2019 Agenda

 

 

Canberra, 6 - 7 August 2019

Schedule

Create your personal agenda –check the favourite icon

Aug 609:10
Conference pass

Department of Defence: Cyber operations

Keynotes
  • The Australian Defence Force’s approach to cyberspace operations
  • Capabilities development
  • How other government departments can assist
Aug 609:30
Conference pass

Digital megatrends and artificial intelligence

Keynotes
  • Recent developments in artificial intelligence and machine learning worldwide and their implications for Australia.
  • How digital technology will change the operations of government over the coming decade.
  • Strategic foresight techniques for exploring the future capabilities and impacts of digital technology.
Aug 609:50
Conference pass

Why privacy regulation is great for the public and private sectors

Keynotes
  • Trust is fundamental for people to provide their personal data
  • Personal data fuels artificial intelligence, machine learning and analytics
  • With institutional trust at all-time lows, a privacy culture is now critical
Aug 610:25
Conference pass

Game Changing Fraud Aware Security for your business

Day 1: Free Expo Seminar Theatre
Thanks to the cloud adoption and mobile devices, organizations worldwide have an ever-expanding online footprint. Employees work online, customers and suppliers do business with organizations online. Business reputation can be made or broken online. Today’s cyberattacks are increasingly sophisticated and complex, driven by elaborate and resilient professional organizations that innovate faster than their targets. Hackers are not only after customers’ credit card details – they’re interested in any information that can be monetized in any way. The hacker’s motivation may be to get money, cause brand damage or just having fun at someone’s expense. A cyberattack can have a domino effect on business culminating in loss of revenue and goodwill, regulatory scrutiny and fines, and even share price plunges.

A key consideration for an organization assessing its cyber security is whether its measures are capable of preventing, detecting and adequately responding to attacks, rather than just complying with industry best practices. Compliance does not guarantee protection, and organizations with a mature approach to cyber security must go further.

Operating in a digital world depends on capability to maintain a secure and trusted environment. Fraud aware security must be the foundation on which digital business should be built. Gone are the days when we could build a walled garden perimeter, and feel secure. Today, businesses partner with others, outsource, have alliances, let customers access our systems and as we extend our reach – the perimeter of walled gardens is gone. All security strategies must align with the changes in the way organizations conduct business and the surrounding environments. We must ensure that our security programs are fraud aware, leverage intelligent identity based solutions, user behavior analytics, monitor and understand what is happening in and to our environment. We must work with the assumption we are being attacked and be prepared to offset those attacks with fraud aware security. The business should understand that their behavior impacts the security of our environment. The business must be invested in security.

During this session, we will take you through the dangers that impact your business and how game changing fraud aware security can help your business grow!
Rajan Barara, Senior Product Manager – Authentication, Entrust Datacard Asia Pacific
Aug 610:45
Conference pass

The Future Workforce - Are You Ready?

Day 1: Free Expo Seminar Theatre
How prepared is your workforce, as digital continues to take hold and the next wave of powerful technologies ushers in a new era? Disruptive forces such as AI, RPA and Cloud in addition to the evolving workplace methodologies such as ITIL, Agile and DevOps are already transforming Government Services – those who embrace them will push the economy forward, those who don't will be left behind. Join Jon Lang, CEO of Australia’s largest Corporate IT Training Provider DDLS, to learn the latest tech trends along with the skills needed to thrive in a new digital reality. As Australia’s only official training partner across the three major clouds – AWS, Microsoft Azure and Google Cloud, in addition to the number one cybersecurity training business, DDLS is able to provide a unique view on the skills in demand now and into the future.
Jon Lang, CEO, DDLS Australia
Aug 611:05
Conference pass

Data is the critical foundation for powering evidence based decision making and driving better citizen outcomes

Day 1: Tech in Gov
  • How to unlock your data assets to create a foundation for better decision making and faster time to action
  • Understanding your data driven journey and enabling your data assets to become the strategic assets that drive transformation
  • AI needs Data and Data needs AI: What comes first? And where to start?
Nick Smith, Managing Director, Australia & New Zealand, Informatica
Aug 611:05
Conference pass

Army cyber capability

Day 1: Cyber Security in Government
  • Cyber, electronic warfare and intelligence capability
  • Robotics and data analytics within the Australian army
  • Anticipating disruption by emerging technologies and organisations
Aug 611:05
Conference pass

Unlocking the potential of digital identity in Australia

Day 1: Identity
  • What does an Australia with digital identity look like?
  • What are the benefits of digital ID?
  • The Australian government has a sorry history trying to roll out national identity documents, how do we avoid the same pitfalls this time?
  • Why aren’t we setting ourselves up for success and how do we get things back on track?
Fergus Hanson, Head of the International Cyber Policy Centre, Australian Strategic Policy Institute
Aug 611:05
Conference pass

Protecting CIIs via Detection-less Paradigm

Day 1: Free Expo Seminar Theatre
  • Today’s cyber landscape is radically different from the past’s. Advanced threats are stealthy and lethal. They are difficult to detect. Unfortunately, cyber protection technologies continue to progress in a detection-oriented framework. It is therefore not uncommon for malicious codes to reside in a CIIs or enterprises and stay undetected for hundreds of days, exfiltrating data in complete silence.
  • Traditional methods are no longer working. Detect nothing does not mean it is safe. A detection-less strategy is imminently needed.
  • This sharing session focuses on addressing the common gaps in today’s cyber protection strategies collectively, and offers the thought leadership to fill these gaps from a highly operational, practitioner’s perspective.
Aug 611:25
Conference pass

