2019 Agenda

 

 

Day 1: Cyber Security in Government, Tuesday 6 August 2019

09:00

Opening Remarks

Major General Marcus Thompson
09:10

Department of Defence: Cyber operations

  • The Australian Defence Force’s approach to cyberspace operations
  • Capabilities development
  • How other government departments can assist
Stefan Hajkowicz
09:30

Digital megatrends and artificial intelligence

  • Recent developments in artificial intelligence and machine learning worldwide and their implications for Australia.
  • How digital technology will change the operations of government over the coming decade.
  • Strategic foresight techniques for exploring the future capabilities and impacts of digital technology.
Robinson Roe
09:50

Why privacy regulation is great for the public and private sectors

  • Trust is fundamental for people to provide their personal data
  • Personal data fuels artificial intelligence, machine learning and analytics
  • With institutional trust at all-time lows, a privacy culture is now critical
Day 1: Cyber Security in Government
11:00

Chairperson's Opening Remarks

Gus Mclachlan
Day 1: Cyber Security in Government
11:05

Army cyber capability

  • Cyber, electronic warfare and intelligence capability
  • Robotics and data analytics within the Australian army
  • Anticipating disruption by emerging technologies and organisations
Frank Briguglio
Day 1: Cyber Security in Government
11:25

Protecting Critical Infrastructure through IAM & PAM: Establish Governance & Reduce Vulnerability for Privileged Access

Between growing security threats and evolving compliance mandates and regulations, such as the NIST Cybersecurity Framework, agencies are facing increased pressure to update and secure their aging infrastructure and networks. In this discussion, industry experts will share why an integrated identity access governance and privilege management strategy is at the core of a strong cybersecurity program, the framework for developing a successful program, and how to avoid common pitfalls when deploying these types of solutions.
Panel discussion
Day 1: Cyber Security in Government
11:45

The global cyber landscape: Past, present and future

  • The evolving world of cyber security - where we were, where we are and where we are headed
  • How does Australia’s cyber landscape compare to rest of world?
  • Upcoming trends
Fergus Hanson
Day 1: Cyber Security in Government
12:05

The growth of the Australian cyber security ecosystem

  • How does the Australian cyber security ecosystem compare to the rest of the world?
  • Our growth to date and the initiatives to continue
last published: 05/Aug/19 23:25

Day 1: Round Table Discussions, Tuesday 6 August 2019

Robinson Roe
Day 1: Round Table Discussions
14:00

Roundtable 01: Why privacy regulation is great for the public & private sectors

Andrew Ford
Day 1: Round Table Discussions
14:00

Roundtable 02: Workshop - Key ingredients in government A.I analytics

An interactive roundtable session that enables attendees to explore four key inputs into successful AI projects. 1. Data, 2. People, 3. Process, 4. Platforms. This session centers the participants thinking around prioritising the requirements for beginning an AI project. Where and what are my data inputs? What skills do I have and what do I need? and what processes need to change? Are just some of the themes we explore in this session. At the end of the session you’ll be equipped with a framework to re-use for your AI projects.
Marcus Vogt
Day 1: Round Table Discussions
14:00

Roundtable 03: Identity at Rest and Identity in Motion

  • Identity is at the heart of today's IT services. Be it ordering McDonalds, to paying your bills, identity is used to improve customer experience, security and enable integrations such as digital assistants, etc..
  • To realize the full power of identities, it is important to understand that identities can leverage paradigms from data science (e.g. identity at rest and identity in motion) to deliver more value.
  • How can organizations leverage both identity at rest (authorization & consent) and identity in motion (authentication) to improve both operational simplicity, security and customer experiences.
Neil Ferreira
Day 1: Round Table Discussions
14:00

Roundtable 04: Why Cyber - Security Now Affects Both Government & Private Enterprise (both Big and Small organisations)

Julian Fay
Day 1: Round Table Discussions
14:00

Roundtable 05: The secure integrated data networks solution - end-to-end encryption for protected networks and shared data; maximum performance and Government certified!

