Join us at the 11th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
17th May 2023, Allianz Stadium, Sydney
Join us at the 11th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
17th May 2023, Allianz Stadium, Sydney
Summit Themes Key themes and topics are developed by our
standing committee and advisory board from
the country's most respected Security / IT Leaders.
These will be addressed over the course
of the CISO Leaders Summit Australia.

 

Cyber Threat
Intelligence

 

Cloud Security

 

IOT Security

 

Identity & Access
Management

 

Ransomware

 

Cybercrime

 

Artificial
Intelligence

 

Mobile Device
Security

Join us at the 11th CISO Leaders
Australia Summit

BE PART OF THIS YEAR’S UPCOMING GATHERING WHERE YOU WILL BE ABLE TO ENGAGE WITH THE COUNTRY’S LEADING IT SECURITY PROFESSIONALS ON THE
17th May 2023, Allianz Stadium,
Sydney

Join the gathering

ABOUT THE EVENT

The 11th CISO Leaders Australia Summit, Sydney will take place on the 17th of May 2023 at the Allianz Stadium, Sydney. The Summit will once again become THE MEETING PLACE for more than 100 of the country’s leading CISOs, Heads of IT Security, Cyber Security and CIOs.

This year’s Summit theme will be focussed on 'Cybersecurity Modernisation with a Threat-Informed Defence' and this message will be delivered via several keynotes, panels, workshops and targeted roundtable discussions taking place throughout the day.

Attendees will have the opportunity to personalise their own agenda and maximise their time out of the office by engaging in only the most relevant sessions for their business.

Our networking drinks function will provide the chance to interact face-to-face with peers in a very relaxed setting.

SPEAKERS

David Bartlett
plus

David Bartlett

Former Premier Tasmania

Bradley Busch
plus

Bradley Busch

Chief Information Security Officer, AUB Group

Marco Figueroa
plus

Marco Figueroa

Senior Manager, Cyber Security, Risk & Compliance, Australian Institute Of Company Directors

Nimesh Mohan
plus

Nimesh Mohan

Threat And Vulnerability Lead, Coca Cola Europacific Partners

REGISTER YOUR INTEREST

PROGRAM

The summit program is a draft and is subject to change.

Registration, Badge Collection & Refreshments

30min

Master of Ceremonies, Main Plenary

Andrew Milroy, Chief Research Advisor, Focus Network
CISO Track   
Anthony Caruana, Chief Executive Officer, Media-Wize
CIO Track   

15min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Opening Keynote Presentation – Building resiliency and adaptability in a post Covid work place

Mary-Beth Hosking, Chief Information Officer, PointsBet

Join Mary-Beth as she takes you on her own journey From Singer to CIO – A story of resiliency, transformation and recognising your value. As leaders, you must learn to respond and adapt to the challenges you face, and build resilience to help you bounce back in times of pressure.

In a post Covid world, leaders must build strategies to increase resiliency in the face of uncertainty, embrace an adaptive mindset to respond in times of adversity and provide guidance and strength in an ever-changing work environment.


30min

Mary-Beth Hosking

Mary-Beth Hosking is a pragmatic and seasoned technology leader with extensive experience in organisational transformations. Mary-Beth published [...]

Keynote Panel Discussion – Building a resilient data driven enterprise

Panellists:

Fahad Najeeb, Head of Data Platforms and Engineering, Latitude Financial Services
Khurram Waheed, Principal Security Architect, ExtraHop
Indika Delpachitra, Associate Director, National Australia Bank
Moderator:
Andrew Milroy, Chief Research Advisor, Focus Network
For today’s businesses, success means being data-driven. Generating value from vast amounts of data, engendering innovation and having agile and scalable business models necessitates the use of cloud technologies wherever possible. But adoption of new technologies creates risk which must be managed. Cybersecurity postures need to be transformed to ensure that enterprises have visibility across expanded attack surfaces and are able to minimize the damage caused by breaches. This session will discuss accelerated adoption of new technologies as businesses rapidly digitalize, as well as the new cybersecurity risks that are created. We will also discuss the best ways to manage these risks to build resilience into your organisation.  

35min

Fahad Najeeb

Fahad is a Technology Leader with 18 years experience in FSI, Startups, Telco, Government and Oil & Gas sectors. - Fahad is a regular [...]

Indika Delpachitra

I am an experienced and certified security professional having worked in Australia and New Zealand for over 18 years with management and [...]

Workshop 1 – CIO Track – Redefining Data Migration for the Modern Enterprise

Simon Mitrevski, Manager, Solutions Consulting, Carbonite + Webroot, OpenText Security Solutions

Migrating workloads for any environment can be a resource intensive and expensive exercise to perform. For many organisations that run on legacy, on-premise technology stacks; moving to the cloud or other environments can potentially drive complete overhaul of operations if complexities are not managed correctly; increasing costs and impacting business continuity in the process.

Now you can achieve agile migration in a secure, scalable and simple manner using automation and real-time byte-level replication.

Join Simon Mitrevski, Manager, Solutions Consulting at Carbonite + Webroot, an OpenText company, to discover a painless way to migrate your data with minimal risk and near-zero downtime.

