Join us at the 12th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
5th September 2023, RACV City Club, Melbourne
Summit Themes Key themes and topics are developed by our
standing committee and advisory board from
the country's most respected Security / IT Leaders.
These will be addressed over the course
of the CISO Leaders Summit Australia.

 

Anti Virus

 

Network Security

 

Analytics

 

Cyber Security

 

Mobile & cloud
security

 

Identity
Management

 

Fraud
Protection

 

End Point
Security

Join us at the 12th CISO Leaders
Australia Summit

BE PART OF THIS YEAR’S UPCOMING GATHERING WHERE YOU WILL BE ABLE TO ENGAGE WITH THE COUNTRY’S LEADING IT SECURITY PROFESSIONALS ON THE
5th September 2023, at the RACV City Club, Melbourne

Join the gathering

ABOUT THE EVENT

The 12th CISO Leaders Australia Summit, Melbourne will take place on the 5th of September at the RACV City Club, Melbourne. The Summit will once again become THE MEETING PLACE for more than 100 of the country’s leading CISOs, Heads of IT Security, Cyber Security and CIOs.

This year’s Summit theme will be titled 'Cybersecurity Modernisation with a Threat-Informed Defence' and will be presented by senior professionals through a wide variety of topics. Attendees will have the opportunity to personalise their own agenda and maximise their time out of the office by engaging in only the most relevant sessions for their business.

Our networking drinks function will provide the chance to interact face to face with peers in a very relaxed setting.

SPEAKERS

Sourish Datta
plus

Sourish Datta

Chief Information Security Officer, Emergency Services Telecommunications Authority (ESTA)

Vijay Krishnan
plus

Vijay Krishnan

Chief Information Security Officer, UniSuper

Sunil Rane
plus

Sunil Rane

Chief Information Security Officer, Secure Electronic Registries Victoria

Sudhakar Patnaik
plus

Sudhakar Patnaik

Business Information Security Officer - International, Kraft Heinz

REGISTER YOUR INTEREST

PROGRAM

The summit program is a draft and is subject to change.

Registration, Badge Collection & Refreshments

45min

Welcome and Introduction

Tyron McGurgan, Chief Executive Officer, Focus Network

5mins

Master of Ceremonies

Chief Research Advisor, Focus Network 

5min

Opening Keynote Presentation: Chain of Vulnerabilities – Detecting and Responding To Supply Chain Threats.

Recent supply chain attacks highlight the severe downstream consequences when a technology vendor is compromised. Supply chain attacks are increasingly being used as a vehicle for the most sophisticated and damaging attacks.

This presentation will highlight the vulnerabilities that are present in today’s supply chains. It will then discuss rapid detection and mitigation of supply chain attacks.

Key takeaways will include an understanding of supply chain vulnerabilities and ways to mitigate supply chain threats.

20min

Keynote Panel Discussion: Mitigating Ransomware Risk.

Panellists:
Vijay Krishnan, Chief Information Security Officer, UniSuper
Anafrid Bennet, Head of Technology, Security & Property, Greater Western Water

Recently, we have seen a series of devastating ransomware attacks which have included attacks on critical infrastructure. We’ve also seen an increase in attacks on soft targets such as schools and hospitals.

Key discussion points in this panel will include, the reasons why the threat from ransomware is increasing and the best ways to mitigate ransomware risk.

30min

Vijay Krishnan

Passionate Information Security strategist, with proven expertise in Information Security Strategy & Governance, Business Engagement, [...]

Anafrid Bennet

  The cornerstone of business resilience is building a cultural foundation that encourages people to work together. I work to strengthen [...]

Keynote Presentation: Adopting A Zero-Trust Approach To Cybersecurity.

A zero-trust approach requires a change of focus for organisations. It requires an assumption that breaches will occur as organisations evaluate current and desired cybersecurity posture, aligned with risk appetite.

This presentation will explain how to adopt a zero-trust approach and how it can be aligned with cybersecurity policies. Key takeaways will include an understanding of how to take a zero-trust approach and the benefits of zero-trust.

