Join us at the 14th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
3rd September 2024, Grand Hyatt Hotel, Melbourne
Summit Themes Key themes and topics are developed by our
standing committee and advisory board from
the country's most respected Security / IT Leaders.
These will be addressed over the course
of the CISO Leaders Summit Australia.

 

Anti Virus

 

Network Security

 

Analytics

 

Cyber Security

 

Mobile & cloud
security

 

Identity
Management

 

Fraud
Protection

 

End Point
Security

Join us at the 14th CISO Leaders
Australia Summit

BE PART OF THIS YEAR’S UPCOMING GATHERING WHERE YOU WILL BE ABLE TO ENGAGE WITH THE COUNTRY’S LEADING IT SECURITY PROFESSIONALS ON THE
3rd September 2024, Grand Hyatt Hotel, Melbourne

Join the gathering

ABOUT THE EVENT

The 14th CISO Leaders Australia Summit, scheduled for September 3rd, 2024, at the Grand Hyatt Hotel in Melbourne, will once again serve as the premier gathering for more than 150 of the state’s foremost CISOs, Heads of IT Security, Cyber Security experts, and IT executives.

The theme for this year’s summit revolves around “Managing Cybersecurity Complexity in an AI-Driven World“, this message will be conveyed by a distinguished assembly of thought leaders through keynote addresses, panel discussions, interactive workshops, and focused roundtable conversations.

Attendees will have the opportunity to tailor their own agendas, allowing them to optimize their time away from the office by participating in sessions most pertinent to their specific business needs.

Additionally, the networking opportunities available throughout the event will enable senior security executives to engage directly with a carefully curated group of technology vendors through pre arranged business meetings. These vendors will be showcased throughout the day, providing valuable assistance to leading security executives modernisation initiatives. These engagements ensure that businesses remain at the forefront of adopting new technologies, aligning their investment strategies with their overarching business goals.

SPEAKERS

Dr Alan D. Thompson
plus

Dr Alan D. Thompson

World expert in AI

Sanja Marais
plus

Sanja Marais

Chief Technology and Security Officer, Aspen Medical

Nigel Hedges
plus

Nigel Hedges

Chief Information Security Officer, Chemist warehouse

Chris Goldsmid
plus

Chris Goldsmid

Acting Assistant Commissioner, Australian Federal Police Cybercrime Operations

REGISTER YOUR INTEREST

PROGRAM

The summit program is a draft and is subject to change.

Registration, Badge Collection & Refreshments

45min

Welcome and Introduction & Master of Ceremonies

5mins

Opening Keynote Presentation: Focus Network Insights

Andrew Milroy, VP & Head of Research, Focus Network
Ross O’Brien, Principal Advisor, Focus Network

This presentation will explore the current state of cybersecurity in Australia and the challenges and opportunities facing Chief Information Security Officers (CISOs) in today's rapidly evolving threat landscape. Drawing on the latest industry research and analysis by Focus Network analysts, the presentation will provide insights into the key trends and emerging technologies that are shaping the CISO role.

During this session we will delve deeper into areas that cover:

  • The evolving nature of cyber threats and the importance of proactive risk management
  • The role of the CISO in driving a culture of cybersecurity across the organization
  • The impact of digital transformation on cybersecurity and the challenges of securing cloud, mobile, and IoT
  • environments
  • The emerging technologies and strategies for enhancing cybersecurity, including AI (particularly Generative AI), machine learning, and zero trust.
  • Cybersecurity best practices
 

20min

Andrew Milroy

Andrew Milroy leads the research and advisory business at Focus Network. His work involves empowering organisations to make decisions more [...]

Ross O’Brien

Ross is a writer, commentator, research manager and consultant. His analysis centres on the impact information technologies have on Asia’s [...]

Keynote Presentation – Artificial intelligence and your business

Dr. Alan Thompson, World Expert in Artificial Intelligence
This year has brought about an explosion in the world of artificial intelligence. The impact on the business landscape—and beyond—is completely transformative. This keynote explores the current trajectory of AI, its use cases in your industry, and the effects of such a revolution.