In our session, we unveil:

  • Best practices and tips to reduce the complexity of migrating workloads to the cloud, or from cloud-to cloud environments
  • How to reduce costs by aligning a fit-for purpose infrastructure for your workloads
  • Strategies to increase agility of operations and how to migrate at scale

30min

Workshop 1 – CISO Track – IT Risk and Cyber Security Risk: Perspectives from the Board and the C-Suite

Peter Deans, Director, Notwithoutrisk Consulting
Peter Deans will provide insights and advice on how CIOs and CISO can effectively engage with the C-Suite and Board. The session will cover the role of the board, effective risk management, effective communication, and reporting. Peter will draw from his 32-year career spanning banking and finance and risk management. More recently, Peter has been advising a range of private and public companies on the development, implementation and embedding of effective risk management frameworks.

30min

Peter Deans

Peter has over 32 years’ general management, risk management and banking experience. Peter is one of the region’s foremost experts in the [...]

Workshop 2 – CIO Track – How the modern-day CIO affects change across the wider business for success outcomes

Karl Neubauer, Chief Information Officer, Global Retail Brands
This workshop will focus on how CIO’s influence and direct change. It will delve into:
  • Comparing the past
  • Challenges
  • The logical level head of the business (as opposed to BlueSky thinking)
  • Keeping 3rd parties and vendors accountable
  • Contributing to the bottom-line

20min

Karl Neubauer

Karl Neubauer is an ICT Executive with 20+ years of experience designing and delivering ICT strategy, solutions and transformation to drive [...]

Workshop 2 – CISO Track – Managing Digital Risk in an ‘Assume Breach’ World – Lessons from the Optus Breach

Andrew Milroy, Chief Research Advisor, Focus Network

This workshop will focus on the need to shift to an 'assume breach' cybersecurity posture. It will discuss how more emphasis needs to be placed on detection and response as well as strictly controlling data held by organisations.

Key discussion points will include:

  • Faster detection and response when breaches occur
  • Cybersecurity strategies
  • Involving the board in cybersecurity strategy and policy development
  • The need for tighter data privacy controls such as data minimisation and storage limitation
  • Lessons learned from the Optus breach.

20min

Networking Break

20min

One-to-One Meetings 1

30min

Roundtable Discussion – CISO Track – Perimeter Security is Dead: Addressing the Expanding Attack Surface

Greg Newbegin, Security Lead, Lenovo
Asbed Boymoushakian, Services Sales Manager, Lenovo

The move to a hybrid working environment demonstrated that a mobile workforce was not just viable, but in many cases also beneficial. However, with users now outside of the protective borders of the corporate network, it also introduced a startling number of new threat vectors.

In this session, we’ll take a look at several security concerns that are important to Australian businesses in modern times, including some less common considerations.

 

30min

Asbed Boymoushakian

Asbed Boymoushakian is a Services Sales Manager at Lenovo taking care of the Global, Large Enterprise, Government and Education segments for [...]

Roundtable Discussion – CIO Track – Responding to Ransomware – Tools to Build Your Threat Defense Architecture

Daniel Tymkin, Senior Systems Engineer, Cohesity

Organizations are increasingly at risk from skillful attackers and potent cyberthreats. The cost of cyberattacks could go beyond millions of dollars to fix breaches. The potential breach of secure data, loss of intellectual and personnel data, and extreme remediation also come at a high price. This session explores:

  • The rise and the evolution of ransomware attack
  • How modern data protection capabilities can enhance an organization's security posture
  • Building a Threat Defence Architecture that brings SecOps and IT Ops together.

30min

Daniel Tymkin

Bio coming [...]

Roundtable Discussion – CIO Track – Driving continuous innovation in times of austerity, skill shortage and security threats

Richard Davies, Director of Digital Transformation, OutSystems
Martin Cooperwaite, Co-Founder/Director, Kiandra

When budgets are unconstrained, skilled resources are abundant, any digital transformation can be funded and  innovation comes thick and fast. Not every idea makes it but as long as one or two does, then it's deemed a success.

Faced with budget cuts, challenges with talent and constant security threats, businesses have to be much more selective about what innovation they invest in.

So, how can IT leaders drive continuous innovation and deliver impactful competitive advantage?


30min

Martin Cooperwaite

Martin‘s IT story started over 30 years ago when he wrote adventure computer games for his 2nd grade primary school friends. Inherent to [...]

Richard Davies

As the OutSystems Director of Digital Transformation for APAC, Richard helps organisations strategically adopt the OutSystems platform. A [...]

Roundtable Discussion – CISO Track – Top 5 Cloud Threats and how to Identify them

Tarek Ibrahim, Enterprise Solutions Engineering, APJ, WIZ

Cloud adoption is expanding rapidly, and with that expansion comes new complexities, such as an exploding number of technologies, architectures, and cloud users. The speed of growth and change in the cloud creates an ever-changing threat landscape.

Wiz is on the forefront of the threat landscape in the cloud, as we are behind the discovery of vulnerabilities like ChaosDB and OMIGOD.

At this roundtable, we will cover the top 5 cloud threats seen in the wild, from supply chain risks to data exposure, and give practical tips on how to protect your environment against them.


30min

Tarek Ibrahim

Tarek Ibrahim has over 21 years’ experience within Cyber Security and Networking. He spent the first eight years of his career working for [...]

Workshop 3 – CIO Track – Big Things Have Small Beginnings

Alex Ji, Chief Information Officer, New Aim

Join Dr Alex Ji, Chief Information Officer at New Aim, Australia’s largest and fastest-growing private ecommerce company. Speaking from personal experiences at NAB and Vocus Group, where he respectively built artificial intelligence models of automated capability and data science teams from scratch, Alex will address the tough questions including, ‘what should a CIO focus on first’.