Transitioning to digital, managing legacy and maximising budget - it can be done

Day 1: Tech in Gov
  • Key attributes to a successful digital transformation project
  • How to manage legacy efficiently including management of sensitive data
  • Lessons learnt to keep within budget, on time and on target
John Borchi, CISO, Queensland Health
Aug 611:25
Conference pass

Protecting Critical Infrastructure through IAM & PAM: Establish Governance & Reduce Vulnerability for Privileged Access

Day 1: Cyber Security in Government
Between growing security threats and evolving compliance mandates and regulations, such as the NIST Cybersecurity Framework, agencies are facing increased pressure to update and secure their aging infrastructure and networks. In this discussion, industry experts will share why an integrated identity access governance and privilege management strategy is at the core of a strong cybersecurity program, the framework for developing a successful program, and how to avoid common pitfalls when deploying these types of solutions.
Aug 611:25
Conference pass

Identity is dead - The digital identity movement has failed us, but there are lessons for the digital economy

Day 1: Identity
  • Identity is dead. All that matters now is data
  • There are no identity providers, just data brokers
  • Data supply and provenance are critical infrastructure for the digital economy
Aug 611:30
Conference pass

Convene. Secure Governance, Secure Decisions

Day 1: Free Expo Seminar Theatre
Good governance should be driven by security. Convene, the leading board meeting software, enables organisations to achieve secure governance and streamlined decisions through its powerful collaboration tools, promoting transparency and accountability. Built with enterprise-grade security, Convene empowers boards in over 80 countries worldwide — transforming the way they meet.
Samantha McGregor, Regional Sales Manager, Convene
Aug 611:45
Conference pass

Direct to mobile messaging is 90% of consumers preferred communication method. How will your organisation adapt?

Day 1: Tech in Gov
  • Mobile messaging has achieved the right balance between instantaneous communication without being overly intrusive.
  • As email volumes increase and open rates decline messaging platforms are set to play an increasing role in the way organisations engage with their stakeholders.
Aug 611:45
Conference pass

The global cyber landscape: Past, present and future

Day 1: Cyber Security in Government
  • The evolving world of cyber security - where we were, where we are and where we are headed
  • How does Australia’s cyber landscape compare to rest of world?
  • Upcoming trends
Moderator: Laurent Villeneuve, Product Marketing Manager, Genetec
Aidan Tudehope, Managing Director, Macquarie Government
Jamie Norton, Assistant Commissioner And Chief Information Security Officer, Australian Taxation Office
Prerana Mehta, Chief of Ecosystem Development, AustCyber
Aug 611:45
Conference pass

How will digital identity benefit the economy?

Day 1: Identity
  • Digital identification: a key to inclusive growth
  • Protecting rights and increasing transparency
Regis Bauchiere, General Manager, Identity Services, Australia Post
Anil John, Technical Director, Silicon Valley Innovation Program, Department of Homeland Security
Julian White, Identity Assurance Advisor, Government Digital Service
Aug 612:05
Conference pass

Transforming the Transformers - how does the IT function 'do digital transformation to itself?

Day 1: Tech in Gov
  • Implementing a Platform+Agile digital transformation approach in delivering business systems
  • The logic of the approach, implementation and results
Steve Hodgkinson, CIO, Department of Health and Human Services
Aug 612:05
Conference pass

The growth of the Australian cyber security ecosystem

Day 1: Cyber Security in Government
  • How does the Australian cyber security ecosystem compare to the rest of the world?
  • Our growth to date and the initiatives to continue
Fergus Hanson, Head of the International Cyber Policy Centre, Australian Strategic Policy Institute
Aug 612:05
Conference pass

We only have one identity so how do we look after it ?

Day 1: Identity
  • There is much talk about digital identity, but digital is just another channel representing your identity credentials
  • Linking the physical credential to the digital credentials isn’t a nice to have, it’s a necessity!
  • Authentication of your identity is just as important as securing your identity
Stephen Pratt, Managing Director, Kurz Australia
Aug 612:30
Conference pass

The future of authentication. Secure passwordless login for employees and customers

Day 1: Free Expo Seminar Theatre
Interested in learning more about how you could transform your users experience and reduce IT support costs with secure passwordless authentication?Unlike early predecessors, newly-developed open authentication standards, such as FIDO U2F and FIDO 2, provide strong authentication and high privacy with characteristics that have eluded previous hardware tokens – elegance and simplicity. Impossible you think?This session will change your perceptions and eventually protect your online accounts.
Alex Wilson, Director Solutions Engineering - APJ, Yubico AB
Aug 612:50
Conference pass

Secure Application Development in a Micro-Service World:

Day 1: Free Expo Seminar Theatre
In this thought provoking presentation, presenters will question the lack of focus on hardening software practices in a world increasingly based on micro-services underpinned by containerisation, quantum encryption and an obsessive desire from developers to right click on open-source code. With the ASD ISM dedicating some 11 pages to cabling and cable colours and only 5 paragraphs to secure software development, this presentation will challenge the prevailing mindset that underestimates the changing nature of the cyber security ecosystem and address the real risks that lay in protecting your core data, your metadata, your monitoring data and the unique insights derived from your AI analytics. More importantly, how are these risks practically mitigated?
Brad Bastow, Chief Technology Officer, AUCloud
Steve Clarke, Head of Application Development, AUCloud
Aug 613:10
Conference pass

Next Generation Digital Service Portfolios

Day 1: Free Expo Seminar Theatre
For decades, organisations of all sizes, from all industries, have struggled to govern their service portfolios and run their IT departments through a forward looking lens. Cost allocations were guess-timates at best with annual Cost Centre budgets being determined by previous year expenditure rather than transparent financial analysis. This presentation will walk through a working example of a Digital Service Portfolio and how real-time cost assignment identified actionable insights for a Federal Government Chief of IT.
Matt Campbell, CEO, Matt Campbell
Aug 613:30
Conference pass

