popularity of DTs and the diversity of problems they can address, very few companies have succeeded in progressing their digital twin projects to full scale and leveraging the full potential of this emerging technology.

    Daunting interrelated managerial challenges related to developing living learning models, introducing flexible processes, and scaling and integration impede progress.

    The workshop will introduce current and emerging uses of digital twins and detail the challenges faced and lessons learned in designing and deploying different digital twins from two mature cases.


    20min

    Hind Benbya

    Hind Benbya is a Professor and Head of IS and Business Analytics at Deakin University in Melbourne and Visiting Policy Fellow at the Oxford [...]

    One-to-One Meetings 2

    30min

    Roundtable Discussion – CISO Track – Perimeter Security is Dead: Addressing the Expanding Attack Surface

    Greg Newbegin, Security Lead, Lenovo
    Asbed Boymoushakian, Services Sales Manager, Lenovo

    The move to a hybrid working environment demonstrated that a mobile workforce was not just viable, but in many cases also beneficial. However, with users now outside of the protective borders of the corporate network, it also introduced a startling number of new threat vectors.

    In this session, we’ll take a look at several security concerns that are important to Australian businesses in modern times, including some less common considerations.

    30min

    Asbed Boymoushakian

    Asbed Boymoushakian is a Services Sales Manager at Lenovo taking care of the Global, Large Enterprise, Government and Education segments for [...]

    Greg Newbegin

    Greg’s background covers almost 20 years of IT sales experience, with the last 7 years laser focused on cyber security sales and consulting. As [...]

    Roundtable Discussion – CIO Track – Responding to Ransomware – Tools to Build Your Threat Defense Architecture

    Daniel Tymkin, Senior Systems Engineer, Cohesity

    Organizations are increasingly at risk from skillful attackers and potent cyberthreats. The cost of cyberattacks could go beyond millions of dollars to fix breaches. The potential breach of secure data, loss of intellectual and personnel data, and extreme remediation also come at a high price. This session explores:

    • The rise and the evolution of ransomware attack
    • How modern data protection capabilities can enhance an organization's security posture
    • Building a Threat Defence Architecture that brings SecOps and IT Ops together.

    30min

    Daniel Tymkin

    Bio coming [...]

    Roundtable Discussion – CISO Track – Top 5 Cloud Threats and how to Identify them

    Tarek Ibrahim, Enterprise Solutions Engineering, APJ, WIZ

    Cloud adoption is expanding rapidly, and with that expansion comes new complexities, such as an exploding number of technologies, architectures, and cloud users. The speed of growth and change in the cloud creates an ever-changing threat landscape.

    Wiz is on the forefront of the threat landscape in the cloud, as we are behind the discovery of vulnerabilities like ChaosDB and OMIGOD.

    At this roundtable, we will cover the top 5 cloud threats seen in the wild, from supply chain risks to data exposure, and give practical tips on how to protect your environment against them.


    30min

    Tarek Ibrahim

    Tarek Ibrahim has over 21 years’ experience within Cyber Security and Networking. He spent the first eight years of his career working for [...]

    Roundtable Discussion – CIO Track – Driving continuous innovation in times of austerity, skill shortage and security threats

    Richard Davies, Director of Digital Transformation, OutSystems
    Martin Cooperwaite, Co-Founder/Director, Kiandra

    When budgets are unconstrained, skilled resources are abundant, any digital transformation can be funded and  innovation comes thick and fast. Not every idea makes it but as long as one or two does, then it's deemed a success.

    Faced with budget cuts, challenges with talent and constant security threats, businesses have to be much more selective about what innovation they invest in.

    So, how can IT leaders drive continuous innovation and deliver impactful competitive advantage?


    30min

    Richard Davies

    As the OutSystems Director of Digital Transformation for APAC, Richard helps organisations strategically adopt the OutSystems platform. A [...]

    Martin Cooperwaite

    Martin‘s IT story started over 30 years ago when he wrote adventure computer games for his 2nd grade primary school friends. Inherent to [...]