Irrespective of industry – finance, telecommunications or ecommerce – Alex will share how the highest-performing digital and analytics teams approach business decisions in exactly the same way. It all comes down to starting with something small but critical.

Alex will delve into specific applications of this mental model and why measurable value from beginning to end is also crucial.


20min

Alex Ji

Alex Ji brings more than a decade's experience in data and information technology to Australian ecommerce enabler New Aim. A proven leader in [...]

Workshop 3 – CISO Track – Security Conscious Corporate Culture

Ellis Brover, Independent Advisor, Former Chief Information Officer of Toyota, Brover Advisory

Ellis is an experienced IT advisor and seasoned technology executive, supporting organisations to deliver superior business value through a modern technology function. He utilises his extensive lived experience to provide pragmatic advice in the areas of cyber strategy, digital capability, IT operating models and technology leadership advice.

Ellis is a recognised IT leader with a track record over three decades of building and leading world-class IT organisations, driving transformational change, and delivering tangible business value. His experience spans a range of roles and industries, across a range of organisational scales from start-ups to multi-nationals.

Most recently Ellis was CIO of Toyota Australia, where he led a transformation of the IT function from an internally focused service provider to a strategic enabler, driver of digital innovation, and role model for outstanding customer service.

In this session Ellis will cover the importance of culture in securing your organisation, the key success factors, real-life examples of what happens when they are not in place, and advice to improve them.

20min

Ellis Brover

Ellis is an independent IT advisor, supporting organisations to deliver superior business value through a modern technology function. He utilises [...]

Workshop 4 – CIO Track – Security And IT Ops Convergence Will Drive The Future Of Endpoint Management

James Sillence, VP Technical Account Management, Tanium

Security and IT operations are critical for enterprises, but up until now, most organizations have handled them separately. With remote and hybrid work here to stay, a constantly evolving threat landscape, and increased pressure to reduce costs, that needs to change.

As organizations modernize their approach to endpoint management, they’re increasingly looking at new technologies and processes to manage and secure their environments.

Strong collaboration between IT ops and security will prove essential to their success.

 

20min

James Sillence

James has over 36 years of IT experience spanning diverse areas such as Cybernetics and Control Systems, Network and Application Performance, [...]

Workshop 4 – CISO Track – Scaling Digital Twins

Hind Benbya, Professor | Head of IS & Business Analytics, Deakin University

Digital twins (DTs) combine multi-physics simulation, data analytics, AI/machine learning and other related digital capabilities to enable the continuous monitoring of systems and machines and the provision of predictive and prescriptive outcomes.

Despite the increasing popularity of DTs and the diversity of problems they can address, very few companies have succeeded in progressing their digital twin projects to full scale and leveraging the full potential of this emerging technology.

Daunting interrelated managerial challenges related to developing living learning models, introducing flexible processes, and scaling and integration impede progress.

The workshop will introduce current and emerging uses of digital twins and detail the challenges faced and lessons learned in designing and deploying different digital twins from two mature cases.


20min

Hind Benbya

Hind Benbya is a Professor and Head of IS and Business Analytics at Deakin University in Melbourne and Visiting Policy Fellow at the Oxford [...]

Workshop 4 – CISO Track – Scaling Digital Twins

Hind Benbya, Professor | Head of IS & Business Analytics, Deakin University

Digital twins (DTs) combine multi-physics simulation, data analytics, AI/machine learning and other related digital capabilities to enable the continuous monitoring of systems and machines and the provision of predictive and prescriptive outcomes.

Despite the increasing popularity of DTs and the diversity of problems they can address, very few companies have succeeded in progressing their digital twin projects to full scale and leveraging the full potential of this emerging technology.

Daunting interrelated managerial challenges related to developing living learning models, introducing flexible processes, and scaling and integration impede progress.

The workshop will introduce current and emerging uses of digital twins and detail the challenges faced and lessons learned in designing and deploying different digital twins from two mature cases.


20min

One-to-One Meetings 2

30min

Roundtable Discussion – CISO Track – Perimeter Security is Dead: Addressing the Expanding Attack Surface

Greg Newbegin, Security Lead, Lenovo
Asbed Boymoushakian, Services Sales Manager, Lenovo

The move to a hybrid working environment demonstrated that a mobile workforce was not just viable, but in many cases also beneficial. However, with users now outside of the protective borders of the corporate network, it also introduced a startling number of new threat vectors.

In this session, we’ll take a look at several security concerns that are important to Australian businesses in modern times, including some less common considerations.

 

30min

Asbed Boymoushakian

Asbed Boymoushakian is a Services Sales Manager at Lenovo taking care of the Global, Large Enterprise, Government and Education segments for [...]

Roundtable Discussion – CIO Track – Responding to Ransomware – Tools to Build Your Threat Defense Architecture

Daniel Tymkin, Senior Systems Engineer, Cohesity

Organizations are increasingly at risk from skillful attackers and potent cyberthreats. The cost of cyberattacks could go beyond millions of dollars to fix breaches. The potential breach of secure data, loss of intellectual and personnel data, and extreme remediation also come at a high price. This session explores:

  • The rise and the evolution of ransomware attack
  • How modern data protection capabilities can enhance an organization's security posture
  • Building a Threat Defence Architecture that brings SecOps and IT Ops together.

30min

Daniel Tymkin

Bio coming [...]