30min

Networking Break

15mins

Roundtable Discussion: Shared Responsibility In The Cloud.

Confusion remains around the segregation of responsibilities for cloud security. This leads to unnecessary vulnerabilities and potentially devastating attacks.  Key discussion point in this roundtable are the elements of cybersecurity that are typically addressed by cloud service providers and the elements which must be managed by the customer. 

30min

Roundtable Discussion: Modernising Cyber Operations With AI And ML.

Too many companies focus purely on preventing all breaches and assume that all company resources remain inside corporate firewalls. As remote working and the use of multiple clouds becomes normal, this approach has become outdated.

Key discussion points in this roundtable include how companies need to move beyond a traditional preventive ‘castle and moat’ approach to cybersecurity, and how they can take a much more proactive approach.

30min

Roundtable Discussion: Policy As Code And Application Security.

As companies start to embrace DevSecOps, developers will increasingly act as policy enforcers by building policy into code. Security by design will become more common as security programs align with DevOps to provide the automation required to secure complex technology environments. Developers will start to see baking security into code, not as an inconvenience, but as a critical part of creating new applications rapidly.

Key discussion points will include best practices in DevSecOps and embedding cybersecurity policies into code.

30min

Roundtable Discussion: Reducing Complexity With A Cybersecurity Mesh.

Companies are struggling with increased cybersecurity complexity as they wrestle with a growing number of cybersecurity tools, typically operating independently of each other. A new approach is required where controls are integrated and policy is consistent.

This roundtable will discuss how a cybersecurity mesh can enable the centralised control of policies and the scaling of controls. It will also discuss how a cybersecurity mesh can offer greater flexibility and reliability.

30min

Roundtable Discussion: Shared Responsibility In The Cloud.

Confusion remains around the segregation of responsibilities for cloud security. This leads to unnecessary vulnerabilities and potentially devastating attacks.  Key discussion point in this roundtable are the elements of cybersecurity that are typically addressed by cloud service providers and the elements which must be managed by the customer. 

30min

Roundtable Discussion: Modernising Cyber Operations With AI And ML.

Too many companies focus purely on preventing all breaches and assume that all company resources remain inside corporate firewalls. As remote working and the use of multiple clouds becomes normal, this approach has become outdated.

Key discussion points in this roundtable include how companies need to move beyond a traditional preventive ‘castle and moat’ approach to cybersecurity, and how they can take a much more proactive approach.

30min

Roundtable Discussion: Policy As Code And Application Security.

As companies start to embrace DevSecOps, developers will increasingly act as policy enforcers by building policy into code. Security by design will become more common as security programs align with DevOps to provide the automation required to secure complex technology environments. Developers will start to see baking security into code, not as an inconvenience, but as a critical part of creating new applications rapidly.

Key discussion points will include best practices in DevSecOps and embedding cybersecurity policies into code.

30min

Roundtable Discussion: Reducing Complexity With A Cybersecurity Mesh.

Companies are struggling with increased cybersecurity complexity as they wrestle with a growing number of cybersecurity tools, typically operating independently of each other. A new approach is required where controls are integrated and policy is consistent.

This roundtable will discuss how a cybersecurity mesh can enable the centralised control of policies and the scaling of controls. It will also discuss how a cybersecurity mesh can offer greater flexibility and reliability.

30min

Speaking Presentation: Cybersecurity Modernisation with A Threat-Informed Defence.

The traditional network infrastructure model of centralised corporate data centres secured by on-premises network perimeters does not work today. Data that once resided in data centres is now in the cloud, on SaaS applications, and on endpoints.

This presentation will focus on the need for companies to transform and modernise their approach to cybersecurity, and adapt to the constantly changing threat landscape. Key takeaways will include, the benefits of a threat informed defence and the how to secure assets that sit outside the traditional network perimeter.

20min

Speaking Presentation: The New Threat Landscape: The Cyber Physical World.

Attacks on critical infrastructure have highlighted the vulnerabilities that emerge as operational technology converges with information technology. Greater digitalisation of the physical world combined with edge computing and new IoT technologies are accelerating the pace of this convergence.

