Join us at the 10th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
27th September 2022, Crown Conference Centre, Melbourne
Join us at the 10th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
27th September 2022, Crown Conference Centre, Melbourne
Summit Themes Key themes and topics are developed by our
standing committee and advisory board from
the country's most respected Security / IT Leaders.
These will be addressed over the course
of the CISO Leaders Summit Australia.

 

Anti Virus

 

Network Security

 

Analytics

 

Cyber Security

 

Mobile & cloud
security

 

Identity
Management

 

Fraud
Protection

 

End Point
Security

Join us at the 10th CISO Leaders
Australia Summit

BE PART OF THIS YEAR’S UPCOMING GATHERING WHERE YOU WILL BE ABLE TO ENGAGE WITH THE COUNTRY’S LEADING IT SECURITY PROFESSIONALS ON THE
27th September 2022, Crown Conference Centre,
Crown Promenade, Melbourne

Join the gathering

ABOUT THE EVENT

The 10th CISO Leaders Australia Summit, Melbourne will take place on the 27th of September at the Crown Conference Centre, Melbourne. The Summit will once again become THE MEETING PLACE for more than 100 of the country’s leading CISOs, Heads of IT Security, Cyber Security and CIOs.

This year’s Summit theme will be focussed on 'Re-evaluating Security Posture to Build a Cyber Security Enterprise' and this message will be delivered via a number of keynotes, workshops and targeted roundtables discussions taking place throughout day.

Attendees will have the opportunity to personalise their own agenda and maximise their time out of the office by engaging in only the most relevant sessions for their business.

Our networking drinks function will provide the chance to interact face to face with peers in a very relaxed setting.

Whilst we are all adjusting to the ‘new norm' and adapting to the challenges and opportunities that COVID-19 brought for us all, we are committed to deliver a great event in a well-managed and safe environment.

We have introduced new event protocols to safeguard the health and wellbeing of all our sponsors, attendees and staff whilst continuing to deliver strong opportunities and engagements.

You can download our Safe Event Guidelines here

SPEAKERS

Chris Bezuidenhout
plus

Chris Bezuidenhout

Managing Director, CIB CIO APAC & Emerging Markets, Deutsche Bank AG

Mitra Minai
plus

Mitra Minai

Chief Information Security Officer, Healthscope Operations

Helen Patton
plus

Helen Patton

Advisory CISO, CISCO Secure

Vinay Manikkam
plus

Vinay Manikkam

Principal, Enterprise Security Architect, IAG

REGISTER YOUR INTEREST

PROGRAM

The summit program is a draft and is subject to change.

Arrival & Registration

40min

Welcome & Introduction

Tyron McGurgan, CEO, Focus Network

5min

Master of Ceremonies, CISO track main plenary

Anthony Caruana, CEO + writer + presenter + facilitator + journalist + media trainer + consultant, Media-Wize
 

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Opening Keynote Presentation – Enabling New Approaches to Organisational Digital Innovation in the Post-Pandemic Era

Chris Bezuidenhout, Managing Director, CIB CIO APAC & Emerging Markets, Deutsche Bank AG
As innovation becomes synonymous with disruption, IT leaders are distinctively set to evolve into innovation leaders. The need to building required competencies, skills to envision technology-driven business change and deliver on their commitments are essential.

30min

Chris Bezuidenhout

Chris is an experienced CIO with a wealth of expertise in technology management, risk, finance and large-scale transformation for employers, [...]

Keynote Presentation – Securing the hybrid workforce using a zero trust approach

Rajan Barara, Director Product Management, Entrust
Bringing security, enablement and order to the new enterprise workforce simply cannot be accomplished by modifying old perimeter-based security solutions. This is simply because the new workforce is not confined to the four walls of an office. Nor is the enterprise digital infrastructure limited to on-premise datacenters. An identity centric approach with a Zero Trust framework can ensure stronger security for critical assets, creates a line of defense against costly breaches and increases worker productivity. In this session, we will learn:
  • The rise of the hybrid workforce (and workplace)
  • How to empower and secure your workforce
  • Simplify security for your IT teams

30min

Rajan Barara

Entrepreneurial Software Product Management Leader passionate about building innovative Identity, Access Management and Data Protection products. [...]