Roundtable Discussion – CISO Track – Top 5 Cloud Threats and how to Identify them

Tarek Ibrahim, Enterprise Solutions Engineering, APJ, WIZ

Cloud adoption is expanding rapidly, and with that expansion comes new complexities, such as an exploding number of technologies, architectures, and cloud users. The speed of growth and change in the cloud creates an ever-changing threat landscape.

Wiz is on the forefront of the threat landscape in the cloud, as we are behind the discovery of vulnerabilities like ChaosDB and OMIGOD.

At this roundtable, we will cover the top 5 cloud threats seen in the wild, from supply chain risks to data exposure, and give practical tips on how to protect your environment against them.


30min

Tarek Ibrahim

Tarek Ibrahim has over 21 years’ experience within Cyber Security and Networking. He spent the first eight years of his career working for [...]

Roundtable Discussion – CIO Track – Driving continuous innovation in times of austerity, skill shortage and security threats

Richard Davies, Director of Digital Transformation, OutSystems
Martin Cooperwaite, Co-Founder/Director, Kiandra

When budgets are unconstrained, skilled resources are abundant, any digital transformation can be funded and  innovation comes thick and fast. Not every idea makes it but as long as one or two does, then it's deemed a success.

Faced with budget cuts, challenges with talent and constant security threats, businesses have to be much more selective about what innovation they invest in.

So, how can IT leaders drive continuous innovation and deliver impactful competitive advantage?


30min

Martin Cooperwaite

Martin‘s IT story started over 30 years ago when he wrote adventure computer games for his 2nd grade primary school friends. Inherent to [...]

Richard Davies

As the OutSystems Director of Digital Transformation for APAC, Richard helps organisations strategically adopt the OutSystems platform. A [...]

Networking Lunch

40min

Workshop 5 – CIO Track – Building and Maintaining a Data-Driven Organisation to Remain Competitive

Shaheen Saud, Chief Data and Analytics Officer, RPS
Organisations are largely well progressed in their efforts to introduce new and modernise existing data capabilities, by investing in data lakes, business intelligence solutions and experimenting with artificial intelligence and machine learning as part of a universal aspiration towards being data-driven businesses. Yet, with a plethora of data and platforms at their fingertips, why are most organisations still struggling to derive meaningful business insights to deliver their intended business outcomes?

20min

Shaheen Saud

Shaheen has extensive experience across a range of sectors including professional services, legal, banking and FMCG. He is currently leading the [...]

One-to-One Meetings 3

30min

Roundtable Discussion – CIO Track – How do you Protect your Company from Ransomware Attacks?

Jason Mantell, Director of Sales Engineering APAC, Cloudian

Ransomware is one of the most widely discussed threats in cyber security. However, not enough research exists about the experiences of organisations that have actually suffered from ransomware attacks.

Is our Government approved “Essential 8” approach enough to keep us secure?

Let’s talk data immutability that goes beyond protections available from any other on-premises object storage provider.

30min

Roundtable Discussion – CIO Track – How do you Protect your Company from Ransomware Attacks?

Jason Mantell, Director of Sales Engineering APAC, Cloudian

Ransomware is one of the most widely discussed threats in cyber security. However, not enough research exists about the experiences of organisations that have actually suffered from ransomware attacks.

Is our Government approved “Essential 8” approach enough to keep us secure?

Let’s talk data immutability that goes beyond protections available from any other on-premises object storage provider.

30min

Jason Mantell

Jason Mantell has an extensive IT career spanning across 20+ years in both the APAC and UK regions. From his early days in kindergarten receiving [...]

Roundtable Discussion – CISO Track – Understanding risk and the perils of not identifying your risk growth

Damien Lewis, Sales Manager, ExtraHop

The topic of risk is constantly on the forefront of security teams' minds, but as enterprises get more dynamic and hybrid in nature, the nature of risk changes. Add to that the evolving sophistication of cyber threat actors, and it becomes more important to continuously update your understanding of the risks you face, and the options available to mitigate those risks.

A quantitative risk assessment is great for getting really precise about the potential financial impact, the actual dollars attached to any given risk. But most organizations don't need that, and shouldn't wait for it, to start understanding where their risk is growing most and the urgent risks they should work to mitigate.

30min

Damien Lewis

ExtraHop is on a mission to stop advanced threats with security that can’t be undermined, outsmarted, or compromised. Our dynamic cyber defense [...]

Roundtable Discussion – CIO Track – How do you implement a cyber resilient strategy as part of your digital transformation program

Claire Nicol, Commercial Sales Director, Mimecast
  • How do you get your Exec team and Board to see the value of your CR strategy or the risk of doing nothing?
  • How do you create a cyber positive culture as part of this strategy?
  • How do you introduce automation into your environment to ensure you’re making the best use of APIs and ecosystem?

30min

Claire Nicol

Claire Nicol joined Mimecast in 2015 having moved to Melbourne from London and is currently the Commercial Sales Director. During her time in [...]

Roundtable Discussion – CISO Track – Understanding risk and the perils of not identifying your risk growth

Damien Lewis, Sales Manager, ExtraHop

The topic of risk is constantly on the forefront of security teams' minds, but as enterprises get more dynamic and hybrid in nature, the nature of risk changes. Add to that the evolving sophistication of cyber threat actors, and it becomes more important to continuously update your understanding of the risks you face, and the options available to mitigate those risks.

A quantitative risk assessment is great for getting really precise about the potential financial impact, the actual dollars attached to any given risk. But most organizations don't need that, and shouldn't wait for it, to start understanding where their risk is growing most and the urgent risks they should work to mitigate.