25min

Dr Alan D. Thompson

Alan D. Thompson is a world expert in artificial intelligence (AI), specializing in the augmentation of human intelligence, and advancing the [...]

Keynote Panel Discussion: AI in the Enterprise: Balancing Innovation and Security

Panellists:
Moderator:
 

Join our expert panel as we explore the intersection of AI, innovation, and security in the enterprise. Our discussion will delve into the opportunities and challenges of AI adoption, from driving business growth to mitigating cyber threats. CIOs and CISOs alike will gain valuable insights on how to harness the power of AI while ensuring the security and integrity of their organisations.

30min

Keynote Presentation

30mins

Networking Break

15mins

Breakout Session: Moving into AI-Powered Email Security in 2024

30min

Breakout Session: Reducing Complexity with a Cybersecurity Mesh. Are You Ready to Adopt a New Cloud Security Operation Model?

30min

Breakout Session: Backup ≠ Cyber Recovery: Navigating the Shift in Required Capabilities and Shared Responsibilities between IT and Cyber Teams

30min

Breakout Session: Driving the Right Work to the Right Resource at the Right Time

30min

Keynote Speaking Presentation: Unmasking cybercrime, the law enforcement response

Chris Goldsmid, Acting Assistant Commissioner, Australian Federal Police Cybercrime Operations

AFP Acting Assistant Commissioner Chris Goldsmid will deliver a presentation to the CISO Leaders Summit 2024 on the cybercrime threat and the work law enforcement is doing to counter cybercriminals. The presentation will take attendees through the latest information on the cybercrime threat environment and ecosystem, the role of law enforcement in responding to cybercrime and major cyber incidents, as well as a case study into the takedown of international cybercrime syndicates.

20min

Chris Goldsmid

I joined the AFP 21 years ago. Over that time, I’ve worked across a range of interesting fields investigating drug importation, corruption, [...]

Keynote Speaking Presentation: Reducing Risk with Modern Identity Management

Nigel Hedges, Chief information security officer, Chemist Warehouse

In today's digital age, effective identity management is crucial for mitigating risks and safeguarding valuable assets. Delve into innovative strategies and technologies designed to empower organisations to navigate the complexities of identity management effectively. Gain invaluable insights to enhance security and stay ahead in an ever-evolving landscape.


20min

Nigel Hedges

I provide CISO-level leadership in an enterprise setting. I enjoy strategy, program development, operations and building & developing an [...]

Speaking Presentation

30min

Breakout Session: Walking a Tightrope Between Security and Productivity

30min

Breakout Session: The Essential Eight: Overcoming Your Challenges with PAM

30min

Breakout Session: Convenience vs. Security: Can We Win in Digital Identity?

30min

Breakout Session: Harnessing Mobile Devices to Drive Digital Productivity

30min

Networking Lunch

35min

Keynote Panel Discussion: Breaking Barriers: Empowering Women in Cybersecurity and Tech – Strategies for Attracting and Retaining Female Talent

Panellists:
Sanja Marais, Chief Technology and Security Officer, Aspen Medical
Moderator:

Delve into the critical issue of gender diversity in cybersecurity and technology fields. With women still significantly underrepresented in these sectors, this discussion aims to explore effective strategies for attracting and retaining female talent. Our panellists will share insights, experiences, and actionable solutions to bridge the gender gap and foster greater diversity and innovation in these rapidly evolving industries.

30min

Sanja Marais

Sanja is an accomplished ICT executive with a strong focus on cybersecurity, compliance, and technology management. She excels in driving digital [...]

Speaking Session: Empathy in Cybersecurity Leadership: Navigating Beyond Conventional Wisdom

Stephen Bennett, Group Chief Information Security Officer, Domino’s Pizza Enterprises

Join Stephen for an in-depth session where he’ll challenge the conventional wisdom that a business-aligned cybersecurity strategy is the ultimate solution. Despite the widespread belief and significant support from top management, experience tells him that the path remains fraught with challenges and frustrations, even with a strategy that seems perfectly aligned.

