ROUNDTABLES

 

 What are they?

Roundtables are small group discussions focused on a particular topic and directed by a central table host who will guide the conversation and facilitate the questions and answers from the participants. This is not death by power-point –the emphasis is on the discussion and debate among the 20 or so delegates sharing the table at any given time. Swap war stories, ask questions, gain a better understanding and then put it all into practice back in your department or agency.
 

 How will they work?

The roundtable discussions will run on day two, running as 30 minute topic centric discussions, with three rotations, delegates will have the opportunity to pre-select which tables they would like to attend ahead of the event. With three time slots available, there is something for everyone on offer, allowing you to build your own agenda and tailor the content to suit your enterprise and your job function.

Our delegates enjoy this interactivity and opportunities to share knowledge and a chance to hear what other departments and agencies are up to, which will benefit their organisation. The high-level interactive roundtable format is where delegates can tailor their content in line with their current investment priorities. The roundtable discussion is a platform to confirm and contrast ideas with subject matter experts, understand available solutions, share challenges with peers and make new professional contacts.
 

ROUNDTABLE DISCUSSION RULES
 

 

How to deliver a government online project on-time and under budget

Bruce Young, CEO, Speedwell

Johanes Iskandar, Senior Account Executive, Sitecore

 

In 2017 the Department of Health (DoH) successfully launched HeadtoHealth.gov.au with the objective to connect Australians with high quality mental health advice and resources via an online service. The project involved a complex co-design process that brought together over 40 community members with lived experience of mental illness, 30 service providers at both executive and operational levels, mental health professionals, government staff, and five vendors covering project management, design and development, co-design facilitation and user research.A Minimum Viable Product (MVP) was delivered in 3 months, on-time and under budget. 

In this roundtable, you will get to:

  • Learn about the key success factors of the DoH project
  • Openly discuss challenges and concerns in agile development of an online service
  • Swap strategies and ideas on delivering a MVP on-time and under budget
 

Protecting digital environments and implementing high-velocity security best practices

Alex Margarit, ITOM Enterprise Sales Specialist, ServiceNow

Gen Fields, Advisory Solution Consultant, ServiceNow

 

For all the benefits that hybrid cloud environment and digital/ agile process deliver, there is still a lot of uncertainty around the level of security provided by cloud vendors. Join us to discuss how to gain better visibility and control of highly dynamic digital hybrid environments against a backdrop of increased threats on data, applications and access. This discussion will clear up the confusion and assist government departments and agencies with running secure, compliant, and operationally efficient cloud-based services.

 

Releasing the value of government data to deliver better citizen outcomes

Peter Hong, GM, Public Sector, A/NZ, Teradata

 

In the past Government policy makers have traditionally reached across to technology to solve its data problems. Whether delivered by SDLC or agile techniques, technology alone has failed to deliver the promised benefits of big data and advanced analytics because:

  • Data has been locked up in silos – whether bound by applications, storage systems, legislative boundaries or prohibitive agency and portfolio firewalls
  • Too much focus has been on delivering digital government services without a focus on end-to-end integration
  • Binary approaches have been taken to data warehousing and data lakes made more complicated by the need to migrate from complex, costly and inflexible platforms
  • The skills required for acquiring, managing and monitoring agile analytics services are just not there, and
  • Inadequate or inexistent operating models, supporting architectures and enterprise implementation models.

This Roundtable will discuss with the aid of Use Cases based on successful implementation of big data and analytics capabilities across government, how agencies can draw a line of sight from their data analytics technology implementation to the outcomes they seek to deliver citizens, focusing on:

  • Improved digital services delivery
  • Better return on investment from legacy, current and planned data analytics investments
  • Enhanced citizen journey experiences across government agencies using connected data, and
  • Protection of privacy and security
  • A government analytics reference architecture and operating model that shows how each of the capability dimensions required (governance, people, processes, data, technology, agility and culture) can be orchestrated and optimised while using an agile and incremental delivery methodology providing early and continuous benefits realisation.
 

The Future of Work - Intelligent Automation

Karen Astley, Vice President - Asia Pacific, Appian

 

How to do you transfer your organisation to Digital? An interactive session to discuss how you can optimise and automate your business processes that unify your data across all applications using AI and Robotic Process Automation

We will outline how to bring these capabilities in one single solution. Building Apps Faster. Run Smarter

 

Gain Social Confidence: Managing Digital Risk & Ensuring Compliance Without Fear

Otavio Freire, President/CTO, Social Safe Guard

 

Digital channels and tools present private and public sector organizations with an array of new opportunities. With those opportunities also come new risks, all of which lay far outside a firewall. However, security shouldn’t be an afterthought, it should be a catalyst that drives business forwards. When an enterprise is secure, it will be freer to adopt new technologies that improve efficiency, enhance collaboration, and generate higher returns. Learn how to take position your digital defense to a more proactive stance. Find out how to determine exactly what your digital risks are, where they are, how to defend against them quickly, and how to automate information governance.

 

Cyber security success: Why organisational culture and people are the keys to cyber security

James Carlopio, BA MA PhD, Executive Director, Cultural Cyber Security Pty Ltd

Join us for this interactive Roundtable discussion where we will give you more insight into understanding why your biggest security risk is not your hardware or software … technology is not the problem nor the sole solution to cybercrime. By transforming your organizational culture to a high-performance security-oriented culture, you increase your staff productivity, performance and moral.