30min

One-to-One Meetings 4

30min

Roundtable Discussion – CIO Track – How do you implement a cyber resilient strategy as part of your digital transformation program

Claire Nicol, Commercial Sales Director, Mimecast
  • How do you get your Exec team and Board to see the value of your CR strategy or the risk of doing nothing?
  • How do you create a cyber positive culture as part of this strategy?
  • How do you introduce automation into your environment to ensure you’re making the best use of APIs and ecosystem?

30min

Claire Nicol

Claire Nicol joined Mimecast in 2015 having moved to Melbourne from London and is currently the Commercial Sales Director. During her time in [...]

Roundtable Discussion – CIO Track – How do you Protect your Company from Ransomware Attacks?

Jason Mantell, Director of Sales Engineering APAC, Cloudian

Ransomware is one of the most widely discussed threats in cyber security. However, not enough research exists about the experiences of organisations that have actually suffered from ransomware attacks.

Is our Government approved “Essential 8” approach enough to keep us secure?

Let’s talk data immutability that goes beyond protections available from any other on-premises object storage provider.


30min

Jason Mantell

Jason Mantell has an extensive IT career spanning across 20+ years in both the APAC and UK regions. From his early days in kindergarten receiving [...]

Roundtable Discussion – CISO Track – Understanding risk and the perils of not identifying your risk growth

Damien Lewis, Sales Manager, ExtraHop

The topic of risk is constantly on the forefront of security teams' minds, but as enterprises get more dynamic and hybrid in nature, the nature of risk changes. Add to that the evolving sophistication of cyber threat actors, and it becomes more important to continuously update your understanding of the risks you face, and the options available to mitigate those risks.

A quantitative risk assessment is great for getting really precise about the potential financial impact, the actual dollars attached to any given risk. But most organizations don't need that, and shouldn't wait for it, to start understanding where their risk is growing most and the urgent risks they should work to mitigate.

30min

Damien Lewis

ExtraHop is on a mission to stop advanced threats with security that can’t be undermined, outsmarted, or compromised. Our dynamic cyber defense [...]

Roundtable Discussion – CISO Track – Understanding risk and the perils of not identifying your risk growth

Damien Lewis, Sales Manager, ExtraHop

The topic of risk is constantly on the forefront of security teams' minds, but as enterprises get more dynamic and hybrid in nature, the nature of risk changes. Add to that the evolving sophistication of cyber threat actors, and it becomes more important to continuously update your understanding of the risks you face, and the options available to mitigate those risks.

A quantitative risk assessment is great for getting really precise about the potential financial impact, the actual dollars attached to any given risk. But most organizations don't need that, and shouldn't wait for it, to start understanding where their risk is growing most and the urgent risks they should work to mitigate.

30min

Panel Discussion – Attracting and Retaining IT Top Talent for the Future of Work

Panellists:

Amanda Bennie, Head of Technology, Cbus Property
John Tait, Head of Technology, T2 Tea
SAR Raheem, APAC Region Manager, Security & Compliance, The Access Group
Moderator:
Andrew Milroy, Chief Research Advisor, Focus Network
Recent shifts in talent, technology and work models transform the nature of work and reset expectations. CIOs who fail to adapt where, how and when work gets done – and who does it – will struggle to drive business performance, making it difficult to attract and retain top talent for the future of work.
  • Understand how to recruit, reskill and retain technology talent for the future of work
  • Build organizational resilience through a blended workforce of full-time equivalents
  • Discover how to provide flexible work experiences to be the employer of choice

35min

Amanda Bennie

Responsible for the technology, knowledge and software development teams and their overall performance and growth, leading key initiatives to [...]

SAR Raheem

Raheem is an all-rounded Cybersecurity leader with several years of experience leading successful and sustainable IT & Cyber transformation [...]

John Tait

I have over 20 years’ experience in senior and executive IT leadership roles, including over 15 working in the Asia Pacific region working in [...]

Closing Keynote Presentation – Attitude, Language & Approach – Keys to CIO Success

Frank De Sa, Chief Information Officer, Just Group Limited
  • Technology has evolved from the domain of the geeky to the domain of everyone!
  • Have IT Departments really understood and embraced this fundamental shift?
  • Are vendors, marketers, and researchers controlling our destiny or do we use them strategically as inputs into decision processes for our businesses?
  • Why is IT/Business Alignment still on the agenda? Why is our language and attitude critically important to our success? Why do we still refer to 'the business' as 'the business' vs IT?
  • Is digital transformation simply the latest buzzword to sell more software and services or does it have meaning within IT departments?
  • After 18 years on the 'vendor' side of consulting and technology and now 12+ within a Retail IT Department, Frank's perspective of IT has changed quite considerably. Join Frank as he shares his journey within Just Group and provides a different perspective to the mainstream trends that seem to dominate our industry.


    30min

    Closing Keynote Presentation – Attitude, Language & Approach – Keys to CIO Success

    Frank De Sa, Chief Information Officer, Just Group Limited
  • Technology has evolved from the domain of the geeky to the domain of everyone!
  • Have IT Departments really understood and embraced this fundamental shift?
  • Are vendors, marketers, and researchers controlling our destiny or do we use them strategically as inputs into decision processes for our businesses?
  • Why is IT/Business Alignment still on the agenda? Why is our language and attitude critically important to our success? Why do we still refer to 'the business' as 'the business' vs IT?
  • Is digital transformation simply the latest buzzword to sell more software and services or does it have meaning within IT departments?
  • After 18 years on the 'vendor' side of consulting and technology and now 12+ within a Retail IT Department, Frank's perspective of IT has changed quite considerably. Join Frank as he shares his journey within Just Group and provides a different perspective to the mainstream trends that seem to dominate our industry.