Stephen will explore the critical, yet often overlooked, element of empathy.

He will discuss how even the most well-aligned cybersecurity strategies don't automatically guarantee success – things won't just magically fall into place. He’ll share insights into how adopting an empathetic leadership approach and focusing on strategic relationship-building can lead to a more nuanced and effective cybersecurity posture.

Expect to learn how this can redefine our metrics, enhance collaboration, and foster a security culture that transcends mere alignment with business goals. I invite you to join Stephen in exploring practical strategies and personal insights on how to navigate beyond the conventional, toward a more holistic and impactful approach to cybersecurity leadership.

30min

Stephen Bennett

Stephen has over 30 years of experience in the security and technology space, working with large enterprise organizations in various market [...]

Keynote Speaking Session: The Growing Importance of Breach and Attack Simulation

How can enterprises assess their cybersecurity readiness? Breach and attack simulation can help organisations to uncover gaps in the cybersecurity posture and enhance overall cybersecurity outcomes.

This presentation discusses the importance of breach and attack simulation and how it can be used to close gaps rapidly.

20min

Closing Keynote Panel Discussion: Navigating Future AI Threats (and What to do with Them)

Panellists:
Moderator:
Andrew Milroy, VP & Head of Research, Focus Network

In our rapidly advancing technology landscape, the rise ascent of artificial intelligence (AI) and automation has not just transformed industries but has also presented fresh challenges in the cybersecurity domain. As both businesses and individuals embrace AI, this panel discussion will delve into the possible threats linked to its utilisation and the inventive solutions that can protect our digital future.

30min

Andrew Milroy

Andrew Milroy leads the research and advisory business at Focus Network. His work involves empowering organisations to make decisions more [...]

Closing Remarks

Anthony Caruana, CEO, Media-Wize

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Networking Drinks

60min

Registration & Morning Refreshments

55min

Welcome & Introduction – Master of Ceremonies

Anthony Caruana, CEO, Media-Wize

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Opening Keynote Presentation – The Voice of the CISO in Australia

Andrew Milroy, VP and Head of Research, Focus Network

This presentation will share Focus Network’s latest CISO research findings. It will highlight the latest cybersecurity trends in Australia and the challenges and opportunities facing CISOs.  It will place particular focus on the increasing need for CISOs to do more with less.

During this session we will delve deeper into:

  • The need for a cybersecurity posture that can continuously adapt to a dynamic threat environment.
  • Improving cybersecurity outcomes with stagnant or declining budgets.
  • Embedding generative AI into security operations.
  • Lessons learned from recent high-profile attacks.
  • Improving cybersecurity maturity and best practices.

20min

Andrew Milroy

Andrew Milroy leads the research and advisory business at Focus Network. His work involves empowering organisations to make decisions more [...]

Keynote Panel Discussion – Managing Cybersecurity Complexity in an AI-Driven World

Panellists:
Nivedita Newar, Head of Cyber Security Strategy & Governance, University of New South Wales
Himanshu Anand, Head of Cyber Threat Management, Tabcorp
Nimesh Mohan, Threat and Vulnerability Lead, Coca-Cola Europacific Partners
Moderator:
Anthony Caruana, CEO, Media-Wize
Focus Network research reveals that organisations manage, on average, 36 separate cybersecurity solutions, and their security professionals are working with multiple dashboards. This combined with the near obsolescence of the traditional enterprise perimeter is creating growing complexity.

This panel discussion will discuss ways that organisations can reduce cybersecurity complexity and improve overall outcomes.

30min

Nivedita Newar

Nivi is the Head of Cyber Security Strategy & Governance, University of New South Wales. Responsible for Cyber Security Strategy, GRC, [...]

Himanshu Anand

Himanshu Anand is Head of Cyber Threat Management for Tabcorp with a focus on threat intelligence,  threat hunting and threat modelling. He [...]

