<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • Day 1

  • 08:20

    Register; grab a coffee. Mix, mingle and say hello to peers old and new.

    Arrow
  • 08:50
    Chirag Joshi_Picture-1

    Welcome from Corinium and the Chairperson

    Chirag Joshi - Founder & CISO - 7 Rules Cyber

    Arrow
  • 09:00
    Connect _Network-1

    Speed Networking - Making new connections!

    Arrow

    In this 10-minute networking session, the goal is to connect with three new people. Let the questions on the screen spark your conversation. Enjoy the opportunity to expand your network!

  • 09:10
    Phil Ross-2-1

    Opening Keynote: Dynamic Risks, Strategic Moves – Embracing Change for Success

    Phil Ross - CISO - Air New Zealand

    Arrow
    • Discuss the rapidly evolving landscape of cyber security threats and their profound impact on business success.
    • Highlight the transformational power of aligning technology risk with your core business strategy, creating a strong defence against emerging threats.
    • Emphasise the importance of building and nurturing a resilient workforce, equipped to tackle the evolving challenges of the digital age.
  • 09:35
    Interactive_ Discussion_ Participation-1

    On Plenary Stage Interview: Nurturing High-Performing, Positive Teams

    Arrow

    Cyber security can seem like an unrewarding career. Preventing breaches depends on a variety of factors, including the company's risk-appetite, senior management buy-in and adequate budgets. If the company is not hacked, whether you have a robust and mature cyber strategy or just luck, you're just doing your job. But if it is does, the cyber team often gets the blame. It's essential for CISOs to ensure their teams are motivated and engaged. During this interview, we will review KPIs and discuss successful ways to ensure the wellbeing of the team and prevent burnout.

    Interviewer:

    Chirag Joshi, Founder & CISO, 7 Rules Cyber

    Interviewee:

    Jan Zeilinga, CISO, James Cook University

  • 10:00
    Jamie Wright

    From Best Practice to Mandate: The Rising Stakes of Data Protection in Australia

    Jamie Wright - Field CTO ANZ - HashiCorp

    Arrow

    With evolving Australian regulations, enterprises are facing stricter mandates for securing sensitive data. Protecting is no longer just a best practice—it’s a business imperative. This session will explore key data protection requirements, including enhanced encryption, stricter access controls, and stronger authentication mechanisms.

    Join us to understand how to turn compliance challenges into security advantages while staying ahead of regulatory demands.

  • 10:25

    NETWORKING BREAK

  • 11:55
    Panel Discussion (2)-Sep-25-2023-06-46-39-6361-AM

    PANEL: Keeping up with a constantly changing regulatory environment

    Arrow
    • An overview of new security regulations and standards affecting Australian businesses
    • Complying with SOCI, SoNS, CPS 234, CPG 234, CPG 235, and other standards such as ISO27001, AESCSF, NIST and Essential 8
    • Insights into the current proposed legislation NIS 2.0 and DORA, which have been said to be the GDPR for Information Security
    • Strategies to balance the benefits against the cost-impact of compliance based on the enterprise’s risk appetite 

    Panellists:

    Nathan Lewis, Head of Cyber, Technology and Data Risk, Newcastle Permanent

    Gaurav Vikash, Head of Security and Risk, APAC, Axon Enterprise

    Sebastian Tymoszuk, CISO, Autosports Group

    Umair Zia, Head of Cyber Security, Sydney Local Health District

    Marc Airo-Farulla, Regional Sales Director, Entrust

  • 11:35
    Pas Apicella-1

    Securing the Digital Future: Strategies for Resilient Application Security

    Pas Apicella - Field CTO - Snyk

    Arrow

    As digital transformation accelerates across industries, the need for secure, scalable, and resilient applications has never been more critical. This session delves into best practices and innovative strategies for ensuring application security in dynamic and complex environments. From integrating Static Application Security Testing (SAST) and Software Composition Analysis (SCA) into modern CI/CD pipelines to addressing unique challenges posed by containerized applications in Kubernetes, we’ll explore practical approaches to safeguard software throughout its lifecycle. Attendees will gain actionable insights into building resilient security postures, fostering collaboration between development and security teams, and aligning security practices with the pace of digital innovation.