Roundtable Discussion – CISO Track – Zero Trust – Present and Future

Helen Patton, Advisory CISO, CISCO Secure
  • Where are companies on their Zero Trust Journey?
  • What are the barriers to Zero Trust implementation?
  • What developments can we expect in Zero Trust capabilities in the next 18 months?
 

40min

Helen Patton

Information Security is a state of mind, a way of approaching technology as well as business processes, and is an art supported by science. If [...]

Roundtable Discussion – CIO Track – Web3 – Fad or Future?

Roberto Calati, GM Technology – Gaming, Tabcorp

There is an explosion of activity in the area of what has recently been coined ‘Web3’ or Web 3.0 technologies - said to be the future of the internet.

This includes Cryptocurrencies, Non-Fungible Tokens (NFTs), Decentralised Internet, Smart Contracts and the Metaverse.

There is also a lot of commentary about Web3 technologies being a passing fad, a lack of real-world use cases and a lot of hype.

On the positive side, Web3 technologies have the potential to revolutionalise privacy, transition ownership and control of digital assets from large corporations to the individuals that create them and be a key enabler for the Metaverse.

In this roundtable, we will discuss these issues, discuss any use cases or trials that you are involved in or may be aware of, and how to determine if this is something your organisation should be looking at.


40min

Roberto Calati

Over 15 years experience in Technology, across a number of industries (Banking, Logistics, Retail, Telecommunications) and ASX listed [...]

Roundtable Discussion – CISO Track – Cyber Security Issues Affecting Australia

Chris Gatford, Co-Founder / CEO, Hacktive
  • Ransomware Readiness
  • Vulnerability Scorecard
  • Security Awareness “Patching your People”

40min

Chris Gatford

Hacktive have a range of services to enable Secure IT Functions. We focus on helping our clients understand the security vulnerabilities of [...]

Roundtable Discussion – CIO Track – Building a More Resilient and Adaptable Enterprise Through Technology

Ian Padgham, General Manager Enterprise Technology, Vicinity Centres
  • Driving the principles of agile delivery to create a more flexible organisation that’s adaptable to constant change & volatility
  • Rethinking tech funding and governance
  • Empowering both human and technology-centred solutions

40min

Ian Padgham

Ian Padgham joined Vicinity Centres in June 2015 as part of the Merger of Federation Centres and Novion Property Group (Novion) and has more than [...]

Networking Break

15min

Workshop 1 – CISO Track – Keeping pace with evolving regulatory and cyber landscapes

Venkata Krishna,Senior Manager Information Security, Salesforce
As we grapple with the rapidly changing threat and regulatory environments, it is important for organisations to take a step back to reflect on their business strategy and adapt their security and compliance stance accordingly. This is doubly so for cloud providers like Salesforce. This session will cover:
  • These evolving landscapes as we see them
  • How we measure our success
  • How we embed TRUST into everything we do
  • What we have learnt - not only from within, but also from our customers.

30min

Venkata Krishna

Bio Coming [...]

Workshop 1 – CIO Track – Securing Endpoints and Ensuring Compliance

Matthew Burns, Associate Vice President, BigFix, Asia Pacific & Japan, HCL BigFix
Enterprises are under increasing pressure to protect data from breaches in an aggressive attack environment. Security professionals must re-evaluate their security software to adjust for new threats and risk with an eye on reducing complexity. In this session, you will hear;
  • How are enterprises dealing with compliance challenges around distributed workforces?
  • What are the key trends around data breaches, and how can organizations defend against those risks?
  • How can organizations consolidate security toolkits and software?

30min

Matthew Burns

Matthew Burns is responsible for customer satisfaction and solution responsibility for the BigFix business in the Asia Pacific and Japan. He has [...]