    Networking Lunch

    40min

    Workshop 5 – CIO Track – Building and Maintaining a Data-Driven Organisation to Remain Competitive

    Shaheen Saud, Chief Data and Analytics Officer, RPS
    Organisations are largely well progressed in their efforts to introduce new and modernise existing data capabilities, by investing in data lakes, business intelligence solutions and experimenting with artificial intelligence and machine learning as part of a universal aspiration towards being data-driven businesses. Yet, with a plethora of data and platforms at their fingertips, why are most organisations still struggling to derive meaningful business insights to deliver their intended business outcomes?

    20min

    Shaheen Saud

    Shaheen has extensive experience across a range of sectors including professional services, legal, banking and FMCG. He is currently leading the [...]

    One-to-One Meetings 3

    30min

    Roundtable Discussion – CIO Track – How do you Protect your Company from Ransomware Attacks?

    Jason Mantell, Director of Sales Engineering APAC, Cloudian

    Ransomware is one of the most widely discussed threats in cyber security. However, not enough research exists about the experiences of organisations that have actually suffered from ransomware attacks.

    Is our Government approved “Essential 8” approach enough to keep us secure?

    Let’s talk data immutability that goes beyond protections available from any other on-premises object storage provider.

    30min

    Jason Mantell

    Jason Mantell has an extensive IT career spanning across 20+ years in both the APAC and UK regions. From his early days in kindergarten receiving [...]

    Roundtable Discussion – CISO Track – Understanding risk and the perils of not identifying your risk growth

    Damien Lewis, Sales Manager, ExtraHop

    The topic of risk is constantly on the forefront of security teams' minds, but as enterprises get more dynamic and hybrid in nature, the nature of risk changes. Add to that the evolving sophistication of cyber threat actors, and it becomes more important to continuously update your understanding of the risks you face, and the options available to mitigate those risks.

    A quantitative risk assessment is great for getting really precise about the potential financial impact, the actual dollars attached to any given risk. But most organizations don't need that, and shouldn't wait for it, to start understanding where their risk is growing most and the urgent risks they should work to mitigate.

    30min

    Damien Lewis

    ExtraHop is on a mission to stop advanced threats with security that can’t be undermined, outsmarted, or compromised. Our dynamic cyber defense [...]

    Roundtable Discussion – CIO Track – How do you implement a cyber resilient strategy as part of your digital transformation program

    Claire Nicol, Commercial Sales Director, Mimecast
    • How do you get your Exec team and Board to see the value of your CR strategy or the risk of doing nothing?
    • How do you create a cyber positive culture as part of this strategy?
    • How do you introduce automation into your environment to ensure you’re making the best use of APIs and ecosystem?

    30min

    Claire Nicol

    Claire Nicol joined Mimecast in 2015 having moved to Melbourne from London and is currently the Commercial Sales Director. During her time in [...]

    One-to-One Meetings 4

    30min

    Roundtable Discussion – CIO Track – How do you implement a cyber resilient strategy as part of your digital transformation program

    Claire Nicol, Commercial Sales Director, Mimecast
    • How do you get your Exec team and Board to see the value of your CR strategy or the risk of doing nothing?
    • How do you create a cyber positive culture as part of this strategy?
    • How do you introduce automation into your environment to ensure you’re making the best use of APIs and ecosystem?

    30min

    Claire Nicol

    Claire Nicol joined Mimecast in 2015 having moved to Melbourne from London and is currently the Commercial Sales Director. During her time in [...]

    Roundtable Discussion – CIO Track – How do you Protect your Company from Ransomware Attacks?

    Jason Mantell, Director of Sales Engineering APAC, Cloudian

    Ransomware is one of the most widely discussed threats in cyber security. However, not enough research exists about the experiences of organisations that have actually suffered from ransomware attacks.

    Is our Government approved “Essential 8” approach enough to keep us secure?

    Let’s talk data immutability that goes beyond protections available from any other on-premises object storage provider.

    30min

    Jason Mantell

    Jason Mantell has an extensive IT career spanning across 20+ years in both the APAC and UK regions. From his early days in kindergarten receiving [...]

