ROUNDTABLES

 

 What are they?

Roundtables are small group discussions focused on a particular topic and directed by a central table host who will guide the conversation and facilitate the questions and answers from the participants. This is not death by power-point –the emphasis is on the discussion and debate among the 20 or so delegates sharing the table at any given time. Swap war stories, ask questions, gain a better understanding and then put it all into practice back in your department or agency.
 

 How will they work?

The roundtable discussions will run on day two, running as 30 minute topic centric discussions, with three rotations, delegates will have the opportunity to pre-select which tables they would like to attend ahead of the event. With three time slots available, there is something for everyone on offer, allowing you to build your own agenda and tailor the content to suit your enterprise and your job function.

Our delegates enjoy this interactivity and opportunities to share knowledge and a chance to hear what other departments and agencies are up to, which will benefit their organisation. The high-level interactive roundtable format is where delegates can tailor their content in line with their current investment priorities. The roundtable discussion is a platform to confirm and contrast ideas with subject matter experts, understand available solutions, share challenges with peers and make new professional contacts.
 

ROUNDTABLE DISCUSSION RULES
 

 

How to deliver a government online project on-time and under budget

Bruce Young, CEO, Speedwell

Johanes Iskandar, Senior Account Executive, Sitecore

 

In 2017 the Department of Health (DoH) successfully launched HeadtoHealth.gov.au with the objective to connect Australians with high quality mental health advice and resources via an online service. The project involved a complex co-design process that brought together over 40 community members with lived experience of mental illness, 30 service providers at both executive and operational levels, mental health professionals, government staff, and five vendors covering project management, design and development, co-design facilitation and user research.A Minimum Viable Product (MVP) was delivered in 3 months, on-time and under budget. 

In this roundtable, you will get to:

  • Learn about the key success factors of the DoH project
  • Openly discuss challenges and concerns in agile development of an online service
  • Swap strategies and ideas on delivering a MVP on-time and under budget
 

Protecting digital environments and implementing high-velocity security best practices

Alex Margarit, ITOM Enterprise Sales Specialist, ServiceNow

Gen Fields, Advisory Solution Consultant, ServiceNow

 

For all the benefits that hybrid cloud environment and digital/ agile process deliver, there is still a lot of uncertainty around the level of security provided by cloud vendors. Join us to discuss how to gain better visibility and control of highly dynamic digital hybrid environments against a backdrop of increased threats on data, applications and access. This discussion will clear up the confusion and assist government departments and agencies with running secure, compliant, and operationally efficient cloud-based services.

 

Releasing the value of government data to deliver better citizen outcomes

Peter Hong, GM, Public Sector, A/NZ, Teradata

 

In the past Government policy makers have traditionally reached across to technology to solve its data problems. Whether delivered by SDLC or agile techniques, technology alone has failed to deliver the promised benefits of big data and advanced analytics because:

  • Data has been locked up in silos – whether bound by applications, storage systems, legislative boundaries or prohibitive agency and portfolio firewalls
  • Too much focus has been on delivering digital government services without a focus on end-to-end integration
  • Binary approaches have been taken to data warehousing and data lakes made more complicated by the need to migrate from complex, costly and inflexible platforms
  • The skills required for acquiring, managing and monitoring agile analytics services are just not there, and
  • Inadequate or inexistent operating models, supporting architectures and enterprise implementation models.

This Roundtable will discuss with the aid of Use Cases based on successful implementation of big data and analytics capabilities across government, how agencies can draw a line of sight from their data analytics technology implementation to the outcomes they seek to deliver citizens, focusing on:

  • Improved digital services delivery
  • Better return on investment from legacy, current and planned data analytics investments
  • Enhanced citizen journey experiences across government agencies using connected data, and
  • Protection of privacy and security
  • A government analytics reference architecture and operating model that shows how each of the capability dimensions required (governance, people, processes, data, technology, agility and culture) can be orchestrated and optimised while using an agile and incremental delivery methodology providing early and continuous benefits realisation.
 