Workshop 2 – CIO Track – Adopting AI to Enhance Your Data and Analytics Capability

Venkata Valluri, Global IT Director, Treasury Wine Estates
  • Importance in leveraging AI and advanced analytics in driving value creation
  • Dealing with the data deluge across multiple systems
  • Implementing data governance to break data silos for effective data centralisation

30min

Venkata Valluri

Venkata is currently the Global IT Director Analytics and Insights for Treasury Wine Estates. He is a skilled data management and analytics [...]

Workshop 2 – CISO Track – CISOs & Board – Are you speaking the same language?! How to translate your technical cyber language and have an effective risk-based discussion with the Board

Mitra Minai, Chief Information Security Officer, Healthscope Operations
Take-aways from this session:
  • Translate the technical language of Cyber Risk and align with business strategy and objectives
  • Techniques in presenting the Cybersecurity Strategy and Roadmap to the Board
  • Demonstrating the business value of cybersecurity
  • Cybersecurity Metrics and Dashboard reporting
  • Moving the organization from Cyber Defense to Cyber Resilience
 

30min

Mitra Minai

Mitra is a senior Technology and Security Transformation executive with over 20 years’ experience working in the Health, Financial and [...]

Roundtable Discussion – CIO Track – Innovate from Anywhere: succeeding in the next normal

Michael Niall, Regional Director, Platform, Salesforce

If the past year has taught us anything, it's that digital transformation is an urgent priority for Australian businesses. But as we accelerate the shift from information to innovation, we need to be acutely aware of changes in our customer and employee expectations.

Join us for an interactive discussion for insights on some of the key contributors to your success, including:

  • Enabling work from anywhere
  • Why culture matters now more than ever, and
  • Growing your innovation talent pool

40min

Michael Niall

A high performing, strategic sales leader with a proven track record in helping enterprises achieve business outcomes. I have more than 15 [...]

Roundtable Discussion – CISO Track – Modernising your Application Security Playbook using RASP

Reinhart Hansen, Director of Technology, Office of the CTO, Imperva
In this roundtable, Reinhart will discuss:
  • Preventing exploitation of application vulnerabilities you don’t yet know you have
  • How to mitigate falling victim to Software Supply chain attacks
  • Zero-day attacks require better than zero-day mitigation. Moving from reactive to proactive mitigation.
  • Save yourself from the headache and cost of emergency application patching cycles.

40min

Reinhart Hansen

Experienced Cyber Security & IT professional with a demonstrated history of working in technology advisory, architecture, solution design and [...]

Roundtable Discussion – CISO Track – Emerging AppSec Trends in 2022 and Beyond

Randeep Chhabra, General Manager, AppScan, Asia Pacific & Japan, HCL Software AppScan
Today Enterprise Applications are one of the most valuable IT asset for organizations, as these applications run critical business processes, conduct transactions and deliver offerings.  These applications are being built at the speed of DevOps to address aggressive Time to Market and Agility requirements.  Prioritizing speed without security in app development can lead to an uptick in critical vulnerabilities with disastrous results. To avoid this, organizations must address security earlier in the software development life cycle. While the security technologies across networking and operations are more commonly implemented to high standards, we see unique challenges and trends faced by clients in implementing effective application security programs. Join the HCL Software AppScan roundtable session for a robust discussion on the following:
  • How are CISOs improving processes to integrate security into DevOps, and what challenges do they face?
  • What are the practices, techniques and strategies that can be used to achieve better application security?
  • What are the key trends for 2022 and beyond?

40min

Randeep Chhabra

Randeep Chhabra leads the HCL AppScan business across Asia Pacific and Japan at HCL Software. Randeep has been actively working for more than a [...]

Roundtable Discussion – CIO Track – Driving Your Competitive Advantage with Cloud-First Identity and Access Management

Dragan Vladicic, Senior Manager, Solutions Engineer, Asia Pacific, Okta

These days, many organizations are operating their IT environment in a hybrid state. While the cloud has allowed organizations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future.

And while the efficiencies of a cloud-first approach are well established, organizations and their employees find it difficult to move back-and-forth between their SaaS apps on one side of the hybrid state, and those legacy applications that need to remain within the on-premises data center.