Nimesh Mohan

Experienced Cyber Security Specialist with a demonstrated history of working in the Consulting, Banking, oil & energy industries. [...]

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Keynote Presentation – Accelerating Cloud Security to enable AI: How Security teams can adopt a new operating model to enable agile AI adoption

Matt Preswick, Enterprise Solutions Engineer, Wiz
Cloud and Artificial Intelligence (AI) are empowering organisations to meet their business goals quickly and effectively, however, also presents a tectonic shift for cyber security teams.  Today, CISO’s are forced to enable the adoption of Cloud and AI use cases at the speed of dev, requiring new operating models to continue to protect their environments and eliminate critical risks.  Join this session to learn how you can enable your team to build faster in the cloud, ensuring security, dev and devops can work together in a self-service model built for the scale and speed of your cloud and AI developments.  

30min

Matt Preswick

Matt is the Enterprise Solutions Engineering expert for Wiz, with experience in network, email and cloud security at leading security vendors in [...]

Networking Break

15min

Breakout Session – Moving into AI-Powered Email Security in 2024

Celeste Lowe, General Manager Cyber Security, Ventia
On behalf of Abnormal Security
Security teams are stuck in a cycle of investigating endless support tickets for phishing emails and Business Email Compromise attacks. Meanwhile, the threat continues to grow, with Australian businesses reporting losses of nearly $100M to BEC alone in 2022. To combat attacks that are increasing in both volume and sophistication, a whole new industry of user awareness training and phishing simulation has arisen, a market expected to grow from $5.6 billion globally in 2023 to $10 billion by 2027. But staying a step ahead, threat actors are now leveraging generative AI to create even more realistic attacks to fool your employees.

Trying to stay one step ahead by looking for traditional indicators of compromise is a fool’s errand, especially as AI changes the game. So what can be done? How do we stop ever-evolving email attacks from bypassing the SEG? And is user awareness training still your only saviour in the coming year?

Talking Points for group discussion:
1. What strategies are being deployed from both a technology and process perspective to combat exposure to financial losses through email threats and how effective are our current security tools at detecting new threats without IOCs?
2. How successful have user awareness training programs been in enabling employees to correctly identify malicious and fraudulent emails?
3. Have you ever felt like the board or CEO would sack you after a breach? What if the email that led to the breach was allowed in by your SEG? Would you sack your SEG?
4. What types of security is needed to prevent AI-generated attacks from reaching you?

30min

Celeste Lowe

Proven, managerial skills, strategic planning and operational delivery experience in a career spanning 20 years in the Cyber Security industry in [...]

Breakout Session – Reducing Complexity with a Cybersecurity Mesh
Are You Ready to Adopt a New Cloud Security Operation Model?

Matt Preswick, Enterprise Solutions Engineer, Wiz
A successful cloud security strategy needs to evolve to meet the changing needs of the business and growth of the cloud. Cutting-edge security teams are coming up with new approaches and initiatives to increase their company’s agility through security and move from slowing the business to accelerating it.

Across ANZ, organisations are rapidly expanding cloud adoption and expecting security leaders to follow suit, and fast. As a result, CISO’s need to rethink their approach to cloud security be able to move at the speed of business, ensure compliance with regulation, and enable their organisations to innovate with AI.

Join your peers for this roundtable as we discuss and share insights on simplifying your security stack and using a new cloud security operation model to meet the growing demands of your business.

30min

Matt Preswick

Matt is the Enterprise Solutions Engineering expert for Wiz, with experience in network, email and cloud security at leading security vendors in [...]

Breakout Session – Backup ≠ Cyber Recovery: Navigating the Shift in Required Capabilities and Shared Responsibilities between IT and Cyber Teams

Alister Freese, Account Executive, Rubrik

The weight of cybercrime is taking its toll not only on CIO and CISOs. An overwhelming 96% of IT and Security leaders suffered significant emotional or psychological impact as they continue to face unending challenges in protecting their company’s data, according to a recent Wakefield Research report ‘The State of Data Security’ commissioned by Rubrik*.

