Day One

WEDNESDAY 7 JUNE 2017

GO TO DAY TWO REGISTER NOW

08:00
Registration and welcome coffee
08:50
Opening remarks from the chair

Bradley W. Deacon
Cyber Crime and Social Media Analyst

NATIONAL PERSPECTIVE – STATE OF PLAY
09:00
The cyber threat - less sensors more sense

In a world where the threat continues to be hyped and technology and connectivity is increasing it is important to stay focused on the real threats to your organisation and make sure your valuable data and services are protected.

The cyber threat cannot be eliminated  but cyber risk can be effectively managed - there is more upside than downside in this connected world. You will hear why the cyber threat is significant and what you can do to understand and manage the risk.

 

Mike Burgess
Strategic Cybersecurity Advisor

09:30
The Evolution of the Australian Cyber Security Network
  • Creating a national cyber security innovation network that pioneers cutting edge cyber security research and innovation
  • Collaborating with business and the research community to better target cyber security research and development to Australia’s cyber security challenges
  • Harnessing our national expertise to achieve scaled success for Australia’s economy and security to benefit from our strong cyber security R&D foundations

 

Craig Davies
Chief Executive Officer
Australian Cyber Security Growth Network

10:00
A New Era of Cyber Threat: From Sophisticated to Automated

With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organisations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defence has turned into an arms race.

Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defence, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.

  • The new age of silent, stealthy attacks that lie low in networks for weeks and months
  • Why legacy approaches, like rules and signatures, are proving inadequate on their own
  • How new ‘immune system’ technologies based on advanced mathematics and machine learning are being deployed today

 

Nikita Le Messurier
Cyber Security Account Executive
Darktrace

10:30
Morning tea and showcase viewing
CYBER STRATEGY & DIGITAL TRANSFORMATION
11:00
Trust, security and collaboration in the digital economy
  • Progress of Australia’s Cyber Security Strategy
  • What emerging cyber security threats is the Government concerned about right now?
  • How can both Governments and businesses work together in a digital economy to ensure ongoing trust

 

Jacob Boyle
Cyber Policy Adviser
Department of the Prime Minister and Cabinet

11:30
Cybersecurity challenges in a hyper-connected world

“In 2015, Edelman’s Trust Barometer found that customers trust the technology sector more than any other. And they build that trust remarkably quickly”.

  • Global security breaches – what’s your best defence
  • Is calling in the ethical hackers the way forward?
  • How can you ensure your digital enterprise systems are secure?

 

Chris Monk
Head of Region (APAC)
Decoded

11:55
Panel session: Cybersecurity and the future digital economy

Digital Transformation is the trend of our time. In pursuit of sustainable differentiation and new sources of growth through digital strategies, organisations are exposed to increased risks in the cyber-domain. To achieve the business benefits afforded by digitisation, a secure network infrastructure and a threat-centric security model are critical to maintaining security effectiveness before, during and after attacks.

  • How do you develop a corporate strategy driven by technology, security and privacy?
  • Balancing risk with the need for innovation and growth
  • Getting the board on board                                                                          
  • Instilling cyber resilience within company culture

 

Moderator:
Kate Healy
Principal Cyber Security Consultant
Aleron Security

Panellists:
Sophie Dawson
Partner
Ashurst 

Nigel Phair
Managing Director
Centre for Internet Safety

Martin Brown
Cyber/IT Security Specialist
AUSTRAC

Nick Ellsmore
Co-Founder & Chief Apiarist
Hivint

Jacob Boyle
Cyber Policy Adviser
Department of the Prime Minister and Cabinet

12:35
Networking lunch and showcase viewing
13:35
Cybersecurity in the Digital Industrial Age

Global business continues to evolve to meet the demands of the digital world, and technology plays a critical role as both support and catalyst for that change. Complexity grows in such environments and breeds risks.  The Internet of Things (IoT), the rise of cloud services and the insatiable demand for data contribute to this complexity, making safeguarding intellectual property, financial information, and your company's reputation a crucial component of business strategy. With numerous high-profile breaches both in the public and private sectors, cybersecurity has become a never-ending, mission-critical topic that all organizations must contend with:

  • The threat landscape: Who are the threat actors ?
  • What are the unique and specific challenges posed by machines, instruments and automation systems with regard to cybersecurity?
  • Dealing with the nature of the risk posed by cyber-physical systems
  • Organisational preparedness: Identifying the business risks on the shop floor, the business-critical industrial control systems, and defining the risk management processes from the operations in the plant up to the executive board.
  • Transitioning from Hygiene to Resiliency: Steps to building a resilient cyber strategy.

 

Rajiv Niles
Senior Director, Industrial Cybersecurity & Digital Solutions
GE Digital

14:00
When the end user is the citizen: what are the security and privacy implications posed by smart cities?