CDM + Senetas

Concerned about network security and data breach protection - Cloud, SaaS, public and private?

High-performance network solutions. Australian government certified encryption security - high-assurance security without compromising performance. Secure network architecture used by the world's most secure organisations.
  • Trusted network integration
  • Certified encryption security
  • Zero management overhead
  • Quantum ready
Aaron Cockerill
Day 1: Round Table Discussions
14:00

Roundtable 06: Current threat landscape for mobile devices

Hassan Baickdeli
Day 1: Round Table Discussions
14:00

Roundtable 07: Digital Transformation, Security and Compliance and the application in Government

Remaining at the forefront of technology and innovation is crucial for many organisations and Government is no different, the requirement for this not only stems froma desire to enable digital transformation and all the benefits that come with it but to also ensure that imperative elements such as policy and cybersecurity from theend user compute piece right through to the data centre are up-to-date, enabled and compliant.Join Lenovo for an informative and engaging round table covering off identity, device, connectivity and data security from an EUC perspective.
Eban Escott
Day 1: Round Table Discussions
14:00

Roundtable 08: Bots That Code: The Continuous Modernisation Playbook

Legacy systems are hurting business agility. Data is often trapped in offline systems meaning visibility across an organisation is limited. Using bots, Codebots can migrate these legacy systems to full stack applications with API documentation. Learn about how you can overcome the pitfalls of legacy and enter a mode of continuous modernisation.
Chip Redden
Day 1: Round Table Discussions
14:00

Roundtable 09: Building Intelligent Communities: Opportunities, Challenges & Case Studies

Bruce Young
Day 1: Round Table Discussions
14:00

Roundtable 10: How to deliver a workable mobile application on-time and within budget using agile delivery and UX design

As part of its digital strategy, DFAT’s Australian Passport Office (APO) has developed its first mobile application with biometric capabilities to help DFAT staff across its network of posts to digitally capture data using a portable device. The application will improve overall service capabilities, enhance the client experience and strengthen security around identity verification.Join this roundtable to learn and discuss the critical factors that enabled DFAT to go from concept to delivery of a workable Minimum Viable Product (MVP) in just 6 months using Agile delivery and UX design. We will provide an overview of the project and discuss and share ideas on:
  • Best practices for Going To Market
  • The benefit of keeping contracts lean
  • Agile delivery (Planning / Sprint 0 and execution using 2 week sprints)
  • Challenges around Technology, Testing, Integration, Security, Documentation
  • How to get effective stakeholder engagement
Manvinder Hara
Day 1: Round Table Discussions
14:00

Roundtable 11: The X Factor: Why Employee Experience – not Customer Experience – is the next frontier of competitive advantage

Business success hinges on the ability to find and keep competitive advantage. In this regard, it makes sense to build this advantage by leveraging one of your largest (and most expensive) resources: your employees.Yet in a recent Nitro survey, 78% of respondents who did not feel productive at work also felt they weren’t being supported by management.

Where is the disconnect?

Join this intimate Nitro roundtable to discuss with experts and your peers:
  • The impact digital transformation is having on employee experience
  • How to better enable employees to effect change within the organization
  • How some of Australia’s largest government departments are empowering their employees toward change
  • The power of analytics and other tools to drive measurable and lasting change
Demos Gougoulas
Day 1: Round Table Discussions
14:00

Roundtable 12: Capture in the age of digital born

Damon Zemanek
Day 1: Round Table Discussions
14:00

Roundtable 13: How can cyber consultancy be different? Create structural value for our Customer and not just be a black provider

  • Addressing the cybersecurity skills gap and selecting the right cybersecurity specialist to provide, trusted and structured knowledge transfer as part of your security project.
  • Upskilling your people in your organisation to build cyber-resilience as part of your security engagement.
Jason Duerden
Day 1: Round Table Discussions
14:00