    Roundtable Discussion – CISO Track – Understanding risk and the perils of not identifying your risk growth

    Damien Lewis, Sales Manager, ExtraHop

    The topic of risk is constantly on the forefront of security teams' minds, but as enterprises get more dynamic and hybrid in nature, the nature of risk changes. Add to that the evolving sophistication of cyber threat actors, and it becomes more important to continuously update your understanding of the risks you face, and the options available to mitigate those risks.

    A quantitative risk assessment is great for getting really precise about the potential financial impact, the actual dollars attached to any given risk. But most organizations don't need that, and shouldn't wait for it, to start understanding where their risk is growing most and the urgent risks they should work to mitigate.

    30min

    Damien Lewis

    ExtraHop is on a mission to stop advanced threats with security that can’t be undermined, outsmarted, or compromised. Our dynamic cyber defense [...]

    Panel Discussion – Attracting and Retaining IT Top Talent for the Future of Work

    Panellists:

    Amanda Bennie, Head of Technology, Cbus Property
    John Tait, Head of Technology, T2 Tea
    SAR Raheem, APAC Region Manager, Security & Compliance, The Access Group
    Moderator:
    Andrew Milroy, Chief Research Advisor, Focus Network
    Recent shifts in talent, technology and work models transform the nature of work and reset expectations. CIOs who fail to adapt where, how and when work gets done – and who does it – will struggle to drive business performance, making it difficult to attract and retain top talent for the future of work.
    • Understand how to recruit, reskill and retain technology talent for the future of work
    • Build organizational resilience through a blended workforce of full-time equivalents
    • Discover how to provide flexible work experiences to be the employer of choice

    35min

    Amanda Bennie

    Responsible for the technology, knowledge and software development teams and their overall performance and growth, leading key initiatives to [...]

    SAR Raheem

    Raheem is an all-rounded Cybersecurity leader with several years of experience leading successful and sustainable IT & Cyber transformation [...]

    John Tait

    I have over 20 years’ experience in senior and executive IT leadership roles, including over 15 working in the Asia Pacific region working in [...]

    Andrew Milroy

    Andrew Milroy is Focus Network’s Chief Research Advisor. He is a well-known technology thought leader and speaker in the APAC region. He has [...]

    Closing Keynote Presentation – Attitude, Language & Approach – Keys to CIO Success

    Frank De Sa, Chief Information Officer, Just Group Limited
  • Technology has evolved from the domain of the geeky to the domain of everyone!
  • Have IT Departments really understood and embraced this fundamental shift?
  • Are vendors, marketers, and researchers controlling our destiny or do we use them strategically as inputs into decision processes for our businesses?
  • Why is IT/Business Alignment still on the agenda? Why is our language and attitude critically important to our success? Why do we still refer to 'the business' as 'the business' vs IT?
  • Is digital transformation simply the latest buzzword to sell more software and services or does it have meaning within IT departments?
  • After 18 years on the 'vendor' side of consulting and technology and now 12+ within a Retail IT Department, Frank's perspective of IT has changed quite considerably. Join Frank as he shares his journey within Just Group and provides a different perspective to the mainstream trends that seem to dominate our industry.


    30min

    Frank De Sa

    After 18 years on the vendor and consulting side of technology, Frank joined Just Group over 12 years ago to first lead new technology [...]

    Closing Remarks

    5min

    Networking Drinks

    60min

    Arrival & Registration

    35min

    Welcome & Introduction

    Tyron McGurgan, CEO, Focus Network

    5min

    Master of Ceremonies, CIO track

    Luke Hannan, lukehannan.com.au, MOC
     

    10min

    Luke Hannan

    Luke founded his Professional Master of Ceremonies business www.lukehannan.com.au on 3 key principles; Service, Preparation & Delivery. Based [...]

    Master of Ceremonies, CISO track

    First session in this track will begin at 11:05am.