    Join us to discover how to future-proof your applications and secure the foundation of your digital initiatives.

  • 12:00
    Nivedita Newar_Photo-1

    Sobering Up the AI Hype – Making Strategic Cyber Investments and Delivering Business Value

    Nivi Newar - Deputy CISO - UNSW

    Arrow
    • Understanding the risks and implications of AI and how it will change our threat landscape
    • Influencing and guiding the business to make strategic investment decisions
    • How cyber leaders are successfully governing the use of AI
    • How can AI be used in cyber defence?
  • 12:25
    05331045aee2a8e5142775d30365b88e-handshake-silhouette-icon-by-vexels

    Keeping your company’s Crown Jewels safe

    Senior representative - - DigiCert

    Arrow

    Credentials, API tokens, certificates, keys. All these secrets are growing at a rapid rate as we work towards building least privilege patterns. This proliferation introduces significant challenges for visibility, lifecycle, and user experience, and poses significant risk when they fall into the hands of bad actors. During this session, we will look at the necessary shifts that you need to make to keep your secrets safe.

  • 12:50

    Lunch

  • Chirag Joshi_Picture-1

    TRACK A - Innovation & Compliance

    Chair: Chirag Joshi - Founder & CISO - 7 Rules Cyber

    Arrow
  • 14:00
    Panel Discussion-1

    PANEL: Adapting to EU Regulatory Changes: Navigating Compliance and Managing Impacts

    Arrow

    In recent years, with the increasing activity and exploitation of organisations; governments have started to see the importance of Information Security.

    To address this governments have been implementing legislation and regulations around Information Security, to ensure that critical systems and infrastructure are protected.

    Europe last year released their versions which will come into effect in 2024 and 2025, that looks to address Information Security in Europe.

    These new directives and regulations could have implications and impacts, for any business working with EU organisations.

    Moderator: 
    Chirag Joshi, Founder & CISO, 7 Rules Cyber

    Panellists:

    Jihad Zein, Global Head of GRC, Technology, Toll Group

    Matthew Duckworth, Director, IT Risk and Security, MetLife Australia

    Leron Zinatullin, CISO, Linkly 

  • 14:25
    Partner-1

    Advancing your cyber maturity through improved resilience

    - Senior representative - SecurityScorecard

    Arrow
  • 14:50
    Panel Discussion-1

    PANEL: Driving the Need for AI Security Regulations

    Arrow
    • Strategies to increase awareness of AI risks to senior management and the board to support informed business decisions
    • How can cyber leaders collaborate with regulatory bodies to create effective AI security standards and guidelines
    • Overview of the ISO/IEC CD 27090 guidance and ASD’s Guidelines for Secure AI System Development – where to from here

    Moderator:

    Chirag Joshi, Founder & CISO, 7 Rules Cyber

    Panellists:

    Nathan Lewis, Head of Cyber, Technology and Data Risk, Newcastle Permanent

    Pearse Courtney, Cyber Project Manager, AEMO

    Robin Long, CTO, Rapid7

  • 15:25
    Brad Ford-1

    From Vulnerability to Vanguard: Reinventing DNS Security

    Brad Ford - Security Specialist – ANZ - Infoblox

    Arrow

    In today's fast-paced digital world, the security landscape is evolving rapidly, presenting organisations with increasingly sophisticated challenges. As Australia aims to achieve ambitious security objectives, the demand for cost-effective, high-impact security solutions is escalating. One area of immense potential lies within Domain Name System (DNS) technology, yet many organisations lack a comprehensive understanding of its pivotal role in modern security strategies.

    This session will shed light on the vulnerabilities inherent in DNS, the diverse array of threats exploiting the protocol, and innovative security approaches harnessing DNS and related network services to fortify organisations against evolving cyber threats. Attendees will learn about the importance of DNS, its vulnerabilities, and how to leverage DNS for defence, gaining valuable insights into threat detection and mitigation to bolster their security posture.