Roundtable 14: AI Based Cybersecurity – How to Decouple Legacy from Innovation

  • What is AI in cyber security and what is not, cut through the noise
  • Simplify security operations with a prevention first approach, leveraging AI and machine learning
  • Support, extend and enhance security on legacy infrastructure in a highly cost effective way to enable innovation
Allan Foster
Day 1: Round Table Discussions
14:00

Roundtable 15: Managing Data and Trust - The Principles of “Good Identity”

Digital Services have changed how we interact with the world around us from government to local stores and social media. Core to the success of digital services is trust and with it a robust identity strategy. We will explore good identity principals to drive successful digital services with privacy, consent management and security.
Aaron Dinnage
Day 1: Round Table Discussions
14:00

Roundtable 16: The Modern Workplace

The modern workplace is evolving at lightning speed, with distributed teams, brand-new business models and complex security issues. The right digital tools connect and support government staff, wherever they are to encourage productivity, engagement and collaboration.ASI will be hosting roundtable discussions on the Modern Workplace which will focus on the four key areas:
  • Built for teamwork
  • Unlocks creativity
  • Intelligent security
  • Integrated for simplicity
Presented by ASI Solutions and Microsoft
Jason Lee
Day 1: Round Table Discussions
14:00

Roundtable 17: Explore how connected technologies are improving public safety and communication within communities, and how the mobilisation of government is impacting both the state and federal publi

Satian Vasudevan
Day 1: Round Table Discussions
14:00

Roundtable 18: Right Data Fuels AI/ML – How do we know what “Right Data is?”

Artificial Intelligence (AI) and Machine Learning (ML) no longer a buzz word, today it is available within your enterprise, join a conversation around what you need to think about to benefit from AI/ML in your pursuit of Data Analytics.
last published: 05/Aug/19 23:25

Day 1: Closing Plenary, Tuesday 6 August 2019

David Birch
Day 1: Closing Plenary
16:15

Digital Identity: Cyberwar and peace

  • A famous media theorist (“the medium is the message”) once said that WWIII would be an information war with no differentiation between military and civilian participants.
  • And as renowned, cyber security guru, Bruce Schneier, wrote “Book Press here to Kill Everybody,” cyber war is the new normal. So, what are we going to do?
  • Digital identity is a fundamental component of our defences against fake people, fake news and fake things. But what are you going to do to make it a reality?
Stephen Scheeler
Day 1: Closing Plenary
16:45

Inside Facebook: The secrets behind Facebook's meteoric rise and how you can apply them to your business

Facebook’s unprecedented rise to world dominance is well-known. Harvard dorm room. Geeky teen founder. Hackathons. Billions of friends, fans, shares and likes. Fake news. Filter bubbles.But the true story of Facebook’s journey is far more fascinating than any outsider’s book or Hollywood movie. Former Facebook CEO for Australia and New Zealand, Stephen Scheeler, knows this story because he was there. In this captivating keynote, Stephen shares his insider’s insights about what makes Facebook tick, how the company makes decisions, how it nurtures its famous “move fast and break things” culture, how it drives innovation and disruption, and what Mark Zuckerberg and other Facebook leaders really do to maintain Facebook’s explosive growth, even in the face of front-page controversy.
Gero Decker
Day 1: Closing Plenary
17:05

Congestion busting through digital process management

  • Discover how digital process management can supercharge congestion-busting
  • Understand how digital process management can assist service delivery within your agency
Day 1: Closing Plenary
17:25

Closing remarks

last published: 05/Aug/19 23:25

Day 2: Cyber Security in Government, Wednesday 7 August 2019

Day 2: Cyber Security in Government
09:00

Opening remarks

Tobias Feakin
Day 2: Cyber Security in Government
09:10

Australia's world leading cyber diplomacy - What we've achieved and what's next

  • The 2019 International Cyber Engagement Strategy Progress Report
  • Stepping up the Cyber Cooperation Program
  • Deterring malicious actors and reinforcing a peaceful and stable cyberspace
Panel discussion
Day 2: Cyber Security in Government
09:30