    10min

    Opening Keynote Presentation – Secure supply chain: the how and why of securing small business

    Narelle Devine CSM, Chief Information Security Officer Asia Pacific, Telstra
    • Why small business security matters
    • How big business can help small businesses get secure
    • Avoiding old habits and pitfalls
    • Tales from the trenches

    30min

    Narelle Devine CSM

    As Telstra’s Chief Information Security Officer Asia Pacific, Narelle is responsible for the company’s cyber security operations, [...]

    Keynote Presentation – Mitigate the impact of cyber incidents by ensuring you can resume operations rapidly

    Dr Jerry Vochteloo, Field CTO, Asia Pacific & Japan, Data Protection Solutions, Dell Technologies

    Cyber risks are relentless and ensuring your organisation has the ability to recover from a ransomware or broader cyber event is critical in this digital transformation era. The recent passing of both parts of the Critical Infrastructure amendments, illustrates the Australian Government’s focus in elevating the security bar.

    Cyber resilience is a capability that requires the close co-operation of the both the Security and IT teams. This talk will discuss a number of simple steps organisations can take to increase their resilience in the face of an attack that either corrupts or destroys IT infrastructure and data.

    30min

    Dr Jerry Vochteloo

    Jerry has had a very diverse and broad career in IT: working in research, education, services and sales Jerry currently works for Dell [...]

    Panel Discussion – Building a resilient and agile, data driven enterprise

    Panellists:

    Khurram Waheed, Principal Security Architect, Extrahop
    Iain Hart, Head of Technology & CISO, The Australian Institute of Company Directors
    Chirag Joshi, Director, ISACA Sydney

    Moderator:

    Luke Hannan, MOC, www.lukehannan.com

    For today’s businesses, success means being data-driven. Generating value from vast amounts of data, engendering innovation and having agile and scalable business models necessitates the use of cloud technologies wherever possible. But adoption of new technologies creates risk which must be managed.

    Cybersecurity postures need to be transformed to ensure that enterprises have visibility across expanded attack surfaces and are able to minimize the damage caused by breaches. This session will discuss accelerated adoption of new technologies as businesses rapidly digitalize, as well as the new cybersecurity risks that are created. We will also discuss the best ways to manage these risks to build resilience into your organisation.

    35min

    Iain Hart

    I am an experienced IT professional with a career spanning more than 25 years working across a range of industries, including Banking and [...]

    Chirag Joshi

    Chirag has extensive experience building and managing cyber security, risk management, and compliance programs in multiple countries across [...]

    Khurram Waheed

    * CyberSecurity (NDR) solutions architect * Award-winning specialist, and consistent over-achiever * Product experience with ExtraHop, Cisco, [...]

    Luke Hannan

    Luke founded his Professional Master of Ceremonies business www.lukehannan.com.au on 3 key principles; Service, Preparation & Delivery. Based [...]

    Networking Break

    20min

    One-to-One Meetings 1

    30min

    Workshop 1 – CIO Track – Redefining Data Migration for the Modern Enterprise

    Simon Mitrevski, Manager, Solutions Consulting, Carbonite + Webroot, an OpenText company

    Migrating workloads for any environment can be a resource intensive and expensive exercise to perform. For many organisations that run on legacy, on-premise technology stacks; moving to the cloud or other environments can potentially drive complete overhaul of operations if complexities are not managed correctly; increasing costs and impacting business continuity in the process.

    Now you can achieve agile migration in a secure, scalable and simple manner using automation and real-time byte-level replication.

    Join Simon Mitrevski, Manager, Solutions Consulting at Carbonite + Webroot, an OpenText company, to discover a painless way to migrate your data with minimal risk and near-zero downtime.

    In our session, we unveil:

    • Best practices and tips to reduce the complexity of migrating workloads to the cloud, or from cloud-to cloud environments
    • How to reduce costs by aligning a fit-for purpose infrastructure for your workloads
    • Strategies to increase agility of operations and how to migrate at scale

    30min

    Simon Mitrevski

    Simon Mitrevski is an experienced IT professional with more than ten years of presales experience in the ICT industry. His experience includes [...]