This presentation will discuss the blending of information technology with operational technology and the new threats that this brings, particularly with reference to critical infrastructure.

Key takeaways will include an explanation of the types of vulnerabilities that operational technology presents and the best practices in mitigating the risk of attacks on operational technology.

20min

Speaking Presentation: Shifting Left: Cloud Native DevSecOps.

Banking security into code is critical for securing applications. To do this effectively, DevOps teams also need to work with security teams. This presentation will discuss the importance of baking security into code and best practices in ‘shifting left’. Key discussion points will include,

  • The importance of DevSecOps and
  • DevSecOps use cases.

20min

Networking Lunch

40min

Keynote Speaker session: Powering Human Centric Employee Performance and Productivity.

The pandemic experience and changing labour market has reset work norms, while often distracting leaders from the fundamentals of productivity.

This session will provide CIOs clarity of the human-centric work practices that make IT employees more productive and high-performing.

20min

Speaking Session: Moving Beyond Prevention To Proactive Defence.

Too many companies focus purely on preventing all breaches and assume that all company resources remain inside corporate firewalls. As remote working and the use of multiple clouds becomes normal, this approach has become outdated.  Key discussion points in this roundtable include how companies need to move beyond a traditional preventive ‘castle and moat’ approach to cybersecurity, and how they can take a much more proactive approach. 

30min

Speaking Session: Reducing Risk With Modern Identity Management.

Sudhakar Patnaik, Business Information Security Officer - International, Kraft Heinz
As digital transformation accelerates, more data and applications are being pushed out to devices and remote users. Companies need to focus on who is accessing corporate resources, from where and why. They need to understand what their data is being used for and be able to identify vulnerabilities rapidly. Improved visibility of user behaviour is critical to reduce the threats from adversaries as well as from insiders.  Key discussion points include, enabling business with IAM and managing access efficiently.

30min

Sudhakar Patnaik

Sudhakar is a Cyber Security professional with over 19 years of experience in managing risk, architecting security solutions, developing strategy [...]

Networking Break

15min

Keynote Presentation: Enforcing Policy Control With A Secure Service Edge (SSE) Platform.

The Secure Access Service Edge (SASE) approach to cybersecurity has given way to SSE. SSE accommodates changing working patterns and wider cloud usage.Key takeaways from this presentation will include the importance of SSE platforms as remote working and cloud usage become more widespread and the importance of integrating multiple cloud cybersecurity services in the cloud

20min

Keynote Panel Discussion: Becoming The Hunter Instead Of The Hunted With Threat Intelligence, AI and Automation.

Panellists:
Sunil Rane, Chief Information Security Officer, Secure Electronic Registries Victoria
Matt Lange, GM, Enterprise Security, APA Group
Daniel Muchow, Head of Cyber Risk and Security, La Trobe Financial
Sandra Barns, GM Risk Technology, Data and Cyber Security, Judo Bank

Organisations need to take a forward-leaning proactive approach to cybersecurity. They need to minimise attacks by identifying them and responding to them before any damage is caused. Threat hunting requires the use of automation and AI to be effective. It also needs access to the best sources of threat intelligence.

This panel will discuss best practices in threat hunting and how companies can become the hunters instead of being the hunted

30min

Sunil Rane

I have years of progressive consulting experience working on a myriad of projects. My experience entails industries such as Financial Services, [...]

Matt Lange

Holding proven success in building a best-in-class cyber security capability and culture in, Australia Post, a diverse organisation that has [...]

Daniel Muchow

Daniel Muchow joined La Trobe Financial in February 2023 as Head of Cyber Risk and Security. Prior to La Trobe Financial Daniel was a Director [...]

Sandra Barns

Experienced Executive Manager, Chief Technology Officer (CTO) and CISO, with a demonstrated history of working in the financial services [...]

Closing Keynote Presentation: Building Resilience With Defence-In-Depth.

Sourish Datta, Chief Information Security Officer, Emergency Services Telecommunications Authority (ESTA)

No company can eliminate all breaches. Instead, companies can focus on mitigating risk by minimising the damage and breach can cause. Increasingly, companies are implementing multiple layers of controls.