Multi-agency and industry collaboration of classified information

Day 1: Free Expo Seminar Theatre
Multi-agency collaboration of classified information continues to be challenging for government both here and globally. Extending those collaboration requirements to Industry Partners, adds even more complexity. The solution: Take a proven TS platform and provide it as an accredited Australian PROTECTED Content & Collaboration service for Government and Industry.
Nick Main, CTO, archTIS
Aug 614:00
Conference pass

Roundtable 01: Why privacy regulation is great for the public & private sectors

Day 1: Round Table Discussions
Aug 614:00
Conference pass

Roundtable 02: Workshop - Key ingredients in government A.I analytics

Day 1: Round Table Discussions
An interactive roundtable session that enables attendees to explore four key inputs into successful AI projects. 1. Data, 2. People, 3. Process, 4. Platforms. This session centers the participants thinking around prioritising the requirements for beginning an AI project. Where and what are my data inputs? What skills do I have and what do I need? and what processes need to change? Are just some of the themes we explore in this session. At the end of the session you’ll be equipped with a framework to re-use for your AI projects.
Andrew Ford, Ecosystem Architect, Teradata
Aug 614:00
Conference pass

Roundtable 03: Identity at Rest and Identity in Motion

Day 1: Round Table Discussions
  • Identity is at the heart of today's IT services. Be it ordering McDonalds, to paying your bills, identity is used to improve customer experience, security and enable integrations such as digital assistants, etc..
  • To realize the full power of identities, it is important to understand that identities can leverage paradigms from data science (e.g. identity at rest and identity in motion) to deliver more value.
  • How can organizations leverage both identity at rest (authorization & consent) and identity in motion (authentication) to improve both operational simplicity, security and customer experiences.
Aug 614:00
Conference pass

Roundtable 04: Why Cyber - Security Now Affects Both Government & Private Enterprise (both Big and Small organisations)

Day 1: Round Table Discussions
Neil Ferreira, COO, Sententia
Aug 614:00
Conference pass

Roundtable 05: The secure integrated data networks solution - end-to-end encryption for protected networks and shared data; maximum performance and Government certified!

Day 1: Round Table Discussions
CDM + Senetas

Concerned about network security and data breach protection - Cloud, SaaS, public and private?

High-performance network solutions. Australian government certified encryption security - high-assurance security without compromising performance. Secure network architecture used by the world's most secure organisations.
  • Trusted network integration
  • Certified encryption security
  • Zero management overhead
  • Quantum ready
Aug 614:00
Conference pass

Roundtable 06: Current threat landscape for mobile devices

Day 1: Round Table Discussions
Aaron Cockerill, Chief Strategy Officer, Lookout, Inc.
Aug 614:00
Conference pass

Roundtable 07: Digital Transformation, Security and Compliance and the application in Government

Day 1: Round Table Discussions
Remaining at the forefront of technology and innovation is crucial for many organisations and Government is no different, the requirement for this not only stems froma desire to enable digital transformation and all the benefits that come with it but to also ensure that imperative elements such as policy and cybersecurity from theend user compute piece right through to the data centre are up-to-date, enabled and compliant.Join Lenovo for an informative and engaging round table covering off identity, device, connectivity and data security from an EUC perspective.
Hassan Baickdeli, Head of Emerging Technology & Solutions, Lenovo
Aug 614:00
Conference pass

Roundtable 08: Bots That Code: The Continuous Modernisation Playbook

Day 1: Round Table Discussions
Legacy systems are hurting business agility. Data is often trapped in offline systems meaning visibility across an organisation is limited. Using bots, Codebots can migrate these legacy systems to full stack applications with API documentation. Learn about how you can overcome the pitfalls of legacy and enter a mode of continuous modernisation.
Eban Escott, CEO, Codebots
Aug 614:00
Conference pass

Roundtable 09: Building Intelligent Communities: Opportunities, Challenges & Case Studies

Day 1: Round Table Discussions
Aug 614:00
Conference pass

Roundtable 10: How to deliver a workable mobile application on-time and within budget using agile delivery and UX design

Day 1: Round Table Discussions
As part of its digital strategy, DFAT’s Australian Passport Office (APO) has developed its first mobile application with biometric capabilities to help DFAT staff across its network of posts to digitally capture data using a portable device. The application will improve overall service capabilities, enhance the client experience and strengthen security around identity verification.Join this roundtable to learn and discuss the critical factors that enabled DFAT to go from concept to delivery of a workable Minimum Viable Product (MVP) in just 6 months using Agile delivery and UX design. We will provide an overview of the project and discuss and share ideas on:
  • Best practices for Going To Market
  • The benefit of keeping contracts lean
  • Agile delivery (Planning / Sprint 0 and execution using 2 week sprints)
  • Challenges around Technology, Testing, Integration, Security, Documentation
  • How to get effective stakeholder engagement
Bruce Young, CEO, Speedwell
Yannick Arekion, Technical Architect & Delivery Lead, Passport Standards and Biometric Section, DFAT
Aug 614:00
Conference pass

Roundtable 11: The X Factor: Why Employee Experience – not Customer Experience – is the next frontier of competitive advantage

Day 1: Round Table Discussions
Business success hinges on the ability to find and keep competitive advantage. In this regard, it makes sense to build this advantage by leveraging one of your largest (and most expensive) resources: your employees.Yet in a recent Nitro survey, 78% of respondents who did not feel productive at work also felt they weren’t being supported by management.

Where is the disconnect?