    One-to-One Meetings 2

    30min

    Workshop 2 – CIO Track – Setting up and scaling data for success

    Kris Gardiner, Head of Data and Analytics, Linfox
    This workshop will outline:
    • Leveraging data for the right reasons
    • Creating a multi speed data ecosystem
    • Build for the now, design for the future

    30min

    Workshop 2 – CISO Track – The Anywhere Workforce: Securing the Hybrid Workforce in the New Normal

    Rassoul Ghaznavi Zadeh, Director of Information Security, ResMed
    • Examining identity protection tools existing internally and using it to protect from attacks.
    • Adopting Zero Trust methodologies to prevent, detect and respond to cyber security incidents.
    • Taking advantage of more robust security in the cloud and having a strong cloud posture.

    30min

    Rassoul Ghaznavi Zadeh

    Rassoul is an Information Security expert, leader, author of a few cyber security books, online and university instructor, and active member of [...]

    Roundtable Discussion – CIO Track – The New Management Approach: Focusing on Productivity Measures vs. Time Measures

    Craig Chu, Project Director, Westpac

    This roundtable will focus on:

    • Focus on outcome KPIs rather than time-sheet recording;
    • Working in a hybrid team;
    • Attracting talent

    40min

    Craig Chu

    Technology leader with solid experience collaborating at senior levels using deep understanding of technology, banking, and financial services to [...]

    Roundtable Discussion – CISO Track – Gaining complete cloud visibility as you scale

    David Hayes, Area Director, Australia & New Zealand, Lacework
    Ryan Johnson, Director, Sales Engineering, APAC, Lacework

    More and more elite performing organisations are delivering innovation at record speed, while maintaining confidence in their overall security, which is setting a precedent for the new cloud generation of builders. To keep pace, you need to be able to see the entirety of your cloud footprint to be able to effectively configure and secure it, which is paramount as you continue to innovate, build, and scale in cloud and containerised environments.

    Join the discussion with Lacework and your peers to hear best practices and insights into how these organisations have gained full cloud visibility and security saving them valuable time to focus on safely scaling their business in the cloud.

    40min

    Ryan Johnson

    Bio [...]

    David Hayes

    I have extensive experience in solution sales in all aspects of: Network and Application Performance Management Solutions Data Centre [...]

    Roundtable Discussion – CISO Track – Defend Your Data: Refuse the Ransom

    Roland Browne, Senior Systems Engineer & cybersecurity specialist, Cohesity

    Cybercriminals are getting more inventive and they’re not only locking up production systems and destroying backups—now they are stealing your confidential data. It’s estimated that global ransomware damage will cost $256B* in 2031. Don’t be the next victim.

    Join Cohesity for an intimate roundtable discussion where together, we will explore and learn what is the current landscape of Cyberattacks and how to handle and mitigate the threats to our data and systems.

    Topics of discussion will include:

    • How to protect your backed-up data against ransomware attacks whilst improving team collaboration by eliminating platform, people, and process silos?
    • Why recovery is a key component of a good cyber security strategy?
    • How to rapidly recover data while reducing business impact?
    • What are the ways to strengthen data security and cyber resiliency?

    40min

    Roland Browne

    Bio coming [...]

    Roundtable Discussion – CIO Track – Creating an Agile, Resilient and Sustainable Organisation Through Digitalisation

    Christopher Johnson, Head of Group Technology, Charter Hall
    • Drawing up a digital-first operation model and technology-led capabilities strategy.
    • Setting up a digital knowledge hub to showcase the impact of digital in transforming business.
    • Leveraging on new age technologies and collaborative ways of working to accelerate innovations.

    40min

    Christopher Johnson

    Christopher Johnson has been working in the IT industry for more than 25 years, across marketing, telecommunications, publishing, professional [...]

    Networking Lunch

    45min

    One-to-One Meetings 3

    30min

    Workshop 3 – CIO Track – Adopting AI to enhance your data and analytics capability

    Jenny Wu, Director, Deloitte

    Artificial Intelligence can drive cars, trade stocks and shares, lean to carry out complex skills simply by watching You Tube videos, translate across dozens of different languages, recognise human faces with more accuracy than we can, and create original hypotheses to help discover new drugs for curing diseases.