Panel: Protecting the journey to the cloud

  • Transformation of Australia’s government agencies and harnessing the opportunities of the cloud.
  • The distinct advantage of cloud adoption in driving citizen value, managing costs and avoiding risk when compared to those that don’t.
  • Discussing the key areas such as data governance, access, breaches and the know-how to reduce cloud risks and drive success.
Mark Sayer, Cyber Defence Lead, AAPAC, Accenture
Matthew Grech, Managing Director, eXa Group
Julian Valtas, Director, ICT Security Operations, ACT Government
Abbas Kudrati
Day 2: Cyber Security in Government
09:50

Changing cybersecurity threats and trends in Australia and Asia

  • Unveiling the Security Intelligence Report (SIR) to improve cyber resilience in Asia-Pacific
  • Core insights and key trends of the SIR
  • Deriving Asia-pacific insights from analysing data from 15 markets
Ian Mckenzie
Day 2: Cyber Security in Government
11:00

Practical strategies to building cyber resiliency in your organisation

  • Building and communicating your cyber security strategy
  • Leveraging a threat intelligence focus approach to cyber security
  • Know your environment and your enemy and planning an effective defence
Panel discussion
Day 2: Cyber Security in Government
11:20

Gaining organsation support for the ASD Essential 8

  • Unpacking the ASD Essential 8 framework and its impact on state government systems
  • The building blocks to getting your cyber security model up to speed
  • Building next gen capabilities
Aaron Cockerill
Day 2: Cyber Security in Government
11:40

Current threat landscape for mobile devices

  • Current Threat Landscape
  • Full Spectrum of Risks - Device threats, app-based threats, and MiTM attacks
  • Security beyond the perimeter
  • Real use cases for Mobile Threat Detection
Panel discussion
Day 2: Cyber Security in Government
12:00

The future workplace design

  • The current cyber security working environment
  • Do we have a resourcing problem?
  • Correlation between diversity and national security
David Cullen
Day 2: Cyber Security in Government
14:00

The importance of incident management as a focus of Victoria’s Cyber Security Strategy

  • Understanding the contemporary cyber risk environment
  • Knowing your capability requirements for effective incident management
  • Putting it all in practice - understanding what works
Tim Hamer
Day 2: Cyber Security in Government
14:20

The Sharing Economy: Getting your information where it needs to go

  • Countering cybersecurity threats through information sharing for organisations
  • Establishing your organisation’s capacity for Information sharing
  • Industry examples that have built sharing communities
Stephen Brady
Day 2: Cyber Security in Government
14:40

The Paris terrorist attacks: some reflections

  • The post-effects and the relationship between France and Australia
  • Global cyber trends and counter-terrorism intelligence
Amani Ibrahim
Day 2: Cyber Security in Government
15:00

The Evolution of the Data Breach Landscape

  • The data breach problem
  • Data breach impact and consequences on organisations
  • What organisations are doing to stop data breaches
  • Predictive analytics to discover a data breach before it happens.
last published: 05/Aug/19 23:25

Day 1: Free Expo Seminar Theatre, Tuesday 6 August 2019

Rajan Barara
Day 1: Free Expo Seminar Theatre
10:25

Game Changing Fraud Aware Security for your business

Thanks to the cloud adoption and mobile devices, organizations worldwide have an ever-expanding online footprint. Employees work online, customers and suppliers do business with organizations online. Business reputation can be made or broken online. Today’s cyberattacks are increasingly sophisticated and complex, driven by elaborate and resilient professional organizations that innovate faster than their targets. Hackers are not only after customers’ credit card details – they’re interested in any information that can be monetized in any way. The hacker’s motivation may be to get money, cause brand damage or just having fun at someone’s expense. A cyberattack can have a domino effect on business culminating in loss of revenue and goodwill, regulatory scrutiny and fines, and even share price plunges.

