Roundtables are small group discussions focused on a particular topic and directed by a central table host who will guide the conversation and facilitate the questions and answers from the participants. This is not death by power-point –the emphasis is on the discussion and debate among the 20 or so delegates sharing the table at any given time. Swap war stories, ask questions, gain a better understanding and then put it all into practice back in your department or agency.
The roundtable discussions will run on day two, running as 30 minute topic centric discussions, with three rotations, delegates will have the opportunity to pre-select which tables they would like to attend ahead of the event. With three time slots available, there is something for everyone on offer, allowing you to build your own agenda and tailor the content to suit your enterprise and your job function.
Our delegates enjoy this interactivity and opportunities to share knowledge and a chance to hear what other departments and agencies are up to, which will benefit their organisation. The high-level interactive roundtable format is where delegates can tailor their content in line with their current investment priorities. The roundtable discussion is a platform to confirm and contrast ideas with subject matter experts, understand available solutions, share challenges with peers and make new professional contacts.
How to deliver a government online project on-time and under budget
Bruce Young, CEO, Speedwell
Johanes Iskandar, Senior Account Executive, Sitecore
In 2017 the Department of Health (DoH) successfully launched HeadtoHealth.gov.au with the objective to connect Australians with high quality mental health advice and resources via an online service. The project involved a complex co-design process that brought together over 40 community members with lived experience of mental illness, 30 service providers at both executive and operational levels, mental health professionals, government staff, and five vendors covering project management, design and development, co-design facilitation and user research.A Minimum Viable Product (MVP) was delivered in 3 months, on-time and under budget.
In this roundtable, you will get to:
Protecting digital environments and implementing high-velocity security best practices
Alex Margarit, ITOM Enterprise Sales Specialist, ServiceNow
Gen Fields, Advisory Solution Consultant, ServiceNow
For all the benefits that hybrid cloud environment and digital/ agile process deliver, there is still a lot of uncertainty around the level of security provided by cloud vendors. Join us to discuss how to gain better visibility and control of highly dynamic digital hybrid environments against a backdrop of increased threats on data, applications and access. This discussion will clear up the confusion and assist government departments and agencies with running secure, compliant, and operationally efficient cloud-based services.
Releasing the value of government data to deliver better citizen outcomes
Peter Hong, GM, Public Sector, A/NZ, Teradata
In the past Government policy makers have traditionally reached across to technology to solve its data problems. Whether delivered by SDLC or agile techniques, technology alone has failed to deliver the promised benefits of big data and advanced analytics because:
This Roundtable will discuss with the aid of Use Cases based on successful implementation of big data and analytics capabilities across government, how agencies can draw a line of sight from their data analytics technology implementation to the outcomes they seek to deliver citizens, focusing on:
The Future of Work - Intelligent Automation
Karen Astley, Vice President - Asia Pacific, Appian
How to do you transfer your organisation to Digital? An interactive session to discuss how you can optimise and automate your business processes that unify your data across all applications using AI and Robotic Process Automation
We will outline how to bring these capabilities in one single solution. Building Apps Faster. Run Smarter
Gain Social Confidence: Managing Digital Risk & Ensuring Compliance Without Fear
Otavio Freire, President/CTO, SafeGuard Cyber
Digital channels and tools present private and public sector organizations with an array of new opportunities. With those opportunities also come new risks, all of which lay far outside a firewall. However, security shouldn’t be an afterthought, it should be a catalyst that drives business forwards. When an enterprise is secure, it will be freer to adopt new technologies that improve efficiency, enhance collaboration, and generate higher returns. Learn how to take position your digital defense to a more proactive stance. Find out how to determine exactly what your digital risks are, where they are, how to defend against them quickly, and how to automate information governance.
Cyber security success: Why organisational culture and people are the keys to cyber security
Brian Hay, Executive Director, Cultural Cyber Security Pty Ltd
"Understanding the 'Lifecycle of Cybercrime' and that security is a business and people risk, not a technology conversation. This is crucial in preparing for the continuously developing threat landscape." - Brian Hay
Join us for this interactive Roundtable discussion where we will give you more insight into understanding why your biggest security risk is not your hardware or software … technology is not the problem nor the sole solution to cybercrime. By transforming your organizational culture to a high-performance security-oriented culture, you increase your staff productivity, performance and moral.