Key takeaways from this presentation will be the need for multiple complementary controls to manage risk and how a defence in depth approach can be implemented.

20min

Sourish Datta

Sourish is a strategic, result-oriented Security & Risk Management Leader with two decades of global experience in leading security [...]

Closing Remarks From The Chair and End of The Forum

Andrew Milroy, Chief Research Advisory, Focus Network

5min

Networking Drinks

60min

Registration And Morning Refreshments

45min

Welcome & Introduction

Tyron McGurgan, Chief Executive Officer, Focus Network

5min

Tyron McGurgan

Tyron McGurgan is an accomplished entrepreneur, media specialist, and events professional with over 17 years of experience in the industry. He is [...]

Master of Ceremonies

Anthony Caruana, writer + presenter + facilitator + journalist + consultant, Media-Wize

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Opening Keynote Presentation – Voice of the CISO in Australia

Marc Einstein, Principal Advisor, Focus Network

This presentation will explore the current state of cybersecurity in Australia and the challenges and opportunities facing Chief Information Security Officers (CISOs) in today's rapidly evolving threat landscape. Drawing on the latest industry research and analysis by Focus Network analysts, the presentation will provide insights into the key trends and emerging technologies that are shaping the CISO role.

During this session we will delve deeper into areas that cover:
  • The evolving nature of cyber threats and the importance of proactive risk management
  • The role of the CISO in driving a culture of cybersecurity across the organization
  • The impact of digital transformation on cybersecurity and the challenges of securing cloud, mobile, and IoT environments
  • The emerging technologies and strategies for enhancing cybersecurity, including AI, machine learning, and zero trust security models.

20min

Marc Einstein

Mr. Marc Einstein has over 20 years of telecommunications and digital media industry experience as an analyst, market researcher and consultant. [...]

Keynote Panel Discussion – Mitigating Ransomware Risk

Panellists:
Daniela Fernandez, Head of Information Security, Paypal Australia
Santanu Lodh, Chief Information Security Officer, OFX
Kevin Tham, Chief Information Security Officer, etika
Moderator:
Marco Figueroa​, Senior Manager, Cyber Security, Risk and Compliance Digital and Operations, Australian Institute of Company Directors

Recently, we have seen a series of devastating ransomware attacks which have included attacks on critical infrastructure. We’ve also seen an increase in attacks on soft targets such as schools and hospitals.

Key discussion points in this panel will include, the reasons why the threat from ransomware is increasing and the best ways to mitigate ransomware risk.

30min

Marco Figueroa

A recognised industry practitioner with extensive senior leadership, cyber security, technology risk and engineering experience in government, [...]

Daniela Fernandez

With over 18 years' experience in IT, Daniela Fernandez is a cyber security and analytics leader, who values integrity, diversity of thought, [...]

Santanu Lodh

Santanu has over 28 years of experience in management of Cyber Security, Risk, and IT. He has proven expertise and skills in Project Management, [...]

Kevin Tham

Kevin is a CISO leader in the Australian Digital Banking sector and a seasoned information security veteran in the financial services industry. [...]

Keynote Presentation – Top Cloud Threats in 2023

Matt Preswick, Enterprise Solutions Engineering, Wiz

Cloud adoption is expanding rapidly, and with that expansion comes new complexities. The speed of growth and change in the cloud creates an ever-changing threat landscape. Wiz Research is at the forefront of the cloud's threat landscape and is behind the discovery of vulnerabilities like ChaosDB, ExtraReplica, AttachMe and OMIGOD. In this session, we will cover the major cloud threats recently seen by the Wiz Research team which includes supply chain risks, data exposure, API security threats, and attack patterns used by groups such as LAP$U$. This session summarizes key insights across customers, Wiz and third-party threat research, and numerous other sources.

30min

Matt Preswick

Matt Preswick is the Enterprise Solutions Engineer for Wiz in APJ, with experience in network, email and cloud security at leading security [...]