While prevention is impossible, Businesses, Leaders, and the Customers they serve need certainty in their ability to recover critical services in a timely manner.

Join thought leaders from Rubrik along with a select group of your IT and security peers, as we discuss challenges, the human impact of cybercrimes on an organisation, and best practices moving forward to protect your people and your data infrastructure.

*New Rubrik data security survey: 99% of organisations reported a breach in the last year – and 72% paid a ransom; but, only 16% who paid recovered their data.

30min

Alister Freese

A sales leader who can lead high performing sales teams through applying strong commercial, customer and people management skills. Have built a [...]

Breakout Session – Driving the Right Work to the Right Resource at the Right Time

Darren Cockerell, Head of Solutions Consulting ANZ, SS&C Blue Prism

Tightening cost and time constraints coupled with the rising complexity in current technology environment are crippling organizations’ speed to growth.

The ability to drive the right work to the right resource at the right time will grant organizations the competitive advantage to navigate the challenges and spur their growth.

At this interactive session, we’ll discuss:

  • The transformative power of Process Orchestration powered by Intelligent Automation and Business Process Management – all in one platform.
  • Exploring CIO-led digital transformation strategies.
  • Anticipating the AI and Process Orchestration and Automation boom in 2024 and its impact on business transformation

30min

Darren Cockerell

  Darren Cockerell is Head of Solutions Consulting ANZ at SS&C Blue Prism where he is responsible for understanding the strategic aims and [...]

Keynote Speaking Presentation – Addressing Cyber Threats

Katherine Jeffrey, Acting First Assistant Director-General Cyber Engagement and Strategy, Australian Signals Directorate

Cyber threats are growing in scale and sophistication and malicious actors are highly capable and increasingly persistent. How can enterprises respond?

This presentation highlights the rapidly growing threat posed by nation state actors and cybercriminals, and best practices in addressing them to protect and defend your network.

30min

Katherine Jeffrey

Katherine Jeffrey leads the Australian Cyber Security Centre's Cyber Engagement and Strategy Division, which coordinates the ASD's strategy and [...]

Speaking Presentation – “I probably won’t get cyber hacked,” said no CISO ever

Stephen Gillies, Technology Evangelist, Fastly

We see cyber breaches topping the news headlines frequently, but what are the chances of your organisation getting breached? Stephen Gillies, Technology Evangelist at Fastly, will talk about the impact of a cyber breach, present some hard figures you can use with the board, and talk about some mitigation strategies available to combat bots, DDoS attacks, and insider threats.

30min

Stephen Gillies

With 20+ years of experience in security and technology sectors, Stephen serves as Fastly's Technology Evangelist APAC and provides organisations [...]

Breakout Session – Walking a Tightrope Between Security and Productivity

Jane Stevens, Enterprise Account Executive, Delinea
Poor access management, default passwords, credential stuffing, phishing, and abusing stolen credentials and DDOS attacks are all too common causes of security breaches keeping security leaders up at night. Couple this with businesses’ drive for productivity gains – it’s a balancing act between security and productivity. Join in our discussion on research findings from over 2000 CISO’s across the world, including Australia, on the challenges of aligning business and security including:
  • Challenges faced when aligning cybersecurity with business goals
  • How cyber teams are measuring business outcomes as well as security activities
  • Negative impacts of misaligned goals on business growth and security posture
  • Organisational questions that impact alignment (e.g. org reporting structure)
 

30min

Jane Stevens

With over 16 years’ experience in information technology, Jane has amassed experience in all market segments, from small to medium businesses [...]

Breakout Session – The Essential Eight: Overcoming Your Challenges with PAM

Scott Hesford, Senior Director, Solutions Engineering, APJ, BeyondTrust
Improving their maturity within the Essential Eight is considered daunting for many organisations. Strategies such as application control, restricting admin privileges and user application hardening are seen as difficult to implement effectively without impacting employee productivity.