Identity technologies help ease the pain of moving between these two worlds, and organizations relying on legacy solutions can create friction within their business, with disjointed architectures that create duplicate capabilities. This inconsistent and slow integration experience can create issues for employees who rely on SaaS for their daily work but might need to access on-premises apps for critical projects.

How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organizations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)? What are the best ways for organizations to leverage newer technologies to help scale their infrastructure to meet customer needs?


40min

Dragan Vladicic

Bio coming [...]

Networking Lunch

40min

Workshop 3 – CIO Track – Setting up and scaling data for success

Kris Gardiner, Head of Data and Analytics, Linfox

Key takeaways the audience will learn from this session

  • Leveraging data for the right reasons
  • Creating a multi speed data ecosystem
  • Build for the now, design for the future

30min

Kris Gardiner

Kris is known as an expert in creating and managing highly functional teams that deliver and manage enterprise wide data solutions with a [...]

Workshop 3 – CISO Track – How Devolved Cyber Security Created a Leap Forward in Our Cyber Security Posture

Charles Sterner, CISO, AARNet
David Wilde, CTO, AARNet
At AARNet, we’ve begun an ambitious and significant uplift program to aggressively grow our cyber security capabilities to meet the challenges of the modern threat landscape. Core to our strategy is the concept of “devolved cyber security.” Our session will discuss what this means to AARNet, how we’ve leveraged out of the both thinking to manage our risks, and where we see this going over the next 5 years.

30min

David Wilde

David Wilde is the Chief Technology Officer of AARNet, Australia’s Academic and Research Network.  AARNet connects more than two million end [...]

Charles Sterner

Charles is the Chief Information Security Officer for AARNet, leading AARNet’s cyber security strategy. His role oversees the development of [...]

Workshop 4 – CISO Track – Adopting a pragmatic Zero Trust Strategy

Vinay Manikkam, Principal, Enterprise Security Architect, IAG
In this workshop Vinay will share his insights and experience on adopting a Zero Trust Strategy , touching on:
  • Introducing a Zero Trust Framework that is relatable to stakeholder
  • Integrating Zero Trust foundation and quick wins with your enterprise cyber security strategy
  • Planning Zero Trust maturity investments to address tactical and strategic cyber risk and resilience objectives

30min

Vinay Manikkam

Vinay Manikkam is a seasoned and well-rounded cyber security professional who has worked with several large multinational and ASX 100 listed [...]

Workshop 4 – CIO Track – RPA – A Strategy for Integration and User Experience

Imtiaz Bhayat, Chief Information Officer, Regis
Takeaways
  • RPA creates an exceptional user experience at the transactional layer and forms part of an integration strategy
  • The steps towards implementation are easy and ongoing management is vital
  • Implementation creates a platform to move more towards AI/

30min

Imtiaz Bhayat

Imtiaz is a senior executive and a leader with broad commercial experience in tier 1 consulting, industry, and universities. Over the past 20 [...]

Keynote Presentation – Addressing Diversity and Digital Skills Deficiency in a Rapidly Changing Future

Jennifer Rebeiro, Chief Information Officer, Greater Western Water
  • The importance of reskilling and upskilling as new roles emerge and skills requirements change.
  • Leverage the experts you already have on staff and creating an extensive career path.
  • Adopting more inclusive hiring practices outside of traditional talent pools.

30min

Jennifer Rebeiro

Jennifer is the Chief Information Officer at Greater Western Water and was named 5th in the CIO50 of Australia in 2021. She has led teams across [...]

Closing keynote presentation – Prioritising Integration of Governance, Risk and Compliance in Cybersecurity in the New Normal

Vijay Narayan, Chief Information Security Officer, Environment Protection Authority
  • Re-emphasized the importance of data protection through a multitude of mandates
  • Implementation of security controls on cloud components
  • Providing leadership with timely, comprehensive risk and compliance-related reporting
 

35min

Vijay Narayan

Vijay is currently the Chief Information Security Officer at Environment Protection Authority. He is a subject matter expert in Information [...]