Networking Break

15min

Roundtable Discussion – Inspiring & Leading Transformation in Organisational Cybersecurity Culture

Greg Newbegin, Cyber Security Lead ANZ, Lenovo
Kyle Bunting, Software and Solutions Lead AP, Lenovo
The way we work has forever changed, it’s time that the way we lead follow suit. To meet the challenges of a post-pandemic work and workforce, we must explore the ways in which we can build, inspire and lead a team. In this eclectic presentation, you can expect the right side of your brain to light up. To think differently about challenges you and your teams face around relentless Cybersecurity demands. Whether you’re a gearhead, history buff, or just a sponge for new ideas, you’re bound to walk away with relevant and unexpected stories that expand your understanding of the meaning of leadership and help you to create a vision and embark upon a path of transformation for your team.

30min

Greg Newbegin

Greg’s background covers almost 20 years of IT sales experience, with the last 7 years laser focused on cyber security sales and consulting. As [...]

Kyle Bunting

Kyle Bunting leads the Lenovo AP Cybersecurity team. With over 20 years of security, Cloud, SaaS and infrastructure experience, he manages [...]

Roundtable Discussion – A Dynamic and Interactive Session on Adapting to the Hybrid Workplace

David Oakley, Vice President Asia Pacific, Miro
As companies continue to navigate the changing business landscape, adapting to the hybrid workplace has become a critical priority. With different approaches and varying levels of success, staying current with industry trends and initiatives is essential. Our interactive audience-led session provides a unique opportunity to learn from others and gain a comprehensive understanding of the hybrid workplace. During the session, participants can explore new initiatives and areas of focus, benchmark their organisation against others, and engage in discussions about common problems and their solutions. By participating, attendees can gain valuable insights to apply within their own organisation.

30min

David Oakley

[...]

Roundtable Discussion – Are you ready to adopt a new cloud security operation model?

As the use of cloud infrastructure (IaaS and PaaS) continues to soar within organizations, security teams struggle to scale to the needs of the business due to fragmented cloud security stacks and the visibility gaps that persist, making organizations vulnerable to compliance breaches and security threats. With researchers expecting an increase in breaches due to the growing use of cloud services and associated misconfigurations, the existing shortcomings leave organizations with an inability to scale securely. In this session, you will learn how to take a new approach to cloud security by simplifying your security stack and using a new cloud security operation model. Objectives • Best-in-class approach to cloud security – Our customers journey with Wiz • Importance of key relevant personas needed to be involved in the new cloud security operation model • Insights into technologies would be useful to stay in control

30min

Matt Preswick

Matt Preswick is the Enterprise Solutions Engineer for Wiz in APJ, with experience in network, email and cloud security at leading security [...]

Scott Dunion

Scott is an accomplished business leader with over 20 years of experience in the technology industry. As the Regional Head of APJ for Wiz - a [...]

Roundtable Discussion – Death to the VPN! How to properly secure third-party & remote access for IT and OT

Scott Hesford, Director of Solutions Engineering, BeyondTrust
Recent data breaches have shown that organisations continue to struggle with providing secure remote access for employees and third parties alike. Over the past few years VPNs have been stretched to breaking point, with many organisations essentially providing an “access all areas” pass for users. This roundtable will discuss the challenges faced by organisations depending on VPN for secure remote access and look at alternatives for securing the remote connectivity to both Information Technology and Operational Technology.

30min

Scott Hesford

[...]

Roundtable Discussion – Inspiring & Leading Transformation in Organisational Cybersecurity Culture

Greg Newbegin, Cyber Security Lead ANZ, Lenovo
Kyle Bunting, Software and Solutions Lead AP, Lenovo
The way we work has forever changed, it’s time that the way we lead follow suit. To meet the challenges of a post-pandemic work and workforce, we must explore the ways in which we can build, inspire and lead a team. In this eclectic presentation, you can expect the right side of your brain to light up. To think differently about challenges you and your teams face around relentless Cybersecurity demands. Whether you’re a gearhead, history buff, or just a sponge for new ideas, you’re bound to walk away with relevant and unexpected stories that expand your understanding of the meaning of leadership and help you to create a vision and embark upon a path of transformation for your team.