However, security technologies such as Privileged Access Management (PAM) can help organisations bridge the gap for a number of requirements of the Essential Eight, including the above three. Modern PAM solutions can also provide compensating controls on other elements of the Essential Eight. Join this discussion amongst peers of the Essential Eight, how organisations are aligning to it and how PAM can support those strategies.

Attend this roundtable and you will:
• Hear from your peers on how they are approaching the Essential Eight in their organisations
• Know how Privileged Access Management maps against the eight strategies, including the November 2023 update
• Learn some of the best practices around implementing parts of the Essential Eight.

30min

Scott Hesford

Scott Hesford has over a decade of experience in IT security. Before joining BeyondTrust in 2019, he worked as Principal Consultant for CA [...]

Breakout Session- Convenience vs. Security: Can We Win in Digital Identity?

Mo (Mohammad) Shahbeikian, Sales Engineering Manager – APAC, Thales

This roundtable tackles the challenge of balancing a seamless customer experience with robust security in the digital age.

We'll explore emerging tech, building trust, and the future of navigating the ever-evolving identity landscape. Join us to discuss how to win in a customer-centric world.

30min

Mo (Mohammad) Shahbeikian

Mo brings a wealth of experience in Identity and Access Management (IAM) solutions to the table. As a Sales Engineering Manager, he possesses a [...]

Breakout Session – Harnessing Mobile Devices to Drive Digital Productivity

Angelo Lo Certo, Head of Product and Professional Services, imei

Mobile devices place the power of distributed information in the hands of many throughout the organisation, but how to overcome the challenges of reliable connectivity, information security and user downtime, to drive productivity?

As the number of mobile information workers in your organisation increases, so does the complexity of managing the device fleets ranging from mobile phones through tablets to field-based rugged devices and laptops. The combinations of device type, network, apps, user profiles, authorisation and authentication, and use cases, increase exponentially.

Mobile information workers and mobile technologies are not a new part of business – it’s now a mature part of organisations’ digital transformation. However, the tools, processes and systems to make mobile technology ‘just work’ are constantly evolving.

This session is a combination of current industry state-of-the-art mobile productivity enhancement, reinforced by a moderated discussion by an experienced thought leader, and the chance to hear directly from peers about issues faced, open questions and interesting experiences.

  • how to overcome the challenges of reliable connectivity, information security and user downtime to drive productivity
  • mobile device security considerations – understanding the what, where, who, accessible info, what your employees connect to etc.
  • why manage your mobiles - benefits, expense management & cost allocation etc
  • use cases on how industry organisations benefit from having their devices managed externally. With a discussion with your peers on their own firsthand priorities and considerations when managing their technology.

30min

Angelo Lo Certo

Angelo is currently head of Product Strategy and Professional Services at imei. Angelo’s background is in applied technologies to improve [...]

Networking Lunch

40min

Keynote Panel Discussion – Breaking Barriers: Empowering Women in Cybersecurity and Tech – Strategies for Attracting and Retaining Female Talent

Panellists:
Celeste Lowe, GM Cybersecurity (CISO), Ventia
Daniela Fernandez, Head of Information Security, PayPal Australia
Shyvone Forster, Director Cyber Security Operations, Department Home Affairs
Moderator:
Tyron McGurgan, CEO, Focus Network

Delve into the critical issue of gender diversity in cybersecurity and technology fields. With women still significantly underrepresented in these sectors, this discussion aims to explore effective strategies for attracting and retaining female talent.

Our panellists will share insights, experiences, and actionable solutions to bridge the gender gap and foster greater diversity and innovation in these rapidly evolving industries.

30min

Celeste Lowe

Proven, managerial skills, strategic planning and operational delivery experience in a career spanning 20 years in the Cyber Security industry in [...]

Daniela Fernandez

With over 19 years' experience in Information Technology, Daniela Fernandez is a cyber security and analytics leader, who values integrity, [...]

Shyvone Forster

[...]

Tyron McGurgan

Tyron McGurgan is a seasoned entrepreneur, media expert, and events professional boasting over 17 years of industry experience. As the CEO and [...]