The Future of Work - Intelligent Automation

Karen Astley, Vice President - Asia Pacific, Appian

 

How to do you transfer your organisation to Digital? An interactive session to discuss how you can optimise and automate your business processes that unify your data across all applications using AI and Robotic Process Automation

We will outline how to bring these capabilities in one single solution. Building Apps Faster. Run Smarter

 

Gain Social Confidence: Managing Digital Risk & Ensuring Compliance Without Fear

Otavio Freire, President/CTO, SafeGuard Cyber

 

Digital channels and tools present private and public sector organizations with an array of new opportunities. With those opportunities also come new risks, all of which lay far outside a firewall. However, security shouldn’t be an afterthought, it should be a catalyst that drives business forwards. When an enterprise is secure, it will be freer to adopt new technologies that improve efficiency, enhance collaboration, and generate higher returns. Learn how to take position your digital defense to a more proactive stance. Find out how to determine exactly what your digital risks are, where they are, how to defend against them quickly, and how to automate information governance.

 

Cyber security success: Why organisational culture and people are the keys to cyber security

Brian Hay, Executive Director, Cultural Cyber Security Pty Ltd

"Understanding the 'Lifecycle of Cybercrime' and that security is a business and people risk, not a technology conversation. This is crucial in preparing for the continuously developing threat landscape." - Brian Hay

Join us for this interactive Roundtable discussion where we will give you more insight into understanding why your biggest security risk is not your hardware or software … technology is not the problem nor the sole solution to cybercrime. By transforming your organizational culture to a high-performance security-oriented culture, you increase your staff productivity, performance and moral.

The guidelines to the topics we will discuss are:

  1. What cyber culture is, discuss the importance of cyber security and the latest statistics on cyber security trends
  2. what the levels of cyber culture are, and assess your current cultural cyber security maturity level
  3. why cyber culture is important
  4. how to influence cyber culture via analysis of your key stakeholder groups and customise your communication and change plans to suit
  5. Discuss the impact of Email on the organization and why 91% of cyber attacks start with an email
 

Preventing data breaches throughout the IT lifecycle

Eric Keser, Chief Executive Officer, Certitude

 

Government departments continuously procure, use and decommission IT equipment containing sensitive organisational or customer data. This often includes financial information, personal records, or a trove of other information which could cause a notifiable data breach. From the very start at the procurement to equipment decommissioning and disposal, IT equipment is often poorly managed in a way that safeguards against unauthorised information disclosure – especially in the disposal stage.

Join IT asset management specialists, TES, and information security specialists, Certitude, at a thought leadership round table to:
 

  • Identify areas where your organisation is most at risk of data breach throughout the IT equipment life-cycle from procurement to decommissioning and disposal
  • Learn how to minimise the risk of unauthorised data disclosure
  • Develop a best-practice framework for IT equipment life-cycle and security within your organisation
 

Building Cyber Defence capability within Government

Leon Fouche, Partner and National Cyber Security Lead, BDO
Robert Champion, Executive Director, Cyber Security Unit and QGCID, Queensland Government


The changing cyber threat landscape requires organisations to become more resilient and effective in their cyber defence capability. What are the challenges and lessons from building successful cyber defence capability to support resilience? Listen to the experiences of others and raise questions that you would like to have answered on building a cyber defence capability.

Topics we will cover include:

• Importance of Government and industry collaboration – what are the rules and responsibilities
• How to establish trust in sharing security incidents and intelligence information
• Testing your cyber defence capability and readiness to respond to incidents • Importance of reporting – who, when, how
• Federated vs centralised Cyber Defence capability – what are the pros and cons
• Getting the right funding/investment for your cyber defence capability?
• Build, buy or outsource your cyber defence capability – what are the pros and cons.

 

Staying Ahead of the Hackers

Brendan Leitch, APAC Marketing Manager, Ixia Solutions Group/Key Sight Technologies


It takes highly skilled, experienced professionals to investigate and remediate after security incidents. Last year, ESG surveyed 412 cybersecurity and IT professionals and asked them about the size and skill set of their organization’s cybersecurity team. Fifty-four percent of survey respondents said the skill level of their team is inappropriate for an organization of their size and 57% said the staff size is inappropriate. Given this situation, how can organizations develop the elite cyber warriors they need to protect their business and customers?

 

We’ve gone Digital but can’t find a record of it!

Demos Gougoulas, Director of Sales & Marketing, EzeScan

 

Information management and critical record-keeping is quickly transitioning to become a function of the business process as opposed to an obligation at the end of the information life cycle. This round table discussion will examine the relationship between the current trend in digital transformation and the obligatory governance and compliance requirements on best practice information and records management.