30min

Greg Newbegin

Greg’s background covers almost 20 years of IT sales experience, with the last 7 years laser focused on cyber security sales and consulting. As [...]

Kyle Bunting

Kyle Bunting leads the Lenovo AP Cybersecurity team. With over 20 years of security, Cloud, SaaS and infrastructure experience, he manages [...]

Roundtable Discussion – A Dynamic and Interactive Session on Adapting to the Hybrid Workplace

David Oakley, Vice President Asia Pacific, Miro
As companies continue to navigate the changing business landscape, adapting to the hybrid workplace has become a critical priority. With different approaches and varying levels of success, staying current with industry trends and initiatives is essential. Our interactive audience-led session provides a unique opportunity to learn from others and gain a comprehensive understanding of the hybrid workplace. During the session, participants can explore new initiatives and areas of focus, benchmark their organisation against others, and engage in discussions about common problems and their solutions. By participating, attendees can gain valuable insights to apply within their own organisation.

30min

David Oakley

[...]

Roundtable Discussion – Are you ready to adopt a new cloud security operation model?

As the use of cloud infrastructure (IaaS and PaaS) continues to soar within organizations, security teams struggle to scale to the needs of the business due to fragmented cloud security stacks and the visibility gaps that persist, making organizations vulnerable to compliance breaches and security threats. With researchers expecting an increase in breaches due to the growing use of cloud services and associated misconfigurations, the existing shortcomings leave organizations with an inability to scale securely. In this session, you will learn how to take a new approach to cloud security by simplifying your security stack and using a new cloud security operation model. Objectives • Best-in-class approach to cloud security – Our customers journey with Wiz • Importance of key relevant personas needed to be involved in the new cloud security operation model • Insights into technologies would be useful to stay in control

30min

Matt Preswick

Matt Preswick is the Enterprise Solutions Engineer for Wiz in APJ, with experience in network, email and cloud security at leading security [...]

Scott Dunion

Scott is an accomplished business leader with over 20 years of experience in the technology industry. As the Regional Head of APJ for Wiz - a [...]

Roundtable Discussion – Death to the VPN! How to properly secure third-party & remote access for IT and OT

Scott Hesford, Director of Solutions Engineering, BeyondTrust
Recent data breaches have shown that organisations continue to struggle with providing secure remote access for employees and third parties alike. Over the past few years VPNs have been stretched to breaking point, with many organisations essentially providing an “access all areas” pass for users. This roundtable will discuss the challenges faced by organisations depending on VPN for secure remote access and look at alternatives for securing the remote connectivity to both Information Technology and Operational Technology.

30min

Scott Hesford

[...]

Keynote Speaking Presentation – Cybersecurity Modernisation with A Threat-Informed Defence

Matthew Smith, Assistant Director General Incident Management Branch, Australian Cyber Security Centre, Australian Signals Directorate

The traditional network infrastructure model of centralised corporate data centres secured by on-premises network perimeters does not work today. Data that once resided in data centres is now in the cloud, on SaaS applications, and on endpoints.

This presentation will focus on the need for companies to transform and modernise their approach to cybersecurity, and adapt to the constantly changing threat landscape. Key takeaways will include, the benefits of a threat informed defence and the how to secure assets that sit outside the traditional network perimeter.

30min

Matthew Smith

Matt is responsible for Australian Cyber Security Centre’s (ACSC) incident management functions, including digital forensics, incident response [...]

Speaking Presentation – Moving Beyond Passwords

Lloyd Evans, Head of Identity, LastPass

Our digital footprint relies on passwords. They allow employees, partners, and sometimes customers to access a broad range of tools and systems that enable them to work, collaborate, and transact. However, passwords are also notoriously weak as a security tool, statistics from reports such as the 2022 annual Verizon DBIR show that approximately 80% of breaches are related to credential theft.