Networking Drinks

40min

Arrival & Registration

35min

Welcome & Introduction

Tyron McGurgan, CEO, Focus Network

5min

Master of Ceremonies, CIO track

Luke Hannan, lukehannan.com.au, MOC
 

10min

Luke Hannan

Luke founded his Professional Master of Ceremonies business www.lukehannan.com.au on 3 key principles; Service, Preparation & Delivery. Based [...]

Master of Ceremonies, CISO track

First session in this track will begin at 11:05am.

10min

Opening Keynote Presentation – Secure supply chain: the how and why of securing small business

Narelle Devine CSM, Chief Information Security Officer Asia Pacific, Telstra
  • Why small business security matters
  • How big business can help small businesses get secure
  • Avoiding old habits and pitfalls
  • Tales from the trenches

30min

Narelle Devine CSM

As Telstra’s Chief Information Security Officer Asia Pacific, Narelle is responsible for the company’s cyber security operations, [...]

Keynote Presentation – Mitigate the impact of cyber incidents by ensuring you can resume operations rapidly

Dr Jerry Vochteloo, Field CTO, Asia Pacific & Japan, Data Protection Solutions, Dell Technologies

Cyber risks are relentless and ensuring your organisation has the ability to recover from a ransomware or broader cyber event is critical in this digital transformation era. The recent passing of both parts of the Critical Infrastructure amendments, illustrates the Australian Government’s focus in elevating the security bar.

Cyber resilience is a capability that requires the close co-operation of the both the Security and IT teams. This talk will discuss a number of simple steps organisations can take to increase their resilience in the face of an attack that either corrupts or destroys IT infrastructure and data.

30min

Dr Jerry Vochteloo

Jerry has had a very diverse and broad career in IT: working in research, education, services and sales Jerry currently works for Dell [...]

Panel Discussion – Building a resilient and agile, data driven enterprise

Panellists:

Khurram Waheed, Principal Security Architect, Extrahop
Iain Hart, Head of Technology & CISO, The Australian Institute of Company Directors
Chirag Joshi, Director, ISACA Sydney

Moderator:

Luke Hannan, MOC, www.lukehannan.com

For today’s businesses, success means being data-driven. Generating value from vast amounts of data, engendering innovation and having agile and scalable business models necessitates the use of cloud technologies wherever possible. But adoption of new technologies creates risk which must be managed.

Cybersecurity postures need to be transformed to ensure that enterprises have visibility across expanded attack surfaces and are able to minimize the damage caused by breaches. This session will discuss accelerated adoption of new technologies as businesses rapidly digitalize, as well as the new cybersecurity risks that are created. We will also discuss the best ways to manage these risks to build resilience into your organisation.

35min

Iain Hart

I am an experienced IT professional with a career spanning more than 25 years working across a range of industries, including Banking and [...]

Khurram Waheed

* CyberSecurity (NDR) solutions architect * Award-winning specialist, and consistent over-achiever * Product experience with ExtraHop, Cisco, [...]

Chirag Joshi

Chirag has extensive experience building and managing cyber security, risk management, and compliance programs in multiple countries across [...]

Luke Hannan

Luke founded his Professional Master of Ceremonies business www.lukehannan.com.au on 3 key principles; Service, Preparation & Delivery. Based [...]

Networking Break

20min

One-to-One Meetings 1

30min

Workshop 1 – CIO Track – Redefining Data Migration for the Modern Enterprise

Simon Mitrevski, Manager, Solutions Consulting, Carbonite + Webroot, an OpenText company

Migrating workloads for any environment can be a resource intensive and expensive exercise to perform. For many organisations that run on legacy, on-premise technology stacks; moving to the cloud or other environments can potentially drive complete overhaul of operations if complexities are not managed correctly; increasing costs and impacting business continuity in the process.

Now you can achieve agile migration in a secure, scalable and simple manner using automation and real-time byte-level replication.