The guidelines to the topics we will discuss are:
Preventing data breaches throughout the IT lifecycle
Eric Keser, Chief Executive Officer, Certitude
Government departments continuously procure, use and decommission IT equipment containing sensitive organisational or customer data. This often includes financial information, personal records, or a trove of other information which could cause a notifiable data breach. From the very start at the procurement to equipment decommissioning and disposal, IT equipment is often poorly managed in a way that safeguards against unauthorised information disclosure – especially in the disposal stage.
Join IT asset management specialists, TES, and information security specialists, Certitude, at a thought leadership round table to:
Building Cyber Defence capability within Government
Leon Fouche, Partner and National Cyber Security Lead, BDO
Robert Champion, Executive Director, Cyber Security Unit and QGCID, Queensland Government
The changing cyber threat landscape requires organisations to become more resilient and effective in their cyber defence capability. What are the challenges and lessons from building successful cyber defence capability to support resilience? Listen to the experiences of others and raise questions that you would like to have answered on building a cyber defence capability.
Topics we will cover include:
• Importance of Government and industry collaboration – what are the rules and responsibilities
• How to establish trust in sharing security incidents and intelligence information
• Testing your cyber defence capability and readiness to respond to incidents • Importance of reporting – who, when, how
• Federated vs centralised Cyber Defence capability – what are the pros and cons
• Getting the right funding/investment for your cyber defence capability?
• Build, buy or outsource your cyber defence capability – what are the pros and cons.
Staying Ahead of the Hackers
Brendan Leitch, APAC Marketing Manager, Ixia Solutions Group/Key Sight Technologies
It takes highly skilled, experienced professionals to investigate and remediate after security incidents. Last year, ESG surveyed 412 cybersecurity and IT professionals and asked them about the size and skill set of their organization’s cybersecurity team. Fifty-four percent of survey respondents said the skill level of their team is inappropriate for an organization of their size and 57% said the staff size is inappropriate. Given this situation, how can organizations develop the elite cyber warriors they need to protect their business and customers?
We’ve gone Digital but can’t find a record of it!
Demos Gougoulas, Director of Sales & Marketing, EzeScan
Information management and critical record-keeping is quickly transitioning to become a function of the business process as opposed to an obligation at the end of the information life cycle. This round table discussion will examine the relationship between the current trend in digital transformation and the obligatory governance and compliance requirements on best practice information and records management.
• Why are digital transformation initiatives not considering records capture?
• How do we simplify electronic records management and add value to the business processes?
• What is the difference between Centralised and Decentralised capture?
• How can we successfully capture records in real time?
• Whose responsibility is it anyway?
Cybersecurity – common problems and getting the fundamentals right.
Steve Challans, CISO, Prophecy International
Leigh Purdie - Senior Security Architect, Prophecy International
In the increasingly complex world of applications, systems, networks and different security zones, in most organisations the process of implementing a logging, SIEM or Threat Intelligence solution can present some challenges. For many its often a daunting task of not knowing what to do or how to do it.
Building a Next-Generation Data Lake
Yifeng Jiang; Solution Architect, Data Science, Pure Storage, Inc
Government departments are gathering more and more data from multiple different sources. With more data comes complexity, as we scale beyond traditional analytics solutions. Join Yifeng Jiang, Pure Storage’s Data Science Solution Architect, as he explores how to build a modern analytics data lake with the ability to support current and future initiatives. How do I start building a data lake and what does that data lake look like? What are the key criteria of a modern data lake and where does the Cloud fit?
• Open platforms ensuring what you build today can be used in machine learning and AI futures
• The big data journey: Steps, technologies and practices
• Data lake technology overview: Past, present and future
• Building the team around your lake; roles, responsibilities and skill sets.
Transform to cloud in a zero trust environment
Lee Dolsen, Technical Director, Asia Pacific, Zscaler
Cyber Exposure in the Australian Government – Protect Critical Infrastructure and Citizen Data
Nick Clark, Senior Security Engineer, Tenable
Government agencies and institutions are under mounting pressure to protect citizen data, critical infrastructure, and the delivery of public services. The proliferation of sophisticated attacks by organised crime and nation-states against commercial entities has raised awareness in the government sector and driven a heightened sense of urgency to prevent breaches. Establishing a more resilient cybersecurity defence is essential to maintaining our nation’s security and way of life.
According to the Center for Internet Security, state and local governments are still playing catch up in cybersecurity and fall well below minimum maturity level benchmark recommendations. Government organisations often lack the visibility and actionable intelligence to assess their current security posture, and the proper controls and protections to prevent and respond to breaches or hostile activity.