To address this issue, Governments in the Asia Pacific region are now recommending the use of password managers to generate complex passwords automatically. Join this session to gain insights into regional cybersecurity trends, understand how human behaviour and organisational culture can lead to cyber threats like phishing, stolen or compromised credentials, and ransomware, and witness how LastPass can fortify your organisation's security posture.

30min

Keynote Speaking Presentation – Robot Magic

Bradley Busch, CISO, AUB Group

The explosion of Machine Learning technology, materials technology and advanced controls systems has seen robots enter our lives in meaningful ways. Whether it is chatbots for customer services, robot vacuums, self-driving cars or autonomous drones; robots are in our hands, our lives and flying over our heads.

In this presentation we will cover the explosion of robotic technology, a quick understanding of machine learning and then dive deep into Magic to understand how we hack the human mind and our robot servants. It isn’t all bad news though, we will also explore ways of protecting robots from hackers.

20min

Bradley Busch

Brad is a CISO and Non Executive Director with experience in Cyber, Agile, DevOps, Digital, Cloud and IT Governance. He focuses on explaining [...]

Networking Lunch

40min

Speaking Session – Why Secure by Design should be your default approach to security practice

Ashwani Ram, General Manager Cybersecurity & Infrastructure, Chartered Accountants ANZ

This session provides insights on how Secure by Design is a proactive and effective approach to security practice that can help organizations prevent security breaches, save time and money, improve user experience, comply with security standards, and protect their reputation.

30min

Ashwani Ram

I have over 27 years of experience providing secure industry best practice IT solutions to organisations within FMCG, food manufacturing, financial [...]

Speaking Session – Shared Responsibility in The Cloud

Didar Chy, Senior Manager, Risk and Control, CCO Commonwealth Bank
Confusion remains around the segregation of responsibilities for cloud security. This leads to unnecessary vulnerabilities and potentially devastating attacks.  Key discussion points in this session are the elements of cybersecurity that are typically addressed by cloud service providers and the elements which must be managed by the customer.

30min

Didar Chy

An aspiring CISO with 20 years' experience of defining IT Strategies and successfully leading large-scale Cyber Security & GRC portfolios in [...]

Keynote Panel Discussion – Becoming The Hunter Instead Of The Hunted With Threat Intelligence, AI and Automation

Panellists:
Anna Aquilina, CISO, University of Technology Sydney
Raghu Gandhy, CISO, Veolia Environmental Services
Chirag Joshi, Director, ISACA, Sydney
Maxime Cousseau, Global Head of Security & IT, Finder
Moderator:
Marc Einstein, Principal Advisor, Focus Network

Organisations need to take a forward-leaning proactive approach to cybersecurity. They need to minimise attacks by identifying them and responding to them before any damage is caused. Threat hunting requires the use of automation and AI to be effective. It also needs access to the best sources of threat intelligence.

This panel will discuss best practices in threat hunting and how companies can become the hunters instead of being the hunted.

30min

Anna Aquilina

An experienced and successful senior executive with broad and deep knowledge of the domestic and international dimensions of cyber security, [...]

Raghu Gandhy

Bio Coming [...]

Chirag Joshi

Bio coming [...]

Maxime Cousseau

Maxime is a cyber security leader with strong business acumen mixed with top-tier technical expertise. He has forged his expertise from [...]

Marc Einstein

Mr. Marc Einstein has over 20 years of telecommunications and digital media industry experience as an analyst, market researcher and consultant. [...]

Closing Keynote Presentation – Modernising Cyber Operations

Nimesh Mohan, Threat And Vulnerability Lead, Coca Cola Europacific Partners

Modernising the SOC involves moving away from traditional manual processes to a more automated approach that integrates threat intelligence and network monitoring tools. 

This can help to identify and respond to threats more quickly and reduce false positives, freeing up analysts to focus on higher-level tasks. 

Adapting technologies like SIEM, UEBA, and SOAR enable SOC teams to aggregate, correlate, and analyse security data from multiple sources in real-time, and automate routine tasks. The goal is to augment and assist human analysts, not replace them entirely.

Join this session to unpack.

  •         Automation of SOC
  •         Modernising the SOC
  •         Moving from traditional SOC approach to a Modern one using threat intelligence and network monitoring.