    One of the major computing methods and enablers of artificial intelligence is machine learning, which involves teaching computer programs to learn by find patterns in data. The more data, the more the computer system improves.

    In this session, Jenny will focus on the common challenges many organisations experience in using machine learning (ML) methods to help with decision making, what it takes to integrate AI and machine learning into everyday business processes and explore potential routes to embark on the adoption journey.



    30min

    Jenny Wu

    Jenny came into consulting with 15 years of industry experience in financial services. As a statistician by training, she commenced her career as [...]

    Workshop 3 – CISO Track – AI and Cybersecurity

    Dr. Sharif Abuadbba, Senior Research Scientist - Cybersecurity, CSIRO's Data61

    Recently, there has been an increase in the application of Artificial intelligence (AI) technologies to support cyber-attacks, such as cyber intrusion, data theft and data compromise.

    Future AI-driven cyber-attacks are expected to be more precise, targeted and tailored by training data to activate only in the presence of specific information or other cues. They will also be adaptable to a much greater extent than traditional rule-based phishing and malware.

    Traditional approaches of hardening defences are unlikely to yield success against these advanced threats on their own, as this strategy relies heavily on complete coverage of all system loopholes that attackers might exploit, at all times.

    Malicious learning processes will also be harder to detect, by virtue of the sophisticated detonation mechanisms and ability to mimic benign processes and behaviours.

    Employing AI for Cybersecurity to solve these challenges can be a double-edged sword as it can be used for both cyber defence and cyber-attacks. Besides, AI itself is not a silver bullet and can be exploited.

    In this session, I’ll focus on two aspects:

    • (a) presenting a few real-world examples of developing novel AI based algorithms for cyber defence,
    • (b) exploring the security of deployed AI algorithms and developing corresponding countermeasures.

    30min

    Dr. Sharif Abuadbba

    Dr Sharif Abuadbba has a PhD in computer security from RMIT University, Australia 2017. Sharif has 30+ publications and submissions in [...]

    One-to-One Meetings 4

    30min

    Keynote Presentation – The Everywhere Workplace: Planning and Preparing for a Hybrid Workplace

    Dr. Ashish Bharadwaj, CIO, Torrens Global Education Services
    • Rethinking communication, training and development, knowledge exchange and psychological needs.
    • Reimagining the office space while knowing the specific requirements needed for the home workplace.
    • Reinforcing integrity, security, privacy and liabilities policies while putting in place a contingency plan.


    30min

    Dr. Ashish Bharadwaj

    Dr. Ashish Bharadwaj is an executive, technologist and educator with over 20 years of rich experience in delivering impactful technology and [...]

    Keynote Presentation – Adopting an Inside Out Approach to Cyber Security

    Iain Hart, Head of Technology & CISO, The Australian Institute of Company Directors
    This session will focus on: 
    • Protecting our information assets continues to grow more complex 
    • Deep focus on external threats can still leave us exposed  
    • Adopting an Inside Out approach can help us address our biggest risk 

    30min

    Iain Hart

    I am an experienced IT professional with a career spanning more than 25 years working across a range of industries, including Banking and [...]

    Closing Keynote Presentation – Enabling New Approaches to Organisational Digital Innovation in the Post-Pandemic Era

    Chris Bezuidenhout, Managing Director, CIB CIO APAC & Emerging Markets, Deutsche Bank AG

    As innovation becomes synonymous with disruption, IT leaders are distinctively set to evolve into innovation leaders. The need to building required competencies, skills to envision technology-driven business change and deliver on their commitments are essential.

     

    30min

    Chris Bezuidenhout

    I am an experienced CIO with a wealth of expertise in technology management, risk, finance and large-scale transformation for employers, [...]

    Networking Drinks

    60min

    WHY ATTEND

    STAR KEYNOTES
    AND PRESENTERS

    We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program.

    NETWORKING
    OPPORTUNITIES

    Keeping in line with the main goal of the event in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails and informal introductions.