Join Simon Mitrevski, Manager, Solutions Consulting at Carbonite + Webroot, an OpenText company, to discover a painless way to migrate your data with minimal risk and near-zero downtime.

In our session, we unveil:

  • Best practices and tips to reduce the complexity of migrating workloads to the cloud, or from cloud-to cloud environments
  • How to reduce costs by aligning a fit-for purpose infrastructure for your workloads
  • Strategies to increase agility of operations and how to migrate at scale

30min

Simon Mitrevski

Bio coming [...]

One-to-One Meetings 2

30min

Workshop 2 – CIO Track – Setting up and scaling data for success

Kris Gardiner, Head of Data and Analytics, Linfox
This workshop will outline:
  • Leveraging data for the right reasons
  • Creating a multi speed data ecosystem
  • Build for the now, design for the future

30min

Kris Gardiner

Kris is known as an expert in creating and managing highly functional teams that deliver and manage enterprise wide data solutions with a [...]

Workshop 2 – CISO Track – The Anywhere Workforce: Securing the Hybrid Workforce in the New Normal

Rassoul Ghaznavi Zadeh, Director of Information Security, ResMed
  • Examining identity protection tools existing internally and using it to protect from attacks.
  • Adopting Zero Trust methodologies to prevent, detect and respond to cyber security incidents.
  • Taking advantage of more robust security in the cloud and having a strong cloud posture.

30min

Rassoul Ghaznavi Zadeh

Rassoul is an Information Security expert, leader, author of a few cyber security books, online and university instructor, and active member of [...]

Roundtable Discussion – CISO Track – Gaining complete cloud visibility as you scale

David Hayes, Area Director, Australia & New Zealand, Lacework
Ryan Johnson, Director, Sales Engineering, APAC, Lacework

More and more elite performing organisations are delivering innovation at record speed, while maintaining confidence in their overall security, which is setting a precedent for the new cloud generation of builders. To keep pace, you need to be able to see the entirety of your cloud footprint to be able to effectively configure and secure it, which is paramount as you continue to innovate, build, and scale in cloud and containerised environments.

Join the discussion with Lacework and your peers to hear best practices and insights into how these organisations have gained full cloud visibility and security saving them valuable time to focus on safely scaling their business in the cloud.

40min

Ryan Johnson

Bio [...]

David Hayes

I have extensive experience in solution sales in all aspects of: Network and Application Performance Management Solutions Data Centre [...]

Roundtable Discussion – CIO Track – The New Management Approach: Focusing on Productivity Measures vs. Time Measures

Craig Chu, Project Director, Westpac

This roundtable will focus on:

  • Focus on outcome KPIs rather than time-sheet recording;
  • Working in a hybrid team;
  • Attracting talent

40min

Craig Chu

Technology leader with solid experience collaborating at senior levels using deep understanding of technology, banking, and financial services to [...]

Roundtable Discussion – CISO Track – Defend Your Data: Refuse the Ransom

Roland Browne, Senior Systems Engineer & cybersecurity specialist, Cohesity

Cybercriminals are getting more inventive and they’re not only locking up production systems and destroying backups—now they are stealing your confidential data. It’s estimated that global ransomware damage will cost $256B* in 2031. Don’t be the next victim.

Join Cohesity for an intimate roundtable discussion where together, we will explore and learn what is the current landscape of Cyberattacks and how to handle and mitigate the threats to our data and systems.

Topics of discussion will include:

  • How to protect your backed-up data against ransomware attacks whilst improving team collaboration by eliminating platform, people, and process silos?
  • Why recovery is a key component of a good cyber security strategy?
  • How to rapidly recover data while reducing business impact?
  • What are the ways to strengthen data security and cyber resiliency?

40min

Roland Browne

Bio coming [...]

Roundtable Discussion – CIO Track – Creating an Agile, Resilient and Sustainable Organisation Through Digitalisation

Christopher Johnson, Head of Group Technology, Charter Hall
  • Drawing up a digital-first operation model and technology-led capabilities strategy.
  • Setting up a digital knowledge hub to showcase the impact of digital in transforming business.
  • Leveraging on new age technologies and collaborative ways of working to accelerate innovations.