    30min

    Frank De Sa

    After 18 years on the vendor and consulting side of technology, Frank joined Just Group over 12 years ago to first lead new technology [...]

    Closing Remarks

    5min

    Networking Drinks

    60min

    Networking Drinks

    60min

    Registration And Morning Refreshments

    45min

    Welcome & Introduction

    Tyron McGurgan, Chief Executive Officer, Focus Network

    5min

    Tyron McGurgan

    Tyron McGurgan is an accomplished entrepreneur, media specialist, and events professional with over 17 years of experience in the industry. He is [...]

    Master of Ceremonies

    Mark Einstein, Principal Advisor, Focus Network

    5min

    Mark Einstein

    Mr. Marc Einstein has over 20 years of telecommunications and digital media industry experience as an analyst, market researcher and consultant. [...]

    Opening Keynote Presentation – Chain Of Vulnerabilities – Detecting and Responding To Supply Chain Threats

    Recent supply chain attacks highlight the severe downstream consequences when a technology vendor is compromised. Supply chain attacks are increasingly being used as a vehicle for the most sophisticated and damaging attacks.

     

    This presentation will highlight the vulnerabilities that are present in today’s supply chains. It will then discuss rapid detection and mitigation of supply chain attacks. Key takeaways will include an understanding of supply chain vulnerabilities and ways to mitigate supply chain threats.

    20min

    Keynote Panel Discussion – Mitigating Ransomware Risk

    Panellists:
    Marco Figueroa​, Senior Manager, Cyber Security, Risk and Compliance Digital and Operations, Australian Institute of Company Directors
    Nick Vine, Group Manager Cybersecurity and Compliance, Mirvac
    Daniela Fernandez, Head of Information Security, Paypal Australia

    Recently, we have seen a series of devastating ransomware attacks which have included attacks on critical infrastructure. We’ve also seen an increase in attacks on soft targets such as schools and hospitals.

    Key discussion points in this panel will include, the reasons why the threat from ransomware is increasing and the best ways to mitigate ransomware risk.

    30min

    Marco Figueroa

    A recognised industry practitioner with extensive senior leadership, cyber security, technology risk and engineering experience in government, [...]

    Nick Vine

    I have over 15 years experience in the Information Technology industry with a more dedicated focus on Cyber Security. Primarily this would entail [...]

    Daniela Fernandez

    With over 18 years' experience in IT, Daniela Fernandez is a cyber security and analytics leader, who values integrity, diversity of thought, [...]

    Keynote Presentation – Adopting A Zero-trust Approach To Cybersecurity

    A zero-trust approach requires a change of focus for organisations. It requires an assumption that breaches will occur as organisations evaluate current and desired cybersecurity posture, aligned with risk appetite.

    This presentation will explain how to adopt a zero-trust approach and how it can be aligned with cybersecurity policies. Key takeaways will include an understanding of how to take a zero-trust approach and the benefits of zero-trust.

    20min

    Networking Break

    20min

    Roundtable Discussion – Reducing Risk With Modern Identity Management

     

    As digital transformation accelerates, more data and applications are being pushed out to devices and remote users. Companies need to focus on who is accessing corporate resources, from where and why. They need to understand what their data is being used for and be able to identify vulnerabilities rapidly. Improved visibility of user behaviour is critical to reduce the threats from adversaries as well as from insiders.

    Key discussion points include, enabling business with IAM and managing access efficiently.

    30min

    Roundtable Discussion – Moving Beyond Prevention To Proactive Defence

      Too many companies focus purely on preventing all breaches and assume that all company resources remain inside corporate firewalls. As remote working and the use of multiple clouds becomes normal, this approach has become outdated.    Key discussion points in this roundtable include how companies need to move beyond a traditional preventive ‘castle and moat’ approach to cybersecurity, and how they can take a much more proactive approach.  

    30min

    Roundtable Discussion – Policy As Code And Application Security

    As companies start to embrace DevSecOps, developers will increasingly act as policy enforcers by building policy into code. Security by design will become more common as security programs align with DevOps to provide the automation required to secure complex technology environments. Developers will start to see baking security into code, not as an inconvenience, but as a critical part of creating new applications rapidly.

    Key discussion points will include best practices in DevSecOps and embedding cybersecurity policies into code.

    30min

    Roundtable Discussion – Reducing Complexity With A Cybersecurity Mesh-

    Companies are struggling with increased cybersecurity complexity as they wrestle with a growing number of cybersecurity tools, typically operating independently of each other. A new approach is required where controls are integrated and policy is consistent.

    This roundtable will discuss how a cybersecurity mesh can enable the centralised control of policies and the scaling of controls. It will also discuss how a cybersecurity mesh can offer greater flexibility and reliability.

    30min

    Roundtable Discussion – Reducing Risk With Modern Identity Management

     

    As digital transformation accelerates, more data and applications are being pushed out to devices and remote users. Companies need to focus on who is accessing corporate resources, from where and why. They need to understand what their data is being used for and be able to identify vulnerabilities rapidly. Improved visibility of user behaviour is critical to reduce the threats from adversaries as well as from insiders.

