Secure supply chain: the how and why of securing small business – Narelle Devine CSM

Narelle Devine CSM, Chief Information Security Officer Asia Pacific, Telstra

 

Keynotes discussed in this session:

  • Why small business security matters
  • How big business can help small businesses get secure
  • Avoiding old habits and pitfalls
  • Tales from the trenches

Welcome to the 9th Annual CISO Leaders Australia Summit 2022 – Luke Hannan

Luke Hannan, Master of Ceremonies, lukehannan.com.au

Our second CIO/CISO Leaders Summit this year features a rich program presented by some of the most senior IT and IT Security leaders and experts from across Australia and overseas.

Attendees will have the opportunity to network and engage in the most relevant sessions for their business.

A huge welcome to all our sponsors, delegates & speakers.

CISO Track – Prioritising Integration of Governance, Risk and Compliance in Cybersecurity in the New Normal – Vijay Narayan

Vijay Narayan, Chief Information Security Officer, Environment Protection Authority

Main key takeaways from this workshop with Vijay include:

  • Re-emphasized the importance of data protection through a multitude of mandates
  • Implementation of security controls on cloud components
  • Providing leadership with timely, comprehensive risk and compliance-related reporting

 

Addressing Diversity and Digital Skills Deficiency in a Rapidly Changing Future – Jennifer Rebeiro

Jennifer Rebeiro, Chief Information Officer, Greater Western Water

In this workshop with Jennifer, participants learned about:

  • The importance of reskilling and upskilling as new roles emerge and skills requirements change.
  • Leveraging the experts they already have on staff and creating an extensive career path.
  • Adopting more inclusive hiring practices outside of traditional talent pools.

CIO Track – RPA – A Strategy for Integration and User Experience – Imtiaz Bhayat

Imtiaz Bhayat, Chief Information Officer, Regis

Key takeaways from this session:

  • RPA creates an exceptional user experience at the transactional layer and forms part of an integration strategy
  • The steps towards implementation are easy and ongoing management is vital
  • Implementation creates a platform to move more towards AI/

CISO Track – Adopting a pragmatic Zero Trust Strategy – Vinay Manikkam

Vinay Manikkam, Principal, Enterprise Security Architect, IAG

In this workshop Vinay shared his insights and experience on adopting a Zero Trust Strategy , touching on:

  • Introducing a Zero Trust Framework that is relatable to stakeholders
  • Integrating Zero Trust foundation and quick wins with an enterprise cyber security strategy
  • Planning Zero Trust maturity investments to address tactical and strategic cyber risk and resilience objectives

CISO Track – How Devolved Cyber Security Created a Leap Forward in Our Cyber Security Posture – Charles Sterner and David Wilde

Charles Sterner, CISO, AARNet

David Wilde, CTO, AARNet

Charles and David spoke about their recent program, at AARNet, to aggressively grow their cyber security capabilities, to meet the challenges of the modern threat landscape. Core to their strategy is the concept of “devolved cyber security.”
Their session discussed what this means for their company, how they’ve leveraged out of the both thinking to manage our risks, and where they see this going over the next 5 years.

CIO Track – Driving Your Competitive Advantage with Cloud-First Identity and Access Management – Dragan Vladicic

Dragan Vladicic, Senior Manager, Solutions Engineer, Asia Pacific, Okta

This Okta roundtable session with Dragan revolved around the subject of “hybrid state” under which many organizations are operating their IT environment these days.

And while the efficiencies of a cloud-first approach are well established, organizations and their employees find it difficult to move back-and-forth between their SaaS apps on one side of the hybrid state, and those legacy applications that need to remain within the on-premises data center.

Keypoints discussed:

  • How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications
  • How can organizations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)
  • What are the best ways for organizations to leverage newer technologies to help scale their infrastructure to meet customer needs

Copyright 2024 ©Focus Network. All rights reserved