• Why are digital transformation initiatives not considering records capture?
• How do we simplify electronic records management and add value to the business processes?
• What is the difference between Centralised and Decentralised capture?
• How can we successfully capture records in real time?
• Whose responsibility is it anyway?

 

Cybersecurity – common problems and getting the fundamentals right.

Steve Challans, CISO, Prophecy International
Leigh Purdie - Senior Security Architect, Prophecy International

 

In the increasingly complex world of applications, systems, networks and different security zones, in most organisations the process of implementing a logging, SIEM or Threat Intelligence solution can present some challenges. For many its often a daunting task of not knowing what to do or how to do it.

 

Building a Next-Generation Data Lake

Yifeng Jiang; Solution Architect, Data Science, Pure Storage, Inc


Government departments are gathering more and more data from multiple different sources. With more data comes complexity, as we scale beyond traditional analytics solutions. Join Yifeng Jiang, Pure Storage’s Data Science Solution Architect, as he explores how to build a modern analytics data lake with the ability to support current and future initiatives. How do I start building a data lake and what does that data lake look like? What are the key criteria of a modern data lake and where does the Cloud fit?

• Open platforms ensuring what you build today can be used in machine learning and AI futures
• The big data journey: Steps, technologies and practices
• Data lake technology overview: Past, present and future
• Building the team around your lake; roles, responsibilities and skill sets.

 

Transform to cloud in a zero trust environment

Lee Dolsen, Technical Director, Asia Pacific, Zscaler

  • As governments take their work out of the enterprise and into the cloud and the Internet itself, security and safety strategy and functions must move with it.
  • The Internet is the network.
  • Developing a whole-of-government capability to protect personal data, critical infrastructure, financial information and intellectual property.
 

Cyber Exposure in the Australian Government – Protect Critical Infrastructure and Citizen Data

Nick Clark, Senior Security Engineer, Tenable

Government agencies and institutions are under mounting pressure to protect citizen data, critical infrastructure, and the delivery of public services. The proliferation of sophisticated attacks by organised crime and nation-states against commercial entities has raised awareness in the government sector and driven a heightened sense of urgency to prevent breaches. Establishing a more resilient cybersecurity defence is essential to maintaining our nation’s security and way of life.

According to the Center for Internet Security, state and local governments are still playing catch up in cybersecurity and fall well below minimum maturity level benchmark recommendations. Government organisations often lack the visibility and actionable intelligence to assess their current security posture, and the proper controls and protections to prevent and respond to breaches or hostile activity.

Join this roundtable session to discuss how we can empower governments to protect citizen data and critical infrastructure. This session is hosted by Tenable – the global standard for the entire US Department of Defense. Our vulnerability management and analytics tools enable agencies to gain full visibility and continuously monitor security and compliance posture; evaluate vulnerabilities across the ecosystem; measure and analyse effectiveness of security mechanisms; and understand, prioritise and mitigate risk.

 

Service transformation: Navigating Cloud transition for government corporate services

Ash Smith, Director, Cyber Security Practice Lead, SilverGroup

With the evolution of services such as Xero, Workday and PageUp, there is now increasing demands for corporate functions to move the traditional delivery of on-premise workflow to Cloud. Cloud transition of government corporate services can pose difficulties due to both the nature in unique operations and corresponding non-standard structures. In this roundtable we will discuss both drivers and impacts in transition of government corporate workflows to Cloud through Software as a Service (SaaS).

Using case studies, we will investigate how legal, commercial, technology, security and service delivery functions need to respond to this change. We will pose questions such as:

  • Can unique government functions interface a standardized ‘one to many’ full service SaaS offering?
  • How might CIOs better support business efforts in moving corporate functions to the Cloud?
  • How much should the business groups understand both their own operations and that of Cloud operations?
  • Is legal counsel ready for this shift?
  • Does moving to SaaS impact the delivery of core ICT; are CIOs losing power and influence?
  • SaaS vendor lock in; can you move when highly aligned to a service offering?
  • Boots and all; what to do when it all goes wrong?
 