The guidelines to the topics we will discuss are:

  1. What cyber culture is, discuss the importance of cyber security and the latest statistics on cyber security trends
  2. what the levels of cyber culture are, and assess your current cultural cyber security maturity level
  3. why cyber culture is important
  4. how to influence cyber culture via analysis of your key stakeholder groups and customise your communication and change plans to suit
  5. Discuss the impact of Email on the organization and why 91% of cyber attacks start with an email
 

TES – Preventing Data Breaches through end-of-life IT equipment disposal

Eric Keser, Chief Executive Officer, Certitude

 

Government departments continuously retire end-of-life IT equipment containing sensitive organisational or customer data. This often includes financial information, personal records, or a trove of other information which could cause a notifiable data breach. An often overlooked and surprisingly complex area of data security, IT equipment is often discarded through the most cost effective channels with little regard for the disposal method and partner’s credentials.

Join TES at a thought leadership round table to:

• Identify areas where your organisation is most at risk of data breach through disposal of IT equipment
• Learn how to minimise the risk of data exposure
• Develop a best-practice framework for IT equipment disposal within your organisation

 

Building Cyber Defence capability within Government

Leon Fouche, Partner and National Cyber Security Lead, BDO
Robert Champion, Executive Director, Cyber Security Unit and QGCID, Queensland Government


The changing cyber threat landscape requires organisations to become more resilient and effective in their cyber defence capability. What are the challenges and lessons from building successful cyber defence capability to support resilience? Listen to the experiences of others and raise questions that you would like to have answered on building a cyber defence capability.

Topics we will cover include:

• Importance of Government and industry collaboration – what are the rules and responsibilities
• How to establish trust in sharing security incidents and intelligence information
• Testing your cyber defence capability and readiness to respond to incidents • Importance of reporting – who, when, how
• Federated vs centralised Cyber Defence capability – what are the pros and cons
• Getting the right funding/investment for your cyber defence capability?
• Build, buy or outsource your cyber defence capability – what are the pros and cons.

 

Staying Ahead of the Hackers

Brendan Leitch, APAC Marketing Manager, Ixia Solutions Group/Key Sight Technologies


It takes highly skilled, experienced professionals to investigate and remediate after security incidents. Last year, ESG surveyed 412 cybersecurity and IT professionals and asked them about the size and skill set of their organization’s cybersecurity team. Fifty-four percent of survey respondents said the skill level of their team is inappropriate for an organization of their size and 57% said the staff size is inappropriate. Given this situation, how can organizations develop the elite cyber warriors they need to protect their business and customers?

 

We’ve gone Digital but can’t find a record of it!

Demos Gougoulas, Director of Sales & Marketing, EzeScan

 

Information management and critical record-keeping is quickly transitioning to become a function of the business process as opposed to an obligation at the end of the information life cycle. This round table discussion will examine the relationship between the current trend in digital transformation and the obligatory governance and compliance requirements on best practice information and records management.

• Why are digital transformation initiatives not considering records capture?
• How do we simplify electronic records management and add value to the business processes?
• What is the difference between Centralised and Decentralised capture?
• How can we successfully capture records in real time?
• Whose responsibility is it anyway?

 

Cybersecurity – common problems and getting the fundamentals right.

Steve Challans – CISO, Prophecy International Leigh Purdie - Snr Security Architect, Prophecy International

 

 

Building a Next-Generation Data Lake

Yifeng Jiang; Solution Architect, Data Science, Pure Storage, Inc


Government departments are gathering more and more data from multiple different sources. With more data comes complexity, as we scale beyond traditional analytics solutions. Join Yifeng Jiang, Pure Storage’s Data Science Solution Architect, as he explores how to build a modern analytics data lake with the ability to support current and future initiatives. How do I start building a data lake and what does that data lake look like? What are the key criteria of a modern data lake and where does the Cloud fit?

• Open platforms ensuring what you build today can be used in machine learning and AI futures
• The big data journey: Steps, technologies and practices
• Data lake technology overview: Past, present and future
• Building the team around your lake; roles, responsibilities and skill sets.

 

Transform to cloud in a zero trust environment

Lee Dolsen, Technical Director, Asia Pacific, Zscaler

  • As governments take their work out of the enterprise and into the cloud and the Internet itself, security and safety strategy and functions must move with it.
  • The Internet is the network.
  • Developing a whole-of-government capability to protect personal data, critical infrastructure, financial information and intellectual property.
 

Cyber Exposure in the Australian Government – Protect Critical Infrastructure and Citizen Data

Nick Clark, Senior Security Engineer, Tenable

Government agencies and institutions are under mounting pressure to protect citizen data, critical infrastructure, and the delivery of public services. The proliferation of sophisticated attacks by organised crime and nation-states against commercial entities has raised awareness in the government sector and driven a heightened sense of urgency to prevent breaches. Establishing a more resilient cybersecurity defence is essential to maintaining our nation’s security and way of life.

According to the Center for Internet Security, state and local governments are still playing catch up in cybersecurity and fall well below minimum maturity level benchmark recommendations. Government organisations often lack the visibility and actionable intelligence to assess their current security posture, and the proper controls and protections to prevent and respond to breaches or hostile activity.

Join this roundtable session to discuss how we can empower governments to protect citizen data and critical infrastructure. This session is hosted by Tenable – the global standard for the entire US Department of Defense. Our vulnerability management and analytics tools enable agencies to gain full visibility and continuously monitor security and compliance posture; evaluate vulnerabilities across the ecosystem; measure and analyse effectiveness of security mechanisms; and understand, prioritise and mitigate risk.

 

JOIN THE CONVERSATION

 

Cyber Security in Government

DOWNLOAD VISITOR TICKET



DOWNLOAD THE BROCHURE


Cyber Security in Government
Cyber Security in Government
Cyber Security in Government
 

JOIN THE MAILING LIST

Sign Up for Event Updates

 

TechInGov