40min

Christopher Johnson

Christopher Johnson has been working in the IT industry for more than 25 years, across marketing, telecommunications, publishing, professional [...]

Networking Lunch

45min

One-to-One Meetings 3

30min

Workshop 3 – CIO Track – Adopting AI to enhance your data and analytics capability

Jenny Wu, Director, Deloitte

Artificial Intelligence can drive cars, trade stocks and shares, lean to carry out complex skills simply by watching You Tube videos, translate across dozens of different languages, recognise human faces with more accuracy than we can, and create original hypotheses to help discover new drugs for curing diseases.

One of the major computing methods and enablers of artificial intelligence is machine learning, which involves teaching computer programs to learn by find patterns in data. The more data, the more the computer system improves.

In this session, Jenny will focus on the common challenges many organisations experience in using machine learning (ML) methods to help with decision making, what it takes to integrate AI and machine learning into everyday business processes and explore potential routes to embark on the adoption journey.



30min

Jenny Wu

Jenny came into consulting with 15 years of industry experience in financial services. As a statistician by training, she commenced her career as [...]

Workshop 3 – CISO Track – AI and Cybersecurity

Dr. Sharif Abuadbba, Senior Research Scientist - Cybersecurity, CSIRO's Data61

Recently, there has been an increase in the application of Artificial intelligence (AI) technologies to support cyber-attacks, such as cyber intrusion, data theft and data compromise.

Future AI-driven cyber-attacks are expected to be more precise, targeted and tailored by training data to activate only in the presence of specific information or other cues. They will also be adaptable to a much greater extent than traditional rule-based phishing and malware.

Traditional approaches of hardening defences are unlikely to yield success against these advanced threats on their own, as this strategy relies heavily on complete coverage of all system loopholes that attackers might exploit, at all times.

Malicious learning processes will also be harder to detect, by virtue of the sophisticated detonation mechanisms and ability to mimic benign processes and behaviours.

Employing AI for Cybersecurity to solve these challenges can be a double-edged sword as it can be used for both cyber defence and cyber-attacks. Besides, AI itself is not a silver bullet and can be exploited.

In this session, I’ll focus on two aspects:

  • (a) presenting a few real-world examples of developing novel AI based algorithms for cyber defence,
  • (b) exploring the security of deployed AI algorithms and developing corresponding countermeasures.

30min

Dr. Sharif Abuadbba

Dr Sharif Abuadbba has a PhD in computer security from RMIT University, Australia 2017. Sharif has 30+ publications and submissions in [...]

One-to-One Meetings 4

30min

Keynote Presentation – The Everywhere Workplace: Planning and Preparing for a Hybrid Workplace

Dr. Ashish Bharadwaj, CIO, Torrens Global Education Services
  • Rethinking communication, training and development, knowledge exchange and psychological needs.
  • Reimagining the office space while knowing the specific requirements needed for the home workplace.
  • Reinforcing integrity, security, privacy and liabilities policies while putting in place a contingency plan.


30min

Dr. Ashish Bharadwaj

Dr. Ashish Bharadwaj is an executive, technologist and educator with over 20 years of rich experience in delivering impactful technology and [...]

Keynote Presentation – Adopting an Inside Out Approach to Cyber Security

Iain Hart, Head of Technology & CISO, The Australian Institute of Company Directors
This session will focus on: 
  • Protecting our information assets continues to grow more complex 
  • Deep focus on external threats can still leave us exposed  
  • Adopting an Inside Out approach can help us address our biggest risk 

30min

Iain Hart

I am an experienced IT professional with a career spanning more than 25 years working across a range of industries, including Banking and [...]

Closing Keynote Presentation – Enabling New Approaches to Organisational Digital Innovation in the Post-Pandemic Era

Chris Bezuidenhout, Managing Director, CIB CIO APAC & Emerging Markets, Deutsche Bank AG

As innovation becomes synonymous with disruption, IT leaders are distinctively set to evolve into innovation leaders. The need to building required competencies, skills to envision technology-driven business change and deliver on their commitments are essential.

