2019 Agenda

 

 

Canberra, 6 - 7 August 2019

Schedule

Create your personal agenda –check the favourite icon

Aug 609:10
Conference pass

Department of Defence: Cyber operations

Keynotes
  • The Australian Defence Force’s approach to cyberspace operations
  • Capabilities development
  • How other government departments can assist
Aug 609:30
Conference pass

Inside Facebook: The secrets behind Facebook's meteoric rise and how you can apply them to your business

Keynotes
Facebook’s unprecedented rise to world dominance is well-known. Harvard dorm room. Geeky teen founder. Hackathons. Billions of friends, fans, shares and likes. Fake news. Filter bubbles.But the true story of Facebook’s journey is far more fascinating than any outsider’s book or Hollywood movie. Former Facebook CEO for Australia and New Zealand, Stephen Scheeler, knows this story because he was there. In this captivating keynote, Stephen shares his insider’s insights about what makes Facebook tick, how the company makes decisions, how it nurtures its famous “move fast and break things” culture, how it drives innovation and disruption, and what Mark Zuckerberg and other Facebook leaders really do to maintain Facebook’s explosive growth, even in the face of front-page controversy.
Aug 609:50
Conference pass

Why privacy regulation is great for the public and private sectors

Keynotes
  • Trust is fundamental for people to provide their personal data
  • Personal data fuels artificial intelligence, machine learning and analytics
  • With institutional trust at all-time lows, a privacy culture is now critical
Aug 611:05
Conference pass

Identifying technologies and capabilities to meet operational needs

Day 1: Tech in Gov
  • Due diligence checklist: The essentials for digital transformation projects
  • Utilising the global innovation ecosystem
  • Example case study
Anil John, Technical Director, Silicon Valley Innovation Program, Department of Homeland Security
Aug 611:05
Conference pass

Army cyber capability

Day 1: Cyber Security in Government
  • Cyber, electronic warfare and intelligence capability
  • Robotics and data analytics within the Australian army
  • Anticipating disruption by emerging technologies and organisations
Aug 611:05
Conference pass

Unlocking the potential of digital identity in Australia

Day 1: Identity
  • What does an Australia with digital identity look like?
  • What are the benefits of digital ID?
  • The Australian government has a sorry history trying to roll out national identity documents, how do we avoid the same pitfalls this time?
  • Why aren’t we setting ourselves up for success and how do we get things back on track?
Aug 611:25
Conference pass

Transitioning to digital, managing legacy and maximising budget - it can be done

Day 1: Tech in Gov
  • Key attributes to a successful digital transformation project
  • How to manage legacy efficiently including management of sensitive data
  • Lessons learnt to keep within budget, on time and on target
John Borchi, Queensland Health
Aug 611:25
Conference pass

Identity is dead - The digital identity movement has failed us, but there are lessons for the digital economy

Day 1: Identity
  • Identity is dead. All that matters now is data
  • There are no identity providers, just data brokers
  • Data supply and provenance are critical infrastructure for the digital economy
Aug 611:45
Conference pass

90% of the world prefers messaging over any other form of communication… Why?

Day 1: Tech in Gov
Aug 611:45
Conference pass

The global cyber landscape: Past, present and future

Day 1: Cyber Security in Government
  • The evolving world of cyber security - where we were, where we are and where we are headed
  • How does Australia’s cyber landscape compare to rest of world?
  • Upcoming trends
Yaso Arumugam, Chief Information Officer, National Archives Authority
Aug 611:45
Conference pass

How will digital identity benefit the economy?

Day 1: Identity
Anil John, Technical Director, Silicon Valley Innovation Program, Department of Homeland Security
Julian White, Identity Assurance Advisor, Government Digital Service
Aug 612:05
Conference pass

Transforming the Transformers - how does the IT function 'do digital transformation to itself?

Day 1: Tech in Gov
  • Implementing a Platform+Agile digital transformation approach in delivering business systems
  • The logic of the approach, implementation and results
Steve Hodgkinson, CIO, Department of Health and Human Services
Aug 612:05
Conference pass

The growth of the Australian cyber security ecosystem

Day 1: Cyber Security in Government
  • How does the Australian cyber security ecosystem compare to the rest of the world?
  • Our growth to date and the initiatives to continue
Aug 612:05
Conference pass

We only have one identity so how do we look after it ?