Is cybersecurity for smart cities being dangerously underestimated? Security for computer systems—and all IoT devices are computers—is a fundamental concern for businesses, consumers, and governments. Are smart cities being designed with security in mind? What are the potential risks, and vulnerabilities? Smart city initiatives need to keep up with new threats, regulatory requirements and hidden costs. What can be done to protect cities from cyber-attacks?

  • Citizen trust as a security feature
  • IoT failures and successes
  • Ensuring citizen data security

 

Scott Reid
Director, Smart Connected Networks
RIoT Solutions

14:25
Panel session: Advanced cyber-threats: Defending our critical infrastructure

Cyber-risk is an imperative for everyone within the enterprise—but ultimate responsibility for overseeing risk rests with top leaders.  What is the current threat landscape? How can PPP’s foster an integrated, collaborative, engaged approach to maintaining critical infrastructure security and resilience?

This session will discuss emerging threats, as well as information on mitigating controls, security architecture and incident response plans. The balancing act between emerging technology, ease of use and the need for security will be discussed

  • Understanding national vulnerabilities and separating fact from fiction in terms of co-ordinated attacks
  • Assessing the risks posed by new technologies such as IoT and Blockchain
  • Factoring the capabilities of hostile forces: cyber terrorism and black market cyber-attack services
  • Reflecting on recent incidents and its impact to the organisation

Moderator: 
Rajiv Shah
General Manager - Australia & New Zealand
BAE Systems Applied Intelligence

Panellists:

Gov van Ek
Executive Director and Co-Founder
Ledger Assets

Liming Zhu
Research Director, Software and Computational Systems
Data61

Rajiv Niles
Senior Director, Industrial Cybersecurity & Digital Solutions
GE Digital

15:00
Afternoon tea and showcase viewing
REGULATION, RISK MANAGEMENT AND COMPLIANCE STRATEGIES
15:30
Securing your customer's data in the cloud – contractual, legal and regulatory considerations

A Xero case-study on ensuring customer security, whilst maintaining their privacy and building trust in their services. 

  • Keeping  data secure, safe and available - building customer trust
  • Extracting security intelligence from data while respecting customer privacy
  • Cross-border considerations of a global customer base

 

Paul Macpherson
Head of Security
Xero

16:00
Fireside chat: Breach response playbook: Effectively preparing for data breaches

Today's digital economy and hyper-connected world mandates a need for rapid response to reduce the damage and limit the consequences of a data breach. Cyber and privacy risk is less evident and less insurable in voluntary notification scenario. As breach incidents increase, Insurers are unlikely to accept a simple transfer of risk – they would expect businesses to disclose all past data breaches and investment in security. Cyber insurance provides a means for businesses to insure for financial and reputational loss to respond to a cyber data incident. In order to make claims for loss, businesses would need to disclose data breaches.

In this session, learn how enterprises can upgrade their breach response framework, processes and technologies to effectively deal with data breaches.

  • What is the real cost of data breaches?
  • Identifying which risks to avoid, which to accept and which to mitigate or transfer through Insurance
  • An overview of the Australian Mandatory Data Breach Notification Law

 

Panel Moderator:
Bradley W. Deacon
Cyber Crime & Social Media Analyst

Panellists:

Meena Wahi
Cyber Insurance Specialist Broker
Cyber Data-Risk Managers

Rehana Box
Insurance Advisory Partner
Ashurst

 Dr. Sara Smyth
 Associate Professor
 La Trobe University Law School

16:40
Trust Me, I’m in Cyber Security
  • The pillars of trust - how trust is created and maintained (from a business to a customer): Security, Privacy, Transparency, Compliance
  • Why trust is hard – information asymmetrics, Catch-22s and managing ‘friction’
  • Key trends for 2017 – cybercrime trends, and response trends
  • The impending roles of Chief Trust Officer and Customer Data Advocate

 

Nick Ellsmore
Co-Founder & Chief Apiarist
Hivint

17:05
Panel discussion with a lawyer, a hacker and a CISO

The evolving trends of mobility, cloud computing, and the Internet of Everything (IoE) present unparalleled opportunities for businesses, consumers, and hackers alike. What does cyber security in the age of digital transformation mean for organisations?

  • How can organisations manage risk in a digital ecosystem
  • What are the global attacks being seen, and how can defensive strategies be implemented?
  • How can you create trust?

 

Panel Moderator:
Bradley W. Deacon
Cyber Crime & Social Media Analyst

Panellists:

Ty Miller
Director
Threat Intelligence

Jim Lennon
Special Counsel
Norton Rose Fulbright

Derek Scott
Head of IT Security, Risk and Governance
TAL

17:40
Closing remarks and networking drinks