Data Protection is Dead, Long live Data Privacy

Steven Kletzmayr, Country Manager Australia & New Zealand, Infinidat

Over the past 12 months, with a record number data breaches reported in 2017, we are seeing three key data security industry trends:

  1. Stronger regulatory requirements from authorities globally.
  2. Increasing sophistication levels of malicious hackers either external or internal.
  3. Significant Cost changes associated with the need to reduce the attack surface & attack vector protection.

Protecting data that an organisation holds requires a comprehensive approach rather than just perimeter defence. It should be secure by design, protect against the internal threat from employees unintentionally complicit to a data breach, even from perceived legitimate access, as well as aligned to data security priorities now, and indeed in the future.

Worryingly, even some of the most security-savvy organisations are focusing their encryption efforts in the wrong place. With the stronger regulatory requirements worldwide, the call for the protection of data requires a rethink of how to reduce the attack surface and the attack vectors where an unauthorised use can try to enter or extract data from an environment.

Adopting upstream data encryption to reduce the attack surface implies rethinking both architectural and operational aspects such as encryption key management and data classification across the data architecture tiers.

Encryption applied further up the application stack improves surface protection of information including data in-transit over the network, so it's data breach immunity is improved and the consequences of such events. The cost changes are significant and being being realised in various degrees.

 

Discussion points: How are you placed now and in the short term to avoid these cost implications and achieve improved protection & compliance? What is driving you forward? What is holding you back?

 

Faster, More Agile Digital Transformation - Modernising Legacy Systems

Guy Reeve, Senior Regional Manager, Public Sector, MarkLogic
Chris Day, Principal Sales Engineer, MarkLogic

However, as some recent high profile systems implementation failures attest, there are some significant complexities and constraints to be overcome in delivering new technology solutions in support of government program administration.

Data integration, data migration, security, privacy and information governance are some of the mission-critical constraints which arise in an environment where there have been substantial investments in legacy systems over many years. Adding to this, is the need for increasing sophistication and complexity as citizens' expectations rise and services need to be more 'joined up'.

This roundtable will examine some of the key technological challenges associated with modernising legacy ICT architectures and discuss international case studies and best practices used to overcome theses constraints, in order to make enterprise architectures more agile and future-proof.

 

Intelligent Data Management: A new paradigm

Liam Horner, Enterprise Account Manager, Veeam

There's a new expectation of today's data —that it moves to a state of intelligence, able to automatically anticipate need, meet demand, and move securely across multi-cloud infrastructures including within the hyper-scalers. Resulting in the insights you need to speed up the pace of innovation, delivering real outcomes.

In the context of GDPR, and closer to home, Notifiable Data Breach legislation, protected classification and Essential 8 guidelines, this is more critical than ever.

Know your data, manage your data, secure your data.

 

Leveraging Global Shared Intelligence to maximize revenue and minimize fraud

Ted Egan, VP Asia Pacific, ThreatMetrix

In this session, the moderator will discuss how the digital enterprises like VISA, Lloyd Banks etc, leveraging digital identity intelligence to detect high-risk transactions and dynamically score them, enabling digital businesses to safely grow online revenue and personalize the digital experience for trusted customers. Security and fraud prevention simply needs to be better, not harder for legitimate customers. That’s profitability and security without compromise.

 

Unlock the value of in-country managed lifecycle service, device as a service, and facial recognition systems.

Gabrielle Archer, National Manager – Managed Services

Jack Crawford-Corser, Business Development Manager, Harvey Norman Business & Enterprise

Drawing on the experience of providing specialised in-country asset services including secure warehousing, local hardware build, integrated services and in-house project management; join ACER to discuss why in-country outsourced lifecycle asset services are changing the landscape of technology in government.

Engage in discussions about device as a service and how these fully-managed monthly subscription models encompass lifecycle services and the latest hardware operate in the market.

What value can device as a service and facial recognition provide government departments?

In this roundtable, you will get to:

  • Understand the benefits of In country outsourcing lifecycle asset services
  • How to turn these services into an Device as a Service arrangement
  • Facial recognition applications

 

 

JOIN THE CONVERSATION

 

Cyber Security in Government

DOWNLOAD VISITOR TICKET



DOWNLOAD THE BROCHURE


Cyber Security in Government
Cyber Security in Government
 

JOIN THE MAILING LIST

Sign Up for Event Updates

 

TechInGov