Day 1: Identity
  • There is much talk about digital identity, but digital is just another channel representing your identity credentials
  • Linking the physical credential to the digital credentials isn’t a nice to have, it’s a necessity!
  • Authentication of your identity is just as important as securing your identity
Aug 614:00
Conference pass

Digital Identity: Cyberwar and peace

Keynotes
  • A famous media theorist (“the medium is the message”) once said that WWIII would be an information war with no differentiation between military and civilian participants.
  • And as renowned, cyber security guru, Bruce Schneier, wrote “Book Press here to Kill Everybody,” cyber war is the new normal. So, what are we going to do?
  • Digital identity is a fundamental component of our defences against fake people, fake news and fake things. But what are you going to do to make it a reality?
Aug 614:30
Conference pass

Roundtable 1: Identity at Rest and Identity in Motion

Day 1: Round Table Discussions
  • Identity is at the heart of today's IT services. Be it ordering McDonalds, to paying your bills, identity is used to improve customer experience, security and enable integrations such as digital assistants, etc..
  • To realize the full power of identities, it is important to understand that identities can leverage paradigms from data science (e.g. identity at rest and identity in motion) to deliver more value.
  • How can organizations leverage both identity at rest (authorization & consent) and identity in motion (authentication) to improve both operational simplicity, security and customer experiences.
Aug 616:45
Conference pass

The drive for freedom

Day 1: Closing Plenary
  • “The struggle is not about driving a car, the struggle is about being in the driver’s seat of our own destiny”
  • Manal al-Sharif reveals how women in her country are forced to be faceless, voiceless, and nameless. She describes how she launched the Women2Drive campaign, which encourages Saudi women to drive in a country where it was against the law for them to operate a vehicle. Her story explains why it is important for us all to acknowledge the difference our actions can make to the position of women now and for the future.
  • Manal's story is about what it is like to be a working woman in a male-dominated field, globally and specifically in Saudi Arabia. She presents the challenges, facts and reality, and how they can make you or break you.
Aug 617:05
Conference pass

Congestion busting through digital process management

Day 1: Closing Plenary
  • Discover how digital process management can supercharge congestion-busting
  • Understand how digital process management can assist service delivery within your agency
Gero Decker, Co-founder and CEO, Signavio

Create your personal agenda –check the favourite icon

Aug 709:10
Conference pass

The development of Australia's A.I. ethics framework

Keynotes
  • A.I. roadmap for the Australian government Department of Industry, Innovation and Science
  • How can government adapt to a rapidly changing world
Aug 709:10
Conference pass

Building digital capability to support a customer-first culture

Day 2: Tech in Gov Stream B
  • The TMR Digital Capability program and its four streams
  • How new ways of working are enhancing the agility of the organisation through testing small and building capability gradually
  • How TMR is using Design Thinking to understand real customer needs and enhance customer experience
Aug 709:10
Conference pass

Australia's world leading cyber diplomacy - What we've achieved and what's next

Day 2: Cyber Security in Government
  • The 2019 International Cyber Engagement Strategy Progress Report
  • Stepping up the Cyber Cooperation Program
  • Deterring malicious actors and reinforcing a peaceful and stable cyberspace
Aug 709:10
Conference pass

Digital ID and financial services

Day 2: Identity Stream A
Aug 709:30
Conference pass

Speed is the new currency > Quality and accuracy are indispensable

Day 2: Tech in Gov Stream B
  • What is the journey to “Quality at Speed”?
  • How do you scale Continuous Testing to the enterprise?
  • How can you eliminate testing as the bottleneck in your Software Delivery Lifecycle?
  • And how do you know you are on the right path?
Aug 709:30
Conference pass

Interoperability

Day 2: Identity Stream B
Moderator: Oliver Lauterwein, Sales Director, Digidentity
Julian White, Identity Assurance Advisor, Government Digital Service
Aug 709:50
Conference pass

Autonomous decision-making, machine learning, and artificial intelligence: What does it all mean and why should you care?