Join this intimate Nitro roundtable to discuss with experts and your peers:
  • The impact digital transformation is having on employee experience
  • How to better enable employees to effect change within the organization
  • How some of Australia’s largest government departments are empowering their employees toward change
  • The power of analytics and other tools to drive measurable and lasting change
Manvinder Hara, Sr. Solutions Engineer, Nitro Software
Michael Helder, VP APAC, Nitro Software
Aug 614:00
Conference pass

Roundtable 12: Capture in the age of digital born

Day 1: Round Table Discussions
Information management and critical record-keeping is quickly transitioning to become a function of the business process as opposed to an obligation at the end of the information life cycle.

This round table discussion will examine the relationship between the current trend in digital transformation and the obligatory governance and compliance requirements on best practice information and records management.
  • Why are digital transformation initiatives not considering records capture?
  • How do we simplify electronic records management and add value to the business processes?
  • What is the difference between Centralised and Decentralised capture?
  • How can we successfully capture records in real time?
  • Whose responsibility is it anyway?
Aug 614:00
Conference pass

Roundtable 13: How can cyber consultancy be different? Create structural value for our Customer and not just be a black provider

Day 1: Round Table Discussions
  • Addressing the cybersecurity skills gap and selecting the right cybersecurity specialist to provide, trusted and structured knowledge transfer as part of your security project.
  • Upskilling your people in your organisation to build cyber-resilience as part of your security engagement.
Paul Domoney, Head of BlackBerry Services, Asia Pacific & Japan, BlackBerry
Damon Zemanek, Head Of Services ANZ, BlackBerry
Aug 614:00
Conference pass

Roundtable 14: AI Based Cybersecurity – How to Decouple Legacy from Innovation

Day 1: Round Table Discussions
  • What is AI in cyber security and what is not, cut through the noise
  • Simplify security operations with a prevention first approach, leveraging AI and machine learning
  • Support, extend and enhance security on legacy infrastructure in a highly cost effective way to enable innovation
Jason Duerden, Country Manager for ANZ, BlackBerry Cylance
Aug 614:00
Conference pass

Roundtable 15: Managing Data and Trust - The Principles of “Good Identity”

Day 1: Round Table Discussions
Digital Services have changed how we interact with the world around us from government to local stores and social media. Core to the success of digital services is trust and with it a robust identity strategy. We will explore good identity principals to drive successful digital services with privacy, consent management and security.
Aug 614:00
Conference pass

Roundtable 16: The Modern Workplace

Day 1: Round Table Discussions
The modern workplace is evolving at lightning speed, with distributed teams, brand-new business models and complex security issues. The right digital tools connect and support government staff, wherever they are to encourage productivity, engagement and collaboration.ASI will be hosting roundtable discussions on the Modern Workplace which will focus on the four key areas:
  • Built for teamwork
  • Unlocks creativity
  • Intelligent security
  • Integrated for simplicity
Presented by ASI Solutions and Microsoft
Aaron Dinnage, Modern Workplace Specialist, Microsoft
Aug 614:00
Conference pass

Roundtable 17: Explore how connected technologies are improving public safety and communication within communities, and how the mobilisation of government is impacting both the state and federal publi

Day 1: Round Table Discussions
Jason Lee, Regional Marketing Manager, Panasonic
Aug 614:00
Conference pass

Roundtable 18: Right Data Fuels AI/ML – How do we know what “Right Data is?”

Day 1: Round Table Discussions
Artificial Intelligence (AI) and Machine Learning (ML) no longer a buzz word, today it is available within your enterprise, join a conversation around what you need to think about to benefit from AI/ML in your pursuit of Data Analytics.
Satian Vasudevan, Job please, Informatica
Aug 614:00
Conference pass

Can IT deliver the '1-click' customer experience?

Day 1: Free Expo Seminar Theatre
In a digital era, where on-demand service delivery has become the norm, service departments such as IT, HR and Facilities are under increasing pressure to respond to business demands quickly.

Routine requests, such as answering the same question or actioning simple tasks, can take up the bulk of the team’s time. Many delivery departments still rely on manual processes to manage service requests, resulting in bottlenecks, oversights and frustration.

Alemba will demonstrate how Alemba Service Manager can accelerate service request fulfilment to:
  • Reduce workload and increase productivity, by automating and simplifying the delivery of routine services.
  • Improve customer engagement and satisfaction with an easy-to-use customer request portal.
Kenny Little, Director of Account Management, Alemba Group
Alan Carnegie, Pre Sales Consultant, Asia Pacific, Alemba Group
Aug 616:00
Conference pass

Next Generation Secure Cloud

Day 1: Free Expo Seminar Theatre
Vault's CEO will outline the next generation in secure cloud technology covering AI acceleration to quantum cryptography
Rupert Taylor-Price, Chief Executive Officer, Vault Cloud
Aug 616:15
Conference pass

Digital Identity: Cyberwar and peace

Day 1: Closing Plenary
  • A famous media theorist (“the medium is the message”) once said that WWIII would be an information war with no differentiation between military and civilian participants.
  • And as renowned, cyber security guru, Bruce Schneier, wrote “Book Press here to Kill Everybody,” cyber war is the new normal. So, what are we going to do?
  • Digital identity is a fundamental component of our defences against fake people, fake news and fake things. But what are you going to do to make it a reality?
Aug 616:20
Conference pass

Monitoring and Administrating Privileged Access in the cloud

Day 1: Free Expo Seminar Theatre
Business transformation with complex multi-cloud infrastructures, increase data privacy and security risks – from human and robotic identities. The 2019 Data Breach Investigations Report, highlighted the increasing threat caused by system administrator or Privileged User accounts.