A key consideration for an organization assessing its cyber security is whether its measures are capable of preventing, detecting and adequately responding to attacks, rather than just complying with industry best practices. Compliance does not guarantee protection, and organizations with a mature approach to cyber security must go further.

Operating in a digital world depends on capability to maintain a secure and trusted environment. Fraud aware security must be the foundation on which digital business should be built. Gone are the days when we could build a walled garden perimeter, and feel secure. Today, businesses partner with others, outsource, have alliances, let customers access our systems and as we extend our reach – the perimeter of walled gardens is gone. All security strategies must align with the changes in the way organizations conduct business and the surrounding environments. We must ensure that our security programs are fraud aware, leverage intelligent identity based solutions, user behavior analytics, monitor and understand what is happening in and to our environment. We must work with the assumption we are being attacked and be prepared to offset those attacks with fraud aware security. The business should understand that their behavior impacts the security of our environment. The business must be invested in security.

During this session, we will take you through the dangers that impact your business and how game changing fraud aware security can help your business grow!
Jon Lang
Day 1: Free Expo Seminar Theatre
10:45

The Future Workforce - Are You Ready?

How prepared is your workforce, as digital continues to take hold and the next wave of powerful technologies ushers in a new era? Disruptive forces such as AI, RPA and Cloud in addition to the evolving workplace methodologies such as ITIL, Agile and DevOps are already transforming Government Services – those who embrace them will push the economy forward, those who don't will be left behind. Join Jon Lang, CEO of Australia’s largest Corporate IT Training Provider DDLS, to learn the latest tech trends along with the skills needed to thrive in a new digital reality. As Australia’s only official training partner across the three major clouds – AWS, Microsoft Azure and Google Cloud, in addition to the number one cybersecurity training business, DDLS is able to provide a unique view on the skills in demand now and into the future.
Ken Soh
Day 1: Free Expo Seminar Theatre
11:05

Protecting CIIs via Detection-less Paradigm

  • Today’s cyber landscape is radically different from the past’s. Advanced threats are stealthy and lethal. They are difficult to detect. Unfortunately, cyber protection technologies continue to progress in a detection-oriented framework. It is therefore not uncommon for malicious codes to reside in a CIIs or enterprises and stay undetected for hundreds of days, exfiltrating data in complete silence.
  • Traditional methods are no longer working. Detect nothing does not mean it is safe. A detection-less strategy is imminently needed.
  • This sharing session focuses on addressing the common gaps in today’s cyber protection strategies collectively, and offers the thought leadership to fill these gaps from a highly operational, practitioner’s perspective.
Samantha McGregor
Day 1: Free Expo Seminar Theatre
11:30

Convene. Secure Governance, Secure Decisions

Good governance should be driven by security. Convene, the leading board meeting software, enables organisations to achieve secure governance and streamlined decisions through its powerful collaboration tools, promoting transparency and accountability. Built with enterprise-grade security, Convene empowers boards in over 80 countries worldwide — transforming the way they meet.
Alex Wilson
Day 1: Free Expo Seminar Theatre
12:30

The future of authentication. Secure passwordless login for employees and customers

Interested in learning more about how you could transform your users experience and reduce IT support costs with secure passwordless authentication?Unlike early predecessors, newly-developed open authentication standards, such as FIDO U2F and FIDO 2, provide strong authentication and high privacy with characteristics that have eluded previous hardware tokens – elegance and simplicity. Impossible you think?This session will change your perceptions and eventually protect your online accounts.
Brad Bastow
Day 1: Free Expo Seminar Theatre
12:50

Secure Application Development in a Micro-Service World:

In this thought provoking presentation, presenters will question the lack of focus on hardening software practices in a world increasingly based on micro-services underpinned by containerisation, quantum encryption and an obsessive desire from developers to right click on open-source code. With the ASD ISM dedicating some 11 pages to cabling and cable colours and only 5 paragraphs to secure software development, this presentation will challenge the prevailing mindset that underestimates the changing nature of the cyber security ecosystem and address the real risks that lay in protecting your core data, your metadata, your monitoring data and the unique insights derived from your AI analytics. More importantly, how are these risks practically mitigated?
Matt Campbell
Day 1: Free Expo Seminar Theatre
13:10