Keynotes
  • The future of artificial intelligence and how you can take advantage of emerging capabilities today
  • The differences between deep learning and shallow learning and when to apply which technique
  • The pitfalls and opportunities for using advanced analytics to create high value outcomes
Stephen Brobst, CTO, Teradata Australia Pty Limited
Aug 709:50
Conference pass

Case study: Collaboration between a corporate enterprise and a startup

Day 2: Tech in Gov Stream B
  • How HSBC Bank Australia enlisted the help of a startup to improve workflow
  • Key learnings from the journey
  • How can government be more open to working with startups
Ben Tabell, CIO & Head of Innovation, HSBC Bank Plc
Aug 709:50
Conference pass

The importance of incident management as a focus of Victoria’s Cyber Security Strategy

Day 2: Cyber Security in Government
  • Understanding the contemporary cyber risk environment
  • Knowing your capability requirements for effective incident management
  • Putting it all in practice - understanding what works
David Cullen, Principal Advisor, Cyber Incidents and Emergency Management, Department of Premier and Cabinet V.I.C.
Aug 709:55
Conference pass

Consumer data right - The role of digital ID in open data

Day 2: Identity Stream A
Aug 711:00
Conference pass

Taking a principles and platforms approach to Technology Strategy

Keynotes
Al Blake, CTO, ACT Government
Aug 711:00
Conference pass

Building the “Citizen Experience”

Day 2: Tech in Gov Stream B
Aug 711:00
Conference pass

Practical strategies to building cyber resiliency in your organisation

Day 2: Cyber Security in Government
  • Building and communicating your cyber security strategy
  • Leveraging a threat intelligence focus approach to cyber security
  • Know your environment and your enemy and planning an effective defence
Ian McKenzie, CTO, Department of Parliamentary Services
Aug 711:00
Conference pass
Aug 711:00
Conference pass
Aug 711:20
Conference pass

NSW government’s digital journey

Day 2: Tech in Gov Stream B
  • Citizen’s one-stop shop for government services
  • Global standard in customer service excellence
  • Consumer privacy, data governance and data ethics
Aug 711:20
Conference pass

How cyber breaches and false news are affecting democracy and the economy

Day 2: Cyber Security in Government
Aug 711:20
Conference pass

Know Your Customer (KYC) - Meeting evolving privacy requirements through a central risk management system

Day 2: Identity Stream A
Oliver Lauterwein, Sales Director, Digidentity
Aug 711:20
Conference pass

Personal Data as a form of Currency

Day 2: Identity Stream B
Aug 711:40
Conference pass

Secure Innovation in Public Sector – Leveraging the AWS Platform

Keynotes
  • The Australian Cyber Security Centre (ACSC) has awarded PROTECTED certification to AWS for 42 cloud services
  • Many government customers are already seeing successful outcomes from leveraging the AWS platform
  • Come and hear how AWS is enabling Public Sector agencies Innovate to deliver on their missions cost effectively
Aug 711:40
Conference pass

Evolving Agile in Government – Emphasising Value Discovery

Day 2: Tech in Gov Stream B
  • How harnessing an agile team methodology is delivering value to government customers and stakeholders
  • Includes demonstrations and videos of real examples transforming the way government works and interacts with citizens
Dale Andrea, Chief Information Officer, VicRoads
Aug 711:40
Conference pass

Current threat landscape for mobile devices

Day 2: Cyber Security in Government
  • Current Threat Landscape
  • Full Spectrum of Risks - Device threats, app-based threats, and MiTM attacks
  • Security beyond the perimeter
  • Real use cases for Mobile Threat Detection
Aaron Cockerill, Chief Strategy Officer, Lookout, Inc.
Aug 711:40
Conference pass

The mobile platform has become a rich target for gaining access to sensitive government data

Day 2: Cyber Security in Government
  • Current Threat Landscape
  • Full Spectrum of Risks - Device threats, app-based threats, and MiTM attacks
  • Security beyond the perimeter
  • Real use cases for Mobile Threat Detection
Aug 711:45
Conference pass

What does privacy, consent and data protection look like on an international landscape?