  • Dan Haagman 2

    TRACK B - Risk Management

    Chair: Dan Haagman - - Doctoral Security Researcher

    Arrow
  • 14:00
    Dan Elliott - Blank Background

    Leveraging Offensive Security for Proactive Risk Management

    Dan Elliott - Head of Cyber Resilience ANZ - Zurich Resilience Solutions - Zurich

    Arrow
    • Integrate offensive security teams into a proactive risk management strategy to prioritise and address critical vulnerabilities.
    • Foster a culture of continuous improvement within teams to stay agile and responsive to evolving threats.
    • Align offensive security efforts with organisational risk reduction goals, ensuring they support broader security objectives.
    • Apply offensive security skills beyond traditional penetration testing to identify emerging threats and reinforce the organisation's overall risk posture
  • 14:25
    1137 Speaker Image 600x600 - 2024-12-19T071950.687

    Protecting against Identity Fraud

    Johan Fantenberg - Product Marketing Director - Ping Identity

    Arrow

    In today’s rapidly evolving digital landscape, identity fraud poses a significant threat to organizations, costing billions annually and damaging customer trust. From account takeovers and synthetic identities to sophisticated impersonation scams, fraudsters are becoming more adept at exploiting vulnerabilities.

    Join us for a session  tailored for Security & IAM professionals, where we will explore:
    - Emerging Threats: A deep dive into the latest trends in identity fraud, including account takeovers, new account fraud, and the risks posed by bots and advanced impersonation techniques.
    - Proven Mitigation Strategies: Discover how a layered identity approach with real-time risk assessment, dynamic fraud detection, and secure authentication methods can protect your organization without compromising user experience.
    - Future-Proofing IAM Systems: Learn about scalable, AI-driven fraud detection technologies and identity orchestration that integrate seamlessly into existing IAM infrastructures.

    This session will equip you with actionable insights to strengthen your organisation’s defences while ensuring seamless and secure user journeys. Don’t miss this opportunity to stay ahead in the fight against identity fraud!

  • 14:50
    Panel Discussion-1

    PANEL: Elevating Cyber Risks To Boards, Senior Management, And Across Departments

    Arrow
    • Effective ways to influence boards and senior management on how security is aligned with the business goals
    • Engaging the Steering Committee: How to get cross-functional representatives to be security cheerleaders
    • The power of joining forces to assess risks, implement security controls, and ensure tech infrastructure is compliant to regulations

    Moderator:

    Madhuri Nandi, Head of Security, Nuvei

    Panellists:

    Vasyl Nair, Group CEO, Mine Super

    Christopher Johnson, Group Head of Technology, Charter Hall

    Saleshni Sharma, Regional CISO, Berkley

    Catherine Rowe, Former Global CISO, ex-QBE

  • 15:25
    Paul Thomas - Axonius-3-1

    The Risk in Risk Management

    Paul Thomas - Solutions Architect - Axonius

    Arrow

    Risk management is a crucial aspect of every organisation. The basic process is to identify potential risks, assess their impact, and implement strategies to mitigate them. Data analytics plays a vital role in risk management by providing insights into potential risks and helping organisations make informed decisions. Additionally, data analytics closes the risk management loop through assessing the effectiveness of mitigation strategies. Historical data, both external and internal, enables an organisation to evaluate the efficacy of previous initiatives and identify areas for further improvement.

    So how can you add data analytics to your Cyber Risk Management process? Let's discuss the risks of this promising venture and the potential sweet spot for your organisation.

  • River Nygryn

    TRACK C - Enabling Growth

    River Nygryn - CISO - HammondCare

    Arrow
  • 14:00
    Harsh Rasik Busa-2

    New CISO: A Toolkit For Your First 90 Days

    Harsh Rasik Busa - CISO - Avant Mutual

    Arrow

    In the ever-evolving landscape of cyber security, the path to leadership is often as unpredictable as the threats we face. In this presentation, we’ll explore successful ways to become an effective leader in a critical domain. Attendees will gain a deeper understanding of the strategic and operational adjustments required, the importance of rapid learning and adaptation, and the value of leveraging diverse experiences to build a resilient security posture.