As organisations and Government departments move from their on-premise infrastructure to cloud, they face new challenges and nuances in securing this privileged access. They need a Privileged Access Management (PAM) solution that provides frictionless, effective and scalable control over sensitive access to critical workloads and applications in a multi-cloud ecosystem.

Come see how Saviynt addresses these challenges by providing a Cloud architected solution to help manage privileged access in Azure (Microsoft), Amazon and Google Cloud platforms, from workloads to serverless computing and the DevOps tools.
Vijay Chaudhari, Identity Subject Matter Expert, Saviynt, Inc.
Aug 616:45
Conference pass

Inside Facebook: The secrets behind Facebook's meteoric rise and how you can apply them to your business

Day 1: Closing Plenary
Facebook’s unprecedented rise to world dominance is well-known. Harvard dorm room. Geeky teen founder. Hackathons. Billions of friends, fans, shares and likes. Fake news. Filter bubbles.But the true story of Facebook’s journey is far more fascinating than any outsider’s book or Hollywood movie. Former Facebook CEO for Australia and New Zealand, Stephen Scheeler, knows this story because he was there. In this captivating keynote, Stephen shares his insider’s insights about what makes Facebook tick, how the company makes decisions, how it nurtures its famous “move fast and break things” culture, how it drives innovation and disruption, and what Mark Zuckerberg and other Facebook leaders really do to maintain Facebook’s explosive growth, even in the face of front-page controversy.
Aug 617:05
Conference pass

Congestion busting through digital process management

Day 1: Closing Plenary
  • Discover how digital process management can supercharge congestion-busting
  • Understand how digital process management can assist service delivery within your agency
Gero Decker, Co-founder and CEO, Signavio

Create your personal agenda –check the favourite icon

Aug 709:10
Conference pass

Case Study: The Smith Family's migration to a cloud-based system

Day 2: Tech in Gov Stream A
  • The journey to a strategy of simplification
  • The hurdles we encountered
  • Next steps: where to next?
Brad Talbot, Cloud Services Manager, The Smith Family
Aug 709:10
Conference pass

Building digital capability to support a customer-first culture

Day 2: Tech in Gov Stream B
  • The TMR Digital Capability program and its four streams
  • How new ways of working are enhancing the agility of the organisation through testing small and building capability gradually
  • How TMR is using Design Thinking to understand real customer needs and enhance customer experience
Aug 709:10
Conference pass

Australia's world leading cyber diplomacy - What we've achieved and what's next

Day 2: Cyber Security in Government
  • The 2019 International Cyber Engagement Strategy Progress Report
  • Stepping up the Cyber Cooperation Program
  • Deterring malicious actors and reinforcing a peaceful and stable cyberspace
Tobias Feakin, Ambassador for Cyber Affairs, Department of Foreign Affairs and Trade
Aug 709:10
Conference pass

Stream A - Digital ID and financial services

Day 2: Identity Stream A
  • What problem is digital identity fixing?
  • Why is this a priority for the Australian Payments Council
  • How will business, consumers and government benefit from interoperable identity services
Lindsay Boulton, Assistant Governor Business Services, Reserve Bank of Australia
Aug 709:10
Conference pass

Stream B - The Identity Project – Reimagining trust in the digital age

Day 2: Identity Stream B
  • How people act and participate has changed dramatically from decades past however structural barriers make it difficult for people to represent themselves to each other and to the organisations and institutions with which they want to engage.
  • Through The Identity Project we are authoring a new narrative for how trust is developed in a digital world and how this might make it easier for people to fully participate in society.
  • We are creating a decentralised self-sovereign identity ecosystem that serves humanity developing both the product that will build the bridge from physical to digital identity as well as the trust standards to support the ecosystem.
Nick Byrne, Co-Founder and CEO, Typehuman
Aug 709:30
Conference pass

Implementing an innovative digital ecosystem

Day 2: Tech in Gov Stream A
  • Providing strategic leadership as well as the delivery of business-focused technology outcomes
  • Legacy systems, data analytics, AI and automation and security
  • Enabling the Department to supply efficient services to the most vulnerable people in our society
Aug 709:30
Conference pass

Speed is the new currency > Quality and accuracy are indispensable

Day 2: Tech in Gov Stream B
  • What is the journey to “Quality at Speed”?
  • How do you scale Continuous Testing to the enterprise?
  • How can you eliminate testing as the bottleneck in your Software Delivery Lifecycle?
  • And how do you know you are on the right path?
Aug 709:30
Conference pass

Panel: Protecting the journey to the cloud

Day 2: Cyber Security in Government
  • Transformation of Australia’s government agencies and harnessing the opportunities of the cloud.
  • The distinct advantage of cloud adoption in driving citizen value, managing costs and avoiding risk when compared to those that don’t.
  • Discussing the key areas such as data governance, access, breaches and the know-how to reduce cloud risks and drive success.
Mark Sayer, Cyber Defence Lead, AAPAC, Accenture
Matthew Grech, Managing Director, eXa Group
Julian Valtas, Director, ICT Security Operations, ACT Government
Aug 709:30
Conference pass

Stream A - Panel: Government digital customer service

Day 2: Identity Stream A
  • Using digital proof of identity
  • Enabling customer choice
  • Improving compliance
Tim Ransom, Design Lead, Digital Identity Transition Programme, Department Of Internal Affairs
Jonathon Thorpe, Head of Digital Identity, Digital Transformation Agency
Julian White, Identity Assurance Advisor, Government Digital Service
Aug 709:30
Conference pass