    Key discussion points include, enabling business with IAM and managing access efficiently.

    30min

    Roundtable Discussion – Moving Beyond Prevention To Proactive Defence

     

    Too many companies focus purely on preventing all breaches and assume that all company resources remain inside corporate firewalls. As remote working and the use of multiple clouds becomes normal, this approach has become outdated. 

    Key discussion points in this roundtable include how companies need to move beyond a traditional preventive ‘castle and moat’ approach to cybersecurity, and how they can take a much more proactive approach.  

    30min

    Roundtable Discussion – Policy As Code And Application Security

    As companies start to embrace DevSecOps, developers will increasingly act as policy enforcers by building policy into code. Security by design will become more common as security programs align with DevOps to provide the automation required to secure complex technology environments. Developers will start to see baking security into code, not as an inconvenience, but as a critical part of creating new applications rapidly.

    Key discussion points will include best practices in DevSecOps and embedding cybersecurity policies into code.

    30min

    Roundtable Discussion – Reducing Complexity With A Cybersecurity Mesh

    Companies are struggling with increased cybersecurity complexity as they wrestle with a growing number of cybersecurity tools, typically operating independently of each other. A new approach is required where controls are integrated and policy is consistent.

    This roundtable will discuss how a cybersecurity mesh can enable the centralised control of policies and the scaling of controls. It will also discuss how a cybersecurity mesh can offer greater flexibility and reliability.


    30min

    Keynote Speaking Presentation – Cybersecurity Modernisation with A Threat-Informed Defence

    Matthew Smith, Assistant Director General Incident Management Branch, Australian Cyber Security Centre, Australian Signals Directorate

    The traditional network infrastructure model of centralised corporate data centres secured by on-premises network perimeters does not work today. Data that once resided in data centres is now in the cloud, on SaaS applications, and on endpoints.

    This presentation will focus on the need for companies to transform and modernise their approach to cybersecurity, and adapt to the constantly changing threat landscape. Key takeaways will include, the benefits of a threat informed defence and the how to secure assets that sit outside the traditional network perimeter.

    20min

    Speaking Presentation – The New Threat Landscape: The Cyber Physical World

    Attacks on critical infrastructure have highlighted the vulnerabilities that emerge as operational technology converges with information technology. Greater digitalisation of the physical world combined with edge computing and new IoT technologies are accelerating the pace of this convergence.

    This presentation will discuss the blending of information technology with operational technology and the new threats that this brings, particularly with reference to critical infrastructure.

    Key takeaways will include an explanation of the types of vulnerabilities that operational technology presents and the best practices in mitigating the risk of attacks on operational technology.


    20min

    Keynote Speaking Presentation – Shifting Left: Cloud Native DevSecOps

    Bradley Busch, CISO, AUB Group
    Banking security into code is critical for securing applications. To do this effectively, DevOps teams also need to work with security teams. This presentation will discuss the importance of baking security into code and best practices in ‘shifting left’. Key discussion points will include,
    • The importance of DevSecOps and
    • DevSecOps use cases.

    20min

    Bradley Busch

    Brad is a CISO and Non Executive Director with experience in Cyber, Agile, DevOps, Digital, Cloud and IT Governance. He focuses on explaining [...]

    Networking Lunch

    40min

    Analyst Speaker Session – Powering Human Centric Employee Performance and Productivity

    The pandemic experience and changing labour market has reset work norms, while often distracting leaders from the fundamentals of productivity.

    This session will provide CISO's clarity of the human-centric work practices that make IT employees more productive and high-performing.

    20min

    Speaking Session – Modernising Cyber Operations With AI And ML

    Nimesh Mohan, Threat And Vulnerability Lead, Coca Cola Europacific Partners

    SOCs are becoming overwhelmed with alerts, many of which are false positives. The modern SOC needs to fully leverage automation and AI to detect and respond to threats in the most efficient way. This roundtable with discuss how and why today’s SOCs are overwhelmed and how automating SOCs and using AI are essential.

    Key discussion points will include, managing the growing number of false positives and using AI and ML to detect and respond to threats.

    30min

    Nimesh Mohan

    Experienced Cyber Security Specialist with a demonstrated history of working in the Consulting, Banking, oil & energy industries. [...]

    Speaking Session – Shared Responsibility In The Cloud

    Confusion remains around the segregation of responsibilities for cloud security. This leads to unnecessary vulnerabilities and potentially devastating attacks.

    Key discussion point in this roundtable are the elements of cybersecurity that are typically addressed by cloud service providers and the elements which must be managed by the customer.

    30min

    Networking Break

    15min

    Keynote Speaking Presentation – Enforcing Policy Control With A Secure Service Edge (SSE) Platform

     

    The Secure Access Service Edge (SASE) approach to cybersecurity has given way to SSE. SSE accommodates changing working patterns and wider cloud usage.

    Key takeaways from this presentation will include the importance of SSE platforms as remote working and cloud usage become more widespread and the importance of integrating multiple cloud cybersecurity services in the cloud.

    20min

    Keynote Panel Discussion – Becoming The Hunter Instead Of The Hunted With Threat Intelligence, AI and Automation

    Panellists:
    Anna Aquilina, CISO, University of Technology Sydney
    Raghu Gandhy, CISO, Veolia Environmental Services

    Organisations need to take a forward-leaning proactive approach to cybersecurity. They need to minimise attacks by identifying them and responding to them before any damage is caused. Threat hunting requires the use of automation and AI to be effective. It also needs access to the best sources of threat intelligence.