  • 14:25
    Partner-1

    Reinforcing your boundaries with IAM

    - Senior representative - Illumio

    Arrow
    • What are the key challenges organisations face when implementing identity access management?
    • What are your recommendations to navigate these challenges?
    • What does a successful approach look like?
    • How can IAM help safeguard organisations upgrading business operations, modernising aging infrastructure, and protecting network perimeters, and scaling up?
  • 14:50
    Panel Discussion

    PANEL: Educate, educate, educate – simple steps to improve accountability across the business

    Arrow

    Effective ways to educate – engaging diverse people with cybersecurity and online safety

    People centric – adopting an in-person tone and using real-life examples of how a cyberattack can impact everyone’s lives

    Relevant – what’s in it for them and why they should care

    Providing resources – setting clear expectations and providing resources

     

    Moderator:

    Lisa Dethridge, Research Fellow, RMIT University

    Panellists:

    Hani Arab, CIO, Seymour Whyte

    River Nygryn, CISO, HammondCare

    Naveen Sharma, Head of Information Security, Superloop

  • 15:25
    Scott Leach_page-0001-1

    Topic to be confirmed

    Scott Leach - Vice President, APAC - Varonis

    Arrow
  • 15:50

    NETWORKING BREAK

  • 16:30
    Chirag Joshi_Picture-1

    Track A

    Chair: Chirag Joshi - Founder & CISO - 7 Rules Cyber

    Arrow
  • 16:10
    05331045aee2a8e5142775d30365b88e-handshake-silhouette-icon-by-vexels

    Building Cyber-Resilience Against Social Engineering Attacks

    Senior representative - - Okta

    Arrow
    • Explore the latest methods cybercriminals use to exploit human vulnerabilities to access sensitive information and compromise systems.
    • Learn strategies to build organisational awareness and defences to mitigate the risks associated with social engineering.
    • Discover how fostering a culture of cyber security awareness can empower employees reducing susceptibility to social engineering attacks and enhancing overall resilience.
  • Dan Haagman, Doctoral Security Researcher

    Track B

    Chair: Dan Haagman - Doctoral Security Researcher -

    Arrow
  • 16:10
    Matt headshot 450x450-1

    Real Time Visibility to Fortify Your Security Operations

    Matt Waite - Director of Technical Account Management - Tanium

    Arrow

    In today’s rapidly evolving digital landscape, real-time data is revolutionising the way critical infrastructure organisations manage and secure their IT environments. This insightful presentation by Tanium delves into the transformative power of real-time data, highlighting three key pillars: 

    • Cyber Hygiene: How to fortify your defences and make it increasingly difficult for adversaries to penetrate your systems. 
    • Security: Learn how to swiftly detect breaches, understand the extent of intrusions, and implement effective response measures to mitigate damage. 
    • Compliance: How real-time data super charges data collection, remediation and uplifts Essential 8 Maturity levels faster. 

    Join Matt as he explores how leveraging real-time data can enhance your cyber resilience, providing a robust shield against ever-evolving threats. 

  • 16:35
    Panel Discussion-1

    Plenary Panel: Influencing Human Behaviour and Reducing Cyber Risks

    Arrow
    • Importance of human factor to cyber security and why most cyber awareness efforts fail
    • Tailoring security awareness programs to address cyber risks and business priorities
    • Strategies to influence behaviour and create a cyber-safe culture

    Moderator:

    Jennifer Firbank, Cyber Security Strategy & Influence Principal, Telstra

    Panellists:

    Oliver Sebastian, Director, Information Technology, Landcom

    Bradley Busch, Non-Executive Director, Shire Christian School

    Sophia Barbour, Cyber Awareness and Intelligence Lead, Commonwealth Superannuation Corporation

    Tom Scully, Principal Architect, Public Sector, Palo Alto Networks 

  • 17:10
    Interactive_ Discussion_ Participation-1

    On Plenary Stage Interview: AI vs Cyber Attacks: What’s the Real Impact

    Arrow
    • Exploring the role of AI in cyber security, including how it’s currently implemented and making a real impact on defence and threat response.
    • Discussing the challenges and key considerations for adopting AI in cyber risk management and choosing the right technologies for a broader strategy.
    • Looking ahead to the future of AI in security, focusing on how organisations can measure its effectiveness and continue to strengthen their defences.

    Interviewer:

    Dan Haagman, Doctoral Security Researcher

    Interviewee:

    Lee Barney, GM Tech Security, TPG Telecom

  • 17:30
    Cocktails

    CISO Sydney Day 1 Closing Remarks & Networking Drinks

    Arrow