Stream B - Identity, privacy and open data

Day 2: Identity Stream B
  • Current and future issues in privacy and data security
  • Why Identity is key to privacy and security in a digital world
  • Observations on privacy breaches and best responses
  • Informed consent, GDPR, Facebook and the ‘social license’ governments have for the use of data
Aug 709:50
Conference pass

Best Practices in Data Lake Deployment

Day 2: Tech in Gov Stream A
The concept of “Data Lake” is becoming a widely adopted best practice in constructing an analytic ecosystem. When well executed, a data lake strategy will increase analytic agility for an organization and provide a foundation for provisioning data into both discovery and integrated data warehouse platforms. However, there are many pitfalls with this approach that can be avoided with best practices deployment. This workshop will provide guidance on how to deploy toward the “data reservoir” concept rather than ending up with an all too common “data swamp”.
  • Learn best practices pertaining to data lake construction and deployment.
  • Learn why Hadoop is an important technology for data lake deployment.
  • Learn how to leverage a data lake as part of an overall analytic ecosystem strategy.
Stephen Brobst, CTO, Teradata Australia Pty Limited
Aug 709:50
Conference pass

Operationalising advanced analytics

Day 2: Tech in Gov Stream B
  • Advanced analytics for decision support
  • Machine learning in organisational operations
  • Transformation lessons
Tony Krizan, Executive Director, Corporate Operations and Information, CFO, CIO, National Health and Medical Research Council
Aug 709:50
Conference pass

Changing cybersecurity threats and trends in Australia and Asia

Day 2: Cyber Security in Government
  • Unveiling the Security Intelligence Report (SIR) to improve cyber resilience in Asia-Pacific
  • Core insights and key trends of the SIR
  • Deriving Asia-pacific insights from analysing data from 15 markets
Abbas Kudrati, Chief Cyber Security Advisor, Microsoft Asia
Aug 709:50
Conference pass

Stream A - Personal Data as a form of currency

Day 2: Identity Stream A
  • Citizens currently live a dual existence - physical and digital
  • The challenge to balance individual privacy with national security is one of the biggest challenge for governments and society around the world
  • The increase in fraud, identity theft and data hacks makes this topic critical from a policy, economic, security and commercial perspective
Aug 709:50
Conference pass

Stream B - The challenge of combining KYC and user experience

Day 2: Identity Stream B
  • Optimising KYC for you and your customers
  • The KYC trinity – optimise security, minimise friction, and maximise customer value
Moderator: Skeeve Stevens, Director, Future Crime Agency
Ches Rafferty, MD, ScanTek
Oliver Lauterwein, Sales Director, Digidentity
Aug 710:25
Conference pass

Everyone wants innovation, but no one wants change. Where does Digital Transformation fit?

Day 2: Free Expo Seminar Theatre
Tamara Zacharias, Director, Creative & Web, GrowthOps
Tegan Clarkson, Creative Director, Technology, GrowthOps
Aug 711:00
Conference pass

Taking a principles and platforms approach to Technology Strategy

Day 2: Tech in Gov Stream A
  • Technology planning in a shortening update cycle
  • Frameworks for deciding the unknown, unknowns
  • Taking a platform approach to delivery
Aug 711:00
Conference pass

Building the “Citizen Experience”

Day 2: Tech in Gov Stream B
Panellists will draw on their extensive experience in Government Digital Transformation to explore how today's human-centred design focus is shaping the Australian citizen's digital experience across Government platforms.
Aug 711:00
Conference pass

Practical strategies to building cyber resiliency in your organisation

Day 2: Cyber Security in Government
  • Building and communicating your cyber security strategy
  • Leveraging a threat intelligence focus approach to cyber security
  • Know your environment and your enemy and planning an effective defence
Ian Mckenzie, CTO, Department of Parliamentary Services
Aug 711:00
Conference pass

Achieving Zero Trust with a Strong Identity Governance and Privilege Strategy

Day 2: Identity Stream A
Aug 711:10
Conference pass

Security Re-Defined - Using Cloud to Transform Security and Accelerate Digital Transformation

Day 2: Free Expo Seminar Theatre
Netskope is building a secure on-ramp to the internet for enterprise users accessing SaaS, IaaS, privately hosted apps, and the web itself. The cloud is transforming your organization. It’s changing how you work as everything is becoming more intuitive, connected, open, and collaborative, and that change is rippling across SaaS, IaaS, and the web. This creates new challenges and risks that legacy security vendors can’t address.
Aug 711:20
Conference pass

The path to smarter government and intelligent communities

Day 2: Tech in Gov Stream A
  • Delivering the smart city initiative
  • Continually evolving and staying ahead of demand
Aug 711:20
Conference pass

NSW government’s digital journey

Day 2: Tech in Gov Stream B
  • Citizen’s one-stop shop for government services
  • Global standard in customer service excellence
  • Consumer privacy, data governance and data ethics
Chris Fechner, Executive Director Service Delivery - Digital and Middle Office Channels, Service NSW
Aug 711:20
Conference pass

Gaining organsation support for the ASD Essential 8

Day 2: Cyber Security in Government
  • Unpacking the ASD Essential 8 framework and its impact on state government systems
  • The building blocks to getting your cyber security model up to speed
  • Building next gen capabilities
Moderator: Rob Dooley, Senior Director, Regional Sales, ANZ, Carbon Black Australia Pty Limited
Ian Mckenzie, CTO, Department of Parliamentary Services
Jamie Norton, Assistant Commissioner And Chief Information Security Officer, Australian Taxation Office
Aug 711:20
Conference pass