Next Generation Digital Service Portfolios

For decades, organisations of all sizes, from all industries, have struggled to govern their service portfolios and run their IT departments through a forward looking lens. Cost allocations were guess-timates at best with annual Cost Centre budgets being determined by previous year expenditure rather than transparent financial analysis. This presentation will walk through a working example of a Digital Service Portfolio and how real-time cost assignment identified actionable insights for a Federal Government Chief of IT.
Nick Main
Day 1: Free Expo Seminar Theatre
13:30

Multi-agency and industry collaboration of classified information

Multi-agency collaboration of classified information continues to be challenging for government both here and globally. Extending those collaboration requirements to Industry Partners, adds even more complexity. The solution: Take a proven TS platform and provide it as an accredited Australian PROTECTED Content & Collaboration service for Government and Industry.
Nick Main, CTO, archTIS
Kenny Little
Day 1: Free Expo Seminar Theatre
14:00

Can IT deliver the '1-click' customer experience?

In a digital era, where on-demand service delivery has become the norm, service departments such as IT, HR and Facilities are under increasing pressure to respond to business demands quickly.

Routine requests, such as answering the same question or actioning simple tasks, can take up the bulk of the team’s time. Many delivery departments still rely on manual processes to manage service requests, resulting in bottlenecks, oversights and frustration.

Alemba will demonstrate how Alemba Service Manager can accelerate service request fulfilment to:
  • Reduce workload and increase productivity, by automating and simplifying the delivery of routine services.
  • Improve customer engagement and satisfaction with an easy-to-use customer request portal.
Rupert Taylor-Price
Day 1: Free Expo Seminar Theatre
16:00

Next Generation Secure Cloud

Vault's CEO will outline the next generation in secure cloud technology covering AI acceleration to quantum cryptography
Vijay Chaudhari
Day 1: Free Expo Seminar Theatre
16:20

Monitoring and Administrating Privileged Access in the cloud

Business transformation with complex multi-cloud infrastructures, increase data privacy and security risks – from human and robotic identities. The 2019 Data Breach Investigations Report, highlighted the increasing threat caused by system administrator or Privileged User accounts.

As organisations and Government departments move from their on-premise infrastructure to cloud, they face new challenges and nuances in securing this privileged access. They need a Privileged Access Management (PAM) solution that provides frictionless, effective and scalable control over sensitive access to critical workloads and applications in a multi-cloud ecosystem.

Come see how Saviynt addresses these challenges by providing a Cloud architected solution to help manage privileged access in Azure (Microsoft), Amazon and Google Cloud platforms, from workloads to serverless computing and the DevOps tools.
last published: 05/Aug/19 23:25

Day 2: Free Expo Seminar Theatre, Wednesday 7 August 2019

Tamara Zacharias
Day 2: Free Expo Seminar Theatre
10:25

Everyone wants innovation, but no one wants change. Where does Digital Transformation fit?

Tegan Clarkson, Creative Director, Technology, GrowthOps
Matt Patterson
Day 2: Free Expo Seminar Theatre
11:10

Security Re-Defined - Using Cloud to Transform Security and Accelerate Digital Transformation

Netskope is building a secure on-ramp to the internet for enterprise users accessing SaaS, IaaS, privately hosted apps, and the web itself. The cloud is transforming your organization. It’s changing how you work as everything is becoming more intuitive, connected, open, and collaborative, and that change is rippling across SaaS, IaaS, and the web. This creates new challenges and risks that legacy security vendors can’t address.
Ken Soh
Day 2: Free Expo Seminar Theatre
12:25