    This panel will discuss best practices in threat hunting and how companies can become the hunters instead of being the hunted.

    30min

    Anna Aquilina

    An experienced and successful senior executive with broad and deep knowledge of the domestic and international dimensions of cyber security, [...]

    Raghu Gandhy

    Bio Coming [...]

    Closing Keynote Presentation – Building Resilience With Defence-In-Depth

    No company can eliminate all breaches. Instead, companies can focus on mitigating risk by minimising the damage and breach can cause. Increasingly, companies are implementing multiple layers of controls.

    Key takeaways from this presentation will be the need for multiple complementary controls to manage risk and how a defence in depth approach can be implemented.

    20min

    Closing Remarks From The Chair And End Of The Forum

    Andrew Milroy, Chief Research Advisor, Focus Network

    5min

    Andrew Milroy

    Andrew Milroy is Focus Network’s Chief Research Advisor. He is a well-known technology thought leader and speaker in the APAC region. He has [...]

    Networking Drinks

    60min

    WHY ATTEND

    STAR KEYNOTES
    AND PRESENTERS

    We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program.

    NETWORKING
    OPPORTUNITIES

    Keeping in line with the main goal of the event in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails and informal introductions.

    1-1 PRIVATE
    MEETINGS

    Allowing both buyers and sellers the opportunity to engage with one another onsite in a series of prearranged business meetings. These provide both parties a great opportunity to build new relationships by interacting face to face.

    TARGETED
    SESSIONS

    Being able to experience different sessions is what makes this event unique; whether you are looking to attend an interactive workshop, roundtable, 1-1 meeting or panel discussion.

    NETWORKING
    LUNCH

    Interacting face-to-face is still one of the most effective ways to do business. During lunch hour you will have the opportunity to do just that in a very relaxed atmosphere.

    PERSONALISED
    PROGRAM

    The summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office.

    DOWNLOAD THE POST EVENT REPORT FROM OUR PREVIOUS EVENT

    REGISTER YOUR INTEREST

    PURCHASE TICKETS

    Should you wish to attend this years upcoming 11th Australian CISO Leaders Summit on the 17th May 2023, Sydney, please purchase your tickets below

    1 Ticket

    $1990

    • Access to onsite mobile APP
    • Meals and refreshments
    • Access to all presentation sessions
      and roundtable discussions
    • Access to all presentation
      slides and photos
    BUY NOW
    Group Ticket (2 - 4)

    $1790

    • Access to onsite mobile APP
    • Meals and refreshments
    • Access to all presentation sessions
      and roundtable discussions
    • Access to all presentation
      slides and photos
    BUY NOW
    GROUP TICKETS (5+)

    $1500

    • Access to onsite mobile APP
    • Meals and refreshments
    • Access to all presentation sessions
      and roundtable discussions
    • Access to all presentation
      slides and photos
    BUY NOW

    LATEST NEWS

    Attitude, Language & Approach – Keys to CIO Success – Frank De Sa

    Frank De Sa, Chief Information Officer, Just Group Limited The presentation was based around “Attitude, Language & Approach – Keys to […]

    Attracting and Retaining IT Top Talent for the Future of Work – Panel Discussion

    Panellists: Amanda Bennie, Head of Technology, Cbus Property John Tait, Head of Technology, T2 Tea SAR Raheem, APAC Region Manager, Security & […]

    How do you Protect your Company from Ransomware Attacks? – Jason Mantell

    Jason Mantell, Director of Sales Engineering APAC, Cloudian Jason spoke about how Cloudian’s data immutability goes beyond protections […]

    Understanding risk and the perils of not identifying your risk growth – Damien Lewis

    Damien Lewis, Sales Manager, ExtraHop A quantitative risk assessment is great for getting really precise about the potential financial impact, […]

    Meet leading IT Security executives from Australia's strongest brands.

    Interact and engage with some of the strongest and most powerful brands from across Australia.

    “First of all, can I just say this was one of the best conferences I have been to in the last 5 years. The caliber of delegates (and networking opportunities), suppliers and speakers was exceptional. Your team – were so helpful before and during the event. Well done, I'd be very happy to be invited back!”

     

    – 20TH CENTURY FOX

    'Fantastic event! Congratulations to you and the team. Hands down the best event I have attended as a sponsor since I've been at Genesys. You and your team were extremely professional and helpful in the lead up to the event and I very much appreciate your patience in dealing with the many hurdles along the way. I can't tell you how refreshing that is after the dealings we've had with several other event/conference providers across APAC.'

     

    – GENESYS

    “Just wanted to thank you and the team for making us feel so welcome and looking after the team during the conference. It was definitely one of the best ones we’ve been to, so well done. When is your next event? Would love to keep the ball rolling on this.”

     

    – SHOOTSTA

    “I always enjoy the opportunity this summit affords for networking and a general check in on what everyone is doing.”

     

    TRAVERS STOW – SIGMA HEALTHCARE

    PLATINUM SPONSORS

    GOLD SPONSORS


    SILVER SPONSORS

    BRONZE SPONSORS

    BECOME A SPONSOR

    MEDIA PARTNERS


    Allianz Stadium Sydney
    Driver Ave, Moore Park NSW 2021
    Telephone: +61 02 9360 6601
    Website: Allianz Stadium

    More Information
    Copyright 2023 ©Focus Network. All rights reserved