Speaking Session – Empathy in Cybersecurity Leadership: Navigating Beyond Conventional Wisdom

Stephen Bennett, Group Chief Information Security Officer, Domino's Pizza Enterprise Ltd.

Join Stephen for an in-depth session where he’ll challenge the conventional wisdom that a business-aligned cybersecurity strategy is the ultimate solution. Despite the widespread belief and significant support from top management, experience tells him that the path remains fraught with challenges and frustrations, even with a strategy that seems perfectly aligned.

Stephen will explore the critical, yet often overlooked, element of empathy.

He will discuss how even the most well-aligned cybersecurity strategies don't automatically guarantee success – things won't just magically fall into place. He’ll share insights into how adopting an empathetic leadership approach and focusing on strategic relationship-building can lead to a more nuanced and effective cybersecurity posture.

Expect to learn how this can redefine our metrics, enhance collaboration, and foster a security culture that transcends mere alignment with business goals. I invite you to join Stephen in exploring practical strategies and personal insights on how to navigate beyond the conventional, toward a more holistic and impactful approach to cybersecurity leadership.

30min

Stephen Bennett

Stephen has over 30 years of experience in the security and technology space, working with large enterprise organizations in various market [...]

Keynote Speaking Session – User Profiling in the Organisation & Ransomware killchain

Anil Yellamati, Head of Cyber, Blackmores

Is ransomware still a threat? How many ransomware incidents did we see last year? Is it still a high priority? Can we effectively contain ransomware with the kill chain? What are the different approaches? Are users in the organization contributing to ransomware or other threats? Let’s discuss the different types of users and detect threats based on user profiles.

30min

Anil Yellamati

Anil Yellamati is the Head of Cyber security for Blackmores Group. He has 19 years of experience in cyber security and worked in various industries [...]

Networking Break

15min

Keynote Panel Discussion – Navigating Future AI Threats (and What to do with Them)

Panellists:
Faizal Janif, Chief Information Security Officer, Tabcorp
Mark Smink, Director - Information Security, Brookfield Asset Management
Moderator:
Anthony Caruana, CEO, Media-Wize

In our rapidly advancing technology landscape, the rise ascent of artificial intelligence (AI) and automation has not just transformed industries but has also presented fresh challenges in the cybersecurity domain.

As both businesses and individuals embrace AI, this panel discussion will delve into the possible threats linked to its utilisation and the inventive solutions that can protect our digital future.

30min

Faizal Janif

A senior security executive and founder of the Cyber 12 who sits on the Australian Information Security Association’s (AISA) Executive Advisory [...]

Mark Smink

Mark Smink has built and lead cyber security teams in international companies across Asia Pacific.   With a background of delivering technology [...]

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Closing Keynote Presentation – National Cyber Security: Coordination, Response, and Resilience

Joe Smith, Acting Deputy National Cyber Security Coordinator, National Office of Cyber Security

Joe Smith is the Assistant Secretary of the Cyber Security Response Coordination Unit (CSRCU), within the National Office of Cyber Security. He is currently the Acting Deputy National Cyber Security Coordinator.

The CSRCU supports the National Cyber Security Coordinator to coordinate the response to nationally significant cyber security incidents.  The CSRCU works collaboratively with Commonwealth agencies leading technical incident responses, law enforcement operations, emergency management activities, government service delivery, and regulatory activities. It also works with state and territory departments and agencies responding to incidents impacting their jurisdictions.  The CSRCU develops plans and conducts exercises to enable the Australian Government to prepare for, respond to, and recover from the consequences of cyber incidents.

Joe will provide an overview of lessons learned from recent nationally significant cyber security incidents, with a focus on planning, preparedness, and response activities that can support organisations to build resilience into their operations.

Joe has extensive experience in national security, cyber security, and cyber-crime, having previously held several strategic and operational roles in law enforcement agencies in Australia, the United Kingdom, and the United States.