Protecting CIIs via Detection-less Paradigm

  • Today’s cyber landscape is radically different from the past’s. Advanced threats are stealthy and lethal. They are difficult to detect. Unfortunately, cyber protection technologies continue to progress in a detection-oriented framework. It is therefore not uncommon for malicious codes to reside in a CIIs or enterprises and stay undetected for hundreds of days, exfiltrating data in complete silence.
  • Traditional methods are no longer working. Detect nothing does not mean it is safe. A detection-less strategy is imminently needed.
  • This sharing session focuses on addressing the common gaps in today’s cyber protection strategies collectively, and offers the thought leadership to fill these gaps from a highly operational, practitioner’s perspective.
Rajan Barara
Day 2: Free Expo Seminar Theatre
12:45

Game Changing Fraud Aware Security for your business

Thanks to the cloud adoption and mobile devices, organizations worldwide have an ever-expanding online footprint. Employees work online, customers and suppliers do business with organizations online. Business reputation can be made or broken online. Today’s cyberattacks are increasingly sophisticated and complex, driven by elaborate and resilient professional organizations that innovate faster than their targets. Hackers are not only after customers’ credit card details – they’re interested in any information that can be monetized in any way. The hacker’s motivation may be to get money, cause brand damage or just having fun at someone’s expense. A cyberattack can have a domino effect on business culminating in loss of revenue and goodwill, regulatory scrutiny and fines, and even share price plunges.

A key consideration for an organization assessing its cyber security is whether its measures are capable of preventing, detecting and adequately responding to attacks, rather than just complying with industry best practices. Compliance does not guarantee protection, and organizations with a mature approach to cyber security must go further.

Operating in a digital world depends on capability to maintain a secure and trusted environment. Fraud aware security must be the foundation on which digital business should be built. Gone are the days when we could build a walled garden perimeter, and feel secure. Today, businesses partner with others, outsource, have alliances, let customers access our systems and as we extend our reach – the perimeter of walled gardens is gone. All security strategies must align with the changes in the way organizations conduct business and the surrounding environments. We must ensure that our security programs are fraud aware, leverage intelligent identity based solutions, user behavior analytics, monitor and understand what is happening in and to our environment. We must work with the assumption we are being attacked and be prepared to offset those attacks with fraud aware security. The business should understand that their behavior impacts the security of our environment. The business must be invested in security.

During this session, we will take you through the dangers that impact your business and how game changing fraud aware security can help your business grow!
Kevin O'Leary
Day 2: Free Expo Seminar Theatre
13:05

Mythbusting Zero Trust

Trust is a dangerous vulnerability that is exploited by malicious actors. The point of Zero Trust is not to make networks, clouds or endpoints more trusted; it’s to eliminate the concept of trust from digital systems altogether.

This session will Illustrate what Zero Trust is, and what Zero Trust is not, and how creating this network is actually much simpler than building a legacy 20th-century hierarchical one. A straightforward five-step methodology will also be shared in this session, that will enable you to simplify your deployment of a Zero Trust network, making it manageable, cost-effective and non-disruptive.
Nick Main
Day 2: Free Expo Seminar Theatre
13:25

Working smarter, faster, and more secure: Agency, government and industry PROTECTED collaboration as a service

In a digital age new technologies and cloud applications have created ways of working smarter and faster than before. However, for sensitive and valuable information, these technologies have remained largely out of reach – until now. Join this presentation for a look into the new SaaS product facilitating PROTECTED collaboration between governments, agencies, and industry.
Nick Main, CTO, archTIS
Peter Stewart
Day 2: Free Expo Seminar Theatre
13:45

Attack chain of an active adversary

Robinson Roe
Day 2: Free Expo Seminar Theatre
14:10

Why privacy regulation is great for the public & private sectors

  • Trust is fundamental for people to provide their personal data
  • Personal data fuels artificial intelligence, machine learning and analytics
  • With institutional trust at all-time lows, a privacy culture is now critical
last published: 05/Aug/19 23:25