 

30min

Chris Bezuidenhout

Chris is an experienced CIO with a wealth of expertise in technology management, risk, finance and large-scale transformation for employers, [...]

Networking Drinks

60min

WHY ATTEND

STAR KEYNOTES
AND PRESENTERS

We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program.

NETWORKING
OPPORTUNITIES

Keeping in line with the main goal of the event in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails and informal introductions.

1-1 PRIVATE
MEETINGS

Allowing both buyers and sellers the opportunity to engage with one another onsite in a series of prearranged business meetings. These provide both parties a great opportunity to build new relationships by interacting face to face.

TARGETED
SESSIONS

Being able to experience different sessions is what makes this event unique; whether you are looking to attend an interactive workshop, roundtable, 1-1 meeting or panel discussion.

NETWORKING
LUNCH

Interacting face-to-face is still one of the most effective ways to do business. During lunch hour you will have the opportunity to do just that in a very relaxed atmosphere.

PERSONALISED
PROGRAM

The summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office.

DOWNLOAD THE POST EVENT REPORT FROM OUR PREVIOUS EVENT

REGISTER YOUR INTEREST

PURCHASE TICKETS

Should you wish to attend this years upcoming 10th Australian CISO Leaders Summit on the 27th September 2022, Melbourne, please purchase your tickets below

1 Ticket

$1990

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
Group Ticket (2 - 4)

$1790

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
GROUP TICKETS (5+)

$1500

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW

LATEST NEWS

CIO Track – Creating an Agile, Resilient and Sustainable Organisation Through Digitalisation – Christopher Johnson

Christopher Johnson, Head of Group Technology, Charter Hall Key takeaways from this session: Drawing up a digital-first operation […]

CISO Track – Defend Your Data: Refuse the Ransom – Roland Browne

Roland Browne, Senior Systems Engineer & Cybersecurity Specialist, Cohesity In this session, Participants learned what is the current […]

CIO Track – The New Management Approach: Focusing on Productivity Measures vs. Time Measures – Craig Chu

Craig Chu, Project Director, Westpac Key takeaways: Focus on outcome KPIs rather than time-sheet recording; Working in a hybrid team; […]

CISO Track – Gaining complete cloud visibility as you scale – Lacework Roundtable

David Hayes, Area Director, Australia & New Zealand, Lacework Ryan Johnson, Director, Sales Engineering, APAC, Lacework More and more […]

Meet leading IT Security executives from Australia's strongest brands.

Interact and engage with some of the strongest and most powerful brands from across Australia.

“First of all, can I just say this was one of the best conferences I have been to in the last 5 years. The caliber of delegates (and networking opportunities), suppliers and speakers was exceptional. Your team – were so helpful before and during the event. Well done, I'd be very happy to be invited back!”

 

– 20TH CENTURY FOX

'Fantastic event! Congratulations to you and the team. Hands down the best event I have attended as a sponsor since I've been at Genesys. You and your team were extremely professional and helpful in the lead up to the event and I very much appreciate your patience in dealing with the many hurdles along the way. I can't tell you how refreshing that is after the dealings we've had with several other event/conference providers across APAC.'

 

– GENESYS

“Just wanted to thank you and the team for making us feel so welcome and looking after the team during the conference. It was definitely one of the best ones we’ve been to, so well done. When is your next event? Would love to keep the ball rolling on this.”

 

– SHOOTSTA

“I always enjoy the opportunity this summit affords for networking and a general check in on what everyone is doing.”

 

TRAVERS STOW – SIGMA HEALTHCARE

DIAMOND SPONSOR

PLATINUM SPONSOR

GOLD SPONSORS

SILVER SPONSORS

BECOME A SPONSOR

OUR PARTNERS


Crown Conference Centre
Crown Promenade, Crown Melbourne, 8 Whiteman Street, Southbank VIC 3006
Telephone: +61-2-9292-6222
Enquiries: Click here

More Information
Copyright 2022 ©Focus Network. All rights reserved