Day 2: Identity Stream A
Aug 712:00
Conference pass

Implementing an innovative digital ecosystem

Keynotes
Aug 712:00
Conference pass

e-Research, Computational Science and Supercomputing for Defence and National Security

Day 2: Tech in Gov Stream B
  • Moving forward with technologies to support e-research and computational science
  • Increasing reliance on centralised shared services for enterprise and collaborative functions
  • Investing in a secure, multi-tenanted, supercomputer to enhance Defence and national security research
Peter Lambert, CIO and Chief Research Services, Defence Science and Technology Group
Aug 712:00
Conference pass

Cyber innovation isn’t all tech

Day 2: Cyber Security in Government
  • Mental modelling and understanding human behaviour
  • Predicted threat models focussing on the science behind human behaviour
Aug 712:00
Conference pass

The Sharing Economy: Getting your information where it needs to go

Day 2: Cyber Security in Government
  • Countering cybersecurity threats through information sharing for organisations
  • Establishing your organisation’s capacity for Information sharing
  • Industry examples that have built sharing communities
Tim Hamer, Principal Security Analyst, AusCERT
Aug 714:00
Conference pass

Realising the potential of new technologies for government

Keynotes
  • How Artificial Intelligence is unlocking the potential of trapped data for organisations
  • Implications on government & the IT industry
  • Overcoming data & technology barriers to drive AI adoption
Aug 714:00
Conference pass

The courage to transform

Day 2: Tech in Gov Stream B
  • Leveraging the concepts of social anarchy and psychologically safe work spaces to accelerate positive change
  • Overcoming the impediments that hold progress back
Andrew Collins, CIO, Australian Sports Anti-Doping Authority
Aug 714:00
Conference pass

Changing cybersecurity threats and trends in Australia and Asia

Day 2: Cyber Security in Government
  • Unveiling the Security Intelligence Report (SIR) to improve cyber resilience in Asia-Pacific
  • Core insights and key trends of the SIR
  • Deriving Asia-pacific insights from analysing data from 15 markets
Aug 714:00
Conference pass

National security implications of digital evidence underpinning Australian democracy

Day 2: Identity Stream B
Aug 714:00
Conference pass

Using blockchain to prevent fraud

Day 2: Identity Stream A
Anil John, Technical Director, Silicon Valley Innovation Program, Department of Homeland Security
Aug 714:20
Conference pass

Cloud transition, management and delivery

Keynotes
  • Shared insights from the Department of Parliamentary Services
  • Common grievances
Antony Stinziani, CIO, Department of Parliamentary Services
Aug 714:20
Conference pass

The future workplace design

Day 2: Cyber Security in Government
  • The current cyber security working environment
  • Do we have a resourcing problem?
  • Correlation between diversity and national security
Moderator: Maria Macnamara, Head of Strategic Communications and Engagement, Digital Transformation Agency (DTA)
Mike Webb, CIO, The Treasury
Aug 714:20
Conference pass

Blockchain identity: It will profoundly affect all of us

Day 2: Identity Stream A
Aug 714:40
Conference pass

The Paris terror attacks: what it did to counter-terrorism intelligence and cyber security globally

Day 2: Cyber Security in Government
  • The post-effects and the relationship between France and Australia
  • Global cyber trends and counter-terrorism intelligence
Aug 714:40
Conference pass

Seamless Contactless Traveller processing

Day 2: Identity Stream B
Joshua Abraham, Biometrics Expert, Department Of Home Affairs
Aug 714:40
Conference pass

The Identity Project – Reimagining trust in the digital age

Day 2: Identity Stream A
Aug 715:00
Conference pass

Case Study: The Smith Family's migration to a cloud-based system

Keynotes
  • The journey to a strategy of simplification
  • The hurdles we encountered
  • Next steps: where to next?
Brad Talbot, Cloud Services Manager, The Smith Family
Aug 715:00
Conference pass

Innovative Procurement

Day 2: Tech in Gov Stream B
Aug 715:00
Conference pass

Innovative Procurement

Day 2: Tech in Gov Stream B
  • What is ‘innovative procurement?’
  • Case studies of government working with startups through a non-traditional discovery journey
Aug 715:00
Conference pass

Is self-sovereign identity a real alternative to traditional identity models?

Day 2: Identity Stream A
Aug 715:00
Conference pass

Is self-sovereign identity a real alternative to traditional identity models?

Day 2: Identity Stream B
  • Self-sovereign identity examples around the world
  • What is meant by traditional identity models?
  • How can this benefit government organisations?
  • Can self-sovereign identity coexist with the current government and private sector models?
last published: 20/Jun/19 05:05 GMT