20min

Nimesh Mohan

Experienced Cyber Security Specialist with a demonstrated history of working in the Consulting, Banking, oil & energy industries. [...]

Closing Remarks From The Chair And End Of The Forum

Anthony Caruana, writer + presenter + facilitator + journalist + consultant, Media-Wize

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Networking Drinks

50min

WHY ATTEND

STAR KEYNOTES
AND PRESENTERS

We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program.

NETWORKING
OPPORTUNITIES

Keeping in line with the main goal of the event in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails and informal introductions.

1-1 PRIVATE
MEETINGS

Allowing both buyers and sellers the opportunity to engage with one another onsite in a series of prearranged business meetings. These provide both parties a great opportunity to build new relationships by interacting face to face.

TARGETED
SESSIONS

Being able to experience different sessions is what makes this event unique; whether you are looking to attend an interactive workshop, roundtable, 1-1 meeting or panel discussion.

NETWORKING
LUNCH

Interacting face-to-face is still one of the most effective ways to do business. During lunch hour you will have the opportunity to do just that in a very relaxed atmosphere.

PERSONALISED
PROGRAM

The summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office.

DOWNLOAD THE POST EVENT REPORT FROM OUR PREVIOUS EVENT

REGISTER YOUR INTEREST

PURCHASE TICKETS

Should you wish to attend this years upcoming 12th Australian CISO Leaders Summit on the 5th September 2023, Melbourne, please purchase your tickets below

1 Ticket

$1990

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
Group Ticket (2 - 4)

$1790

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
GROUP TICKETS (5+)

$1500

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW

LATEST NEWS

Attitude, Language & Approach – Keys to CIO Success – Frank De Sa

Frank De Sa, Chief Information Officer, Just Group Limited The presentation was based around “Attitude, Language & Approach – Keys to […]

Attracting and Retaining IT Top Talent for the Future of Work – Panel Discussion

Panellists: Amanda Bennie, Head of Technology, Cbus Property John Tait, Head of Technology, T2 Tea SAR Raheem, APAC Region Manager, Security & […]

How do you Protect your Company from Ransomware Attacks? – Jason Mantell

Jason Mantell, Director of Sales Engineering APAC, Cloudian Jason spoke about how Cloudian’s data immutability goes beyond protections […]

Understanding risk and the perils of not identifying your risk growth – Damien Lewis

Damien Lewis, Sales Manager, ExtraHop A quantitative risk assessment is great for getting really precise about the potential financial impact, […]

Meet leading IT Security executives from Australia's strongest brands.

Interact and engage with some of the strongest and most powerful brands from across Australia.

“First of all, can I just say this was one of the best conferences I have been to in the last 5 years. The caliber of delegates (and networking opportunities), suppliers and speakers was exceptional. Your team – were so helpful before and during the event. Well done, I'd be very happy to be invited back!”

 

– 20TH CENTURY FOX

'Fantastic event! Congratulations to you and the team. Hands down the best event I have attended as a sponsor since I've been at Genesys. You and your team were extremely professional and helpful in the lead up to the event and I very much appreciate your patience in dealing with the many hurdles along the way. I can't tell you how refreshing that is after the dealings we've had with several other event/conference providers across APAC.'

 

– GENESYS

“Just wanted to thank you and the team for making us feel so welcome and looking after the team during the conference. It was definitely one of the best ones we’ve been to, so well done. When is your next event? Would love to keep the ball rolling on this.”

 

– SHOOTSTA

“I always enjoy the opportunity this summit affords for networking and a general check in on what everyone is doing.”

 

TRAVERS STOW – SIGMA HEALTHCARE

PLATINUM SPONSORS

GOLD SPONSORS


SILVER SPONSORS

BECOME A SPONSOR

MEDIA PARTNERS


RACV City Club, Melbourne
501 Bourke St, Melbourne VIC 3000
Telephone: +61-3-9944-8888
Enquiries: Click here

More Information
Copyright 2023 ©Focus Network. All rights reserved