Panel: Consumer data right - The role of digital ID in open data

Day 2: Identity Stream A
  • The impact of the consumer data right beyond banking
  • Will it provide economic benefits through efficiency, competition and innovation?
  • Ensuring privacy by design in the implementation
  • How to ensure data value capture
  • Whose asset is the data?
Moderator: Robinson Roe, Managing Director ANZ, OneTrust - Privacy Management Software
Annabel Griffin, Partner, King & Wood Mallesons
James Bligh, Data61 CSIRO
Gary Blair, CEO, Imali
Aug 711:40
Conference pass

Secure Innovation in Public Sector – Leveraging the AWS Platform

Day 2: Tech in Gov Stream A
  • The Australian Cyber Security Centre (ACSC) has awarded PROTECTED certification to AWS for 42 cloud services
  • Many government customers are already seeing successful outcomes from leveraging the AWS platform
  • Come and hear how AWS is enabling Public Sector agencies Innovate to deliver on their missions cost effectively
Aug 711:40
Conference pass

Evolving Agile in Government – Emphasising Value Discovery

Day 2: Tech in Gov Stream B
  • How harnessing an agile team methodology is delivering value to government customers and stakeholders
  • Includes demonstrations and videos of real examples transforming the way government works and interacts with citizens
Dale Andrea, Chief Information Officer, Department of Transport <VicRoads>
Aug 711:40
Conference pass

Current threat landscape for mobile devices

Day 2: Cyber Security in Government
  • Current Threat Landscape
  • Full Spectrum of Risks - Device threats, app-based threats, and MiTM attacks
  • Security beyond the perimeter
  • Real use cases for Mobile Threat Detection
Aaron Cockerill, Chief Strategy Officer, Lookout, Inc.
Aug 711:40
Conference pass

Identity - Changes in how we understand identity are coming

Day 2: Identity Stream A
Skeeve Stevens, Director, Future Crime Agency
Aug 712:00
Conference pass

Election Security

Day 2: Tech in Gov Stream A
  • Cryptographic methods for verifying an election outcome in an e-voting system
  • Weaknesses in the proofs in a Swiss e-voting system
  • Implications for Australian elections, particularly e-voting systems already in us in WA and NSW
Vanessa Teague, Associate Professor, University of Melbourne
Aug 712:00
Conference pass

e-Research, Computational Science and Supercomputing for Defence and National Security

Day 2: Tech in Gov Stream B
  • Moving forward with technologies to support e-research and computational science
  • Increasing reliance on centralised shared services for enterprise and collaborative functions
  • Investing in a secure, multi-tenanted, supercomputer to enhance Defence and national security research
Peter Lambert, Chief Research Services, Defence Science and Technology Group
Aug 712:00
Conference pass

The future workplace design

Day 2: Cyber Security in Government
  • The current cyber security working environment
  • Do we have a resourcing problem?
  • Correlation between diversity and national security
Aug 712:00
Conference pass

Panel: Interoperability

Day 2: Identity Stream A
  • Interoperability amongst jurisdictions, making it truly whole of government
  • Identity proofing levels
  • Levels of assurance
  • Service delivery
Tim Ransom, Design Lead, Digital Identity Transition Programme, Department Of Internal Affairs
Jonathon Thorpe, Head of Digital Identity, Digital Transformation Agency
Julian White, Identity Assurance Advisor, Government Digital Service
Oliver Lauterwein, Sales Director, Digidentity
Skeeve Stevens, Director, Future Crime Agency
Aug 712:25
Conference pass

Protecting CIIs via Detection-less Paradigm

Day 2: Free Expo Seminar Theatre
  • Today’s cyber landscape is radically different from the past’s. Advanced threats are stealthy and lethal. They are difficult to detect. Unfortunately, cyber protection technologies continue to progress in a detection-oriented framework. It is therefore not uncommon for malicious codes to reside in a CIIs or enterprises and stay undetected for hundreds of days, exfiltrating data in complete silence.
  • Traditional methods are no longer working. Detect nothing does not mean it is safe. A detection-less strategy is imminently needed.
  • This sharing session focuses on addressing the common gaps in today’s cyber protection strategies collectively, and offers the thought leadership to fill these gaps from a highly operational, practitioner’s perspective.
Aug 712:45
Conference pass

Game Changing Fraud Aware Security for your business

Day 2: Free Expo Seminar Theatre
Thanks to the cloud adoption and mobile devices, organizations worldwide have an ever-expanding online footprint. Employees work online, customers and suppliers do business with organizations online. Business reputation can be made or broken online. Today’s cyberattacks are increasingly sophisticated and complex, driven by elaborate and resilient professional organizations that innovate faster than their targets. Hackers are not only after customers’ credit card details – they’re interested in any information that can be monetized in any way. The hacker’s motivation may be to get money, cause brand damage or just having fun at someone’s expense. A cyberattack can have a domino effect on business culminating in loss of revenue and goodwill, regulatory scrutiny and fines, and even share price plunges.

A key consideration for an organization assessing its cyber security is whether its measures are capable of preventing, detecting and adequately responding to attacks, rather than just complying with industry best practices. Compliance does not guarantee protection, and organizations with a mature approach to cyber security must go further.

Operating in a digital world depends on capability to maintain a secure and trusted environment. Fraud aware security must be the foundation on which digital business should be built. Gone are the days when we could build a walled garden perimeter, and feel secure. Today, businesses partner with others, outsource, have alliances, let customers access our systems and as we extend our reach – the perimeter of walled gardens is gone. All security strategies must align with the changes in the way organizations conduct business and the surrounding environments. We must ensure that our security programs are fraud aware, leverage intelligent identity based solutions, user behavior analytics, monitor and understand what is happening in and to our environment. We must work with the assumption we are being attacked and be prepared to offset those attacks with fraud aware security. The business should understand that their behavior impacts the security of our environment. The business must be invested in security.