    1-1 PRIVATE
    MEETINGS

    Allowing both buyers and sellers the opportunity to engage with one another onsite in a series of prearranged business meetings. These provide both parties a great opportunity to build new relationships by interacting face to face.

    TARGETED
    SESSIONS

    Being able to experience different sessions is what makes this event unique; whether you are looking to attend an interactive workshop, roundtable, 1-1 meeting or panel discussion.

    NETWORKING
    LUNCH

    Interacting face-to-face is still one of the most effective ways to do business. During lunch hour you will have the opportunity to do just that in a very relaxed atmosphere.

    PERSONALISED
    PROGRAM

    The summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office.

    DOWNLOAD THE POST EVENT REPORT FROM OUR PREVIOUS EVENT

    REGISTER YOUR INTEREST

    PURCHASE TICKETS

    Should you wish to attend this years upcoming 16th Australian CIO Leaders Summit on the 2nd May 2023, Sydney, please purchase your tickets below

    1 Ticket

    $1990

    • Access to onsite mobile APP
    • Meals and refreshments
    • Access to all presentation sessions
      and roundtable discussions
    • Access to all presentation
      slides and photos
    BUY NOW
    Group Ticket (2 - 4)

    $1790

    • Access to onsite mobile APP
    • Meals and refreshments
    • Access to all presentation sessions
      and roundtable discussions
    • Access to all presentation
      slides and photos
    BUY NOW
    GROUP TICKETS (5+)

    $1500

    • Access to onsite mobile APP
    • Meals and refreshments
    • Access to all presentation sessions
      and roundtable discussions
    • Access to all presentation
      slides and photos
    BUY NOW

    LATEST NEWS

    Attitude, Language & Approach – Keys to CIO Success – Frank De Sa

    Frank De Sa, Chief Information Officer, Just Group Limited The presentation was based around “Attitude, Language & Approach – Keys to […]

    Attracting and Retaining IT Top Talent for the Future of Work – Panel Discussion

    Panellists: Amanda Bennie, Head of Technology, Cbus Property John Tait, Head of Technology, T2 Tea SAR Raheem, APAC Region Manager, Security & […]

    How do you Protect your Company from Ransomware Attacks? – Jason Mantell

    Jason Mantell, Director of Sales Engineering APAC, Cloudian Jason spoke about how Cloudian’s data immutability goes beyond protections […]

    Understanding risk and the perils of not identifying your risk growth – Damien Lewis

    Damien Lewis, Sales Manager, ExtraHop A quantitative risk assessment is great for getting really precise about the potential financial impact, […]

    Meet leading IT executives from Australia's strongest brands.

    Interact and engage with some of the strongest and most powerful brands from across Australia.

    “First of all, can I just say this was one of the best conferences I have been to in the last 5 years. The caliber of delegates (and networking opportunities), suppliers and speakers was exceptional. Your team – were so helpful before and during the event. Well done, I'd be very happy to be invited back!”

     

    – 20TH CENTURY FOX

    'Fantastic event! Congratulations to you and the team. Hands down the best event I have attended as a sponsor since I've been at Genesys. You and your team were extremely professional and helpful in the lead up to the event and I very much appreciate your patience in dealing with the many hurdles along the way. I can't tell you how refreshing that is after the dealings we've had with several other event/conference providers across APAC.'

     

    – GENESYS

    “Just wanted to thank you and the team for making us feel so welcome and looking after the team during the conference. It was definitely one of the best ones we’ve been to, so well done. When is your next event? Would love to keep the ball rolling on this.”

     

    – SHOOTSTA

    “I always enjoy the opportunity this summit affords for networking and a general check in on what everyone is doing.”

     

    TRAVERS STOW – SIGMA HEALTHCARE

    DIAMOND SPONSOR

    PLATINUM SPONSORS

    GOLD SPONSORS

    SILVER SPONSORS

    BECOME A SPONSOR

    MEDIA PARTNERS


    Hilton Hotel Sydney
    488 George Street, Sydney
    Telephone: +61-2-9266-2000
    Email: sydney@hilton.com

    More Information
    Copyright 2022 ©Focus Network. All rights reserved