30min

Joe Smith

Joe Smith is the Assistant Secretary of the Cyber Security Response Coordination Unit (CSRCU), within the National Office of Cyber [...]

Closing Remarks

Anthony Caruana, CEO, Media-Wize

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Networking Drinks

60min

WHY ATTEND

STAR KEYNOTES
AND PRESENTERS

We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program.

NETWORKING
OPPORTUNITIES

Keeping in line with the main goal of the event in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails and informal introductions.

1-1 PRIVATE
MEETINGS

Allowing both buyers and sellers the opportunity to engage with one another onsite in a series of prearranged business meetings. These provide both parties a great opportunity to build new relationships by interacting face to face.

TARGETED
SESSIONS

Being able to experience different sessions is what makes this event unique; whether you are looking to attend an interactive workshop, roundtable, 1-1 meeting or panel discussion.

NETWORKING
LUNCH

Interacting face-to-face is still one of the most effective ways to do business. During lunch hour you will have the opportunity to do just that in a very relaxed atmosphere.

PERSONALISED
PROGRAM

The summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office.

DOWNLOAD THE POST EVENT REPORT FROM OUR PREVIOUS EVENT

REGISTER YOUR INTEREST

PURCHASE TICKETS

Should you wish to attend this years upcoming 14th Australian CISO Leaders Summit on the 3rd of September 2024 at the Grand Hyatt Hotel in Melbourne, please purchase your tickets below

1 Ticket

$1990

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
Group Ticket (2 - 4)

$1790

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
GROUP TICKETS (5+)

$1500

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW

LATEST NEWS

Attitude, Language & Approach – Keys to CIO Success – Frank De Sa

Frank De Sa, Chief Information Officer, Just Group Limited The presentation was based around “Attitude, Language & Approach – Keys to […]

Attracting and Retaining IT Top Talent for the Future of Work – Panel Discussion

Panellists: Amanda Bennie, Head of Technology, Cbus Property John Tait, Head of Technology, T2 Tea SAR Raheem, APAC Region Manager, Security & […]

How do you Protect your Company from Ransomware Attacks? – Jason Mantell

Jason Mantell, Director of Sales Engineering APAC, Cloudian Jason spoke about how Cloudian’s data immutability goes beyond protections […]

Understanding risk and the perils of not identifying your risk growth – Damien Lewis

Damien Lewis, Sales Manager, ExtraHop A quantitative risk assessment is great for getting really precise about the potential financial impact, […]

Meet leading IT Security executives from Australia’s strongest brands.

Interact and engage with some of the strongest and most powerful brands from across Australia.

“First of all, can I just say this was one of the best conferences I have been to in the last 5 years. The caliber of delegates (and networking opportunities), suppliers and speakers was exceptional. Your team – were so helpful before and during the event. Well done, I’d be very happy to be invited back!”

 

– 20TH CENTURY FOX

“Fantastic event! Congratulations to you and the team. Hands down the best event I have attended as a sponsor since I’ve been at Genesys. You and your team were extremely professional and helpful in the lead up to the event and I very much appreciate your patience in dealing with the many hurdles along the way. I can’t tell you how refreshing that is after the dealings we’ve had with several other event/conference providers across APAC.”

 

– GENESYS

“Just wanted to thank you and the team for making us feel so welcome and looking after the team during the conference. It was definitely one of the best ones we’ve been to, so well done. When is your next event? Would love to keep the ball rolling on this.”

 

– SHOOTSTA

“I always enjoy the opportunity this summit affords for networking and a general check in on what everyone is doing.”

 

TRAVERS STOW – SIGMA HEALTHCARE

PLATINUM PARTNERS

GOLD PARTNERS

SILVER PARTNERS


BRONZE PARTNERS

BECOME A SPONSOR

MEDIA PARTNERS


Grand Hyatt Melbourne
123 Collins St, Melbourne VIC 3000
Telephone: +61 (03) 9657 1234
Email Enquiries: [email protected]

More Information
Copyright 2024 ©Focus Network. All rights reserved