During this session, we will take you through the dangers that impact your business and how game changing fraud aware security can help your business grow!
Rajan Barara, Senior Product Manager – Authentication, Entrust Datacard Asia Pacific
Aug 713:05
Conference pass

Mythbusting Zero Trust

Day 2: Free Expo Seminar Theatre
Trust is a dangerous vulnerability that is exploited by malicious actors. The point of Zero Trust is not to make networks, clouds or endpoints more trusted; it’s to eliminate the concept of trust from digital systems altogether.

This session will Illustrate what Zero Trust is, and what Zero Trust is not, and how creating this network is actually much simpler than building a legacy 20th-century hierarchical one. A straightforward five-step methodology will also be shared in this session, that will enable you to simplify your deployment of a Zero Trust network, making it manageable, cost-effective and non-disruptive.
Aug 713:25
Conference pass

Working smarter, faster, and more secure: Agency, government and industry PROTECTED collaboration as a service

Day 2: Free Expo Seminar Theatre
In a digital age new technologies and cloud applications have created ways of working smarter and faster than before. However, for sensitive and valuable information, these technologies have remained largely out of reach – until now. Join this presentation for a look into the new SaaS product facilitating PROTECTED collaboration between governments, agencies, and industry.
Nick Main, CTO, archTIS
Aug 713:45
Conference pass

Attack chain of an active adversary

Day 2: Free Expo Seminar Theatre
Peter Stewart, Senior Security Engineer, Sophos Pty Limited
Aug 714:00
Conference pass

"Transformation" is not a goal. Get on with delivering user services

Day 2: Tech in Gov Stream A
  • Helping customer engagement on digital platforms
  • Delivering government exemplar programs
Aug 714:00
Conference pass

The courage to transform

Day 2: Tech in Gov Stream B
  • Leveraging the concepts of social anarchy and psychologically safe work spaces to accelerate positive change
  • Overcoming the impediments that hold progress back
Aug 714:00
Conference pass

The importance of incident management as a focus of Victoria’s Cyber Security Strategy

Day 2: Cyber Security in Government
  • Understanding the contemporary cyber risk environment
  • Knowing your capability requirements for effective incident management
  • Putting it all in practice - understanding what works
David Cullen, Principal Advisor, Cyber Incidents and Emergency Management, Department of Premier and Cabinet (Vic)
Aug 714:00
Conference pass

Can Blockchain/DLT help prevent forgery and counterfeiting?

Day 2: Identity Stream A
Anil John, Technical Director, Silicon Valley Innovation Program, Department of Homeland Security
Aug 714:10
Conference pass

Why privacy regulation is great for the public & private sectors

Day 2: Free Expo Seminar Theatre
  • Trust is fundamental for people to provide their personal data
  • Personal data fuels artificial intelligence, machine learning and analytics
  • With institutional trust at all-time lows, a privacy culture is now critical
Aug 714:20
Conference pass

Cloud transition, management and delivery

Day 2: Tech in Gov Stream A
  • Shared insights from the Department of Parliamentary Services
  • Common grievances
Antony Stinziani, CIO, Department of Parliamentary Services
Aug 714:20
Conference pass

Getting Ready For 5G

Day 2: Tech in Gov Stream B
  • What does 5G really mean to you as Government Agency
  • Government Planning for 5G
  • How does the Government Participate in the 5G evolution
Aug 714:20
Conference pass

The Sharing Economy: Getting your information where it needs to go

Day 2: Cyber Security in Government
  • Countering cybersecurity threats through information sharing for organisations
  • Establishing your organisation’s capacity for Information sharing
  • Industry examples that have built sharing communities
Tim Hamer, Principal Security Analyst, AusCERT
Aug 714:40
Conference pass

Realising the potential of new technologies for government

Day 2: Tech in Gov Stream A
  • How Artificial Intelligence is unlocking the potential of trapped data for organisations
  • Implications on government & the IT industry
  • Overcoming data & technology barriers to drive AI adoption
Aug 714:40
Conference pass

Cyber Education as an All-Many-Few approach: One Yank's Perspective

Day 2: Tech in Gov Stream B
Aug 714:40
Conference pass

The Paris terrorist attacks: some reflections

Day 2: Cyber Security in Government
  • The post-effects and the relationship between France and Australia
  • Global cyber trends and counter-terrorism intelligence
Aug 714:40
Conference pass

Panel: Is self-sovereign identity a real alternative to traditional identity models?

Day 2: Identity Stream A
  • Self-sovereign identity examples around the world
  • What is meant by traditional identity models?
  • How can this benefit government organisations?
  • Can self-sovereign identity coexist with the current government and private sector models?
Moderator: Cindy Nicholson, CEO & Managing Director, Braintree
Tim Ransom, Design Lead, Digital Identity Transition Programme, Department Of Internal Affairs
Nick Byrne, Co-Founder and CEO, Typehuman
Aug 715:00
Conference pass

National security implications of digital evidence underpinning Australian democracy

Day 2: Tech in Gov Stream A
  • Defining national identity
  • What’s the problem?
  • What’s the solution?
Anne Lyons, Visiting Fellow, Australian Strategic Policy Institute
Aug 715:00
Conference pass

The Evolution of the Data Breach Landscape

Day 2: Cyber Security in Government
  • The data breach problem
  • Data breach impact and consequences on organisations
  • What organisations are doing to stop data breaches
  • Predictive analytics to discover a data breach before it happens.
Aug 715:00
Conference pass

Panel: What does privacy, consent and data protection look like on an international landscape?

Day 2: Identity Stream A
last published: 08/Aug/19 07:15 GMT