Join this roundtable session to discuss how we can empower governments to protect citizen data and critical infrastructure. This session is hosted by Tenable – the global standard for the entire US Department of Defense. Our vulnerability management and analytics tools enable agencies to gain full visibility and continuously monitor security and compliance posture; evaluate vulnerabilities across the ecosystem; measure and analyse effectiveness of security mechanisms; and understand, prioritise and mitigate risk.
Service transformation: Navigating Cloud transition for government corporate services
Ash Smith, Director, Cyber Security Practice Lead, SilverGroup
With the evolution of services such as Xero, Workday and PageUp, there is now increasing demands for corporate functions to move the traditional delivery of on-premise workflow to Cloud. Cloud transition of government corporate services can pose difficulties due to both the nature in unique operations and corresponding non-standard structures. In this roundtable we will discuss both drivers and impacts in transition of government corporate workflows to Cloud through Software as a Service (SaaS).
Using case studies, we will investigate how legal, commercial, technology, security and service delivery functions need to respond to this change. We will pose questions such as:
Data Protection is Dead, Long live Data Privacy
Steven Kletzmayr, Country Manager Australia & New Zealand, Infinidat
Over the past 12 months, with a record number data breaches reported in 2017, we are seeing three key data security industry trends:
Protecting data that an organisation holds requires a comprehensive approach rather than just perimeter defence. It should be secure by design, protect against the internal threat from employees unintentionally complicit to a data breach, even from perceived legitimate access, as well as aligned to data security priorities now, and indeed in the future.
Worryingly, even some of the most security-savvy organisations are focusing their encryption efforts in the wrong place. With the stronger regulatory requirements worldwide, the call for the protection of data requires a rethink of how to reduce the attack surface and the attack vectors where an unauthorised use can try to enter or extract data from an environment.
Adopting upstream data encryption to reduce the attack surface implies rethinking both architectural and operational aspects such as encryption key management and data classification across the data architecture tiers.
Encryption applied further up the application stack improves surface protection of information including data in-transit over the network, so it's data breach immunity is improved and the consequences of such events. The cost changes are significant and being being realised in various degrees.
Discussion points: How are you placed now and in the short term to avoid these cost implications and achieve improved protection & compliance? What is driving you forward? What is holding you back?
Faster, More Agile Digital Transformation - Modernising Legacy Systems
Guy Reeve, Senior Regional Manager, Public Sector, MarkLogic
Chris Day, Principal Sales Engineer, MarkLogic
However, as some recent high profile systems implementation failures attest, there are some significant complexities and constraints to be overcome in delivering new technology solutions in support of government program administration.
Data integration, data migration, security, privacy and information governance are some of the mission-critical constraints which arise in an environment where there have been substantial investments in legacy systems over many years. Adding to this, is the need for increasing sophistication and complexity as citizens' expectations rise and services need to be more 'joined up'.
This roundtable will examine some of the key technological challenges associated with modernising legacy ICT architectures and discuss international case studies and best practices used to overcome theses constraints, in order to make enterprise architectures more agile and future-proof.
Intelligent Data Management: A new paradigm
Liam Horner, Enterprise Account Manager, Veeam
There's a new expectation of today's data —that it moves to a state of intelligence, able to automatically anticipate need, meet demand, and move securely across multi-cloud infrastructures including within the hyper-scalers. Resulting in the insights you need to speed up the pace of innovation, delivering real outcomes.
In the context of GDPR, and closer to home, Notifiable Data Breach legislation, protected classification and Essential 8 guidelines, this is more critical than ever.
Know your data, manage your data, secure your data.
Leveraging Global Shared Intelligence to maximize revenue and minimize fraud
Ted Egan, VP Asia Pacific, ThreatMetrix
In this session, the moderator will discuss how the digital enterprises like VISA, Lloyd Banks etc, leveraging digital identity intelligence to detect high-risk transactions and dynamically score them, enabling digital businesses to safely grow online revenue and personalize the digital experience for trusted customers. Security and fraud prevention simply needs to be better, not harder for legitimate customers. That’s profitability and security without compromise.
Unlock the value of in-country managed lifecycle service, device as a service, and facial recognition systems.
Gabrielle Archer, National Manager – Managed Services
Jack Crawford-Corser, Business Development Manager, Harvey Norman Business & Enterprise
Drawing on the experience of providing specialised in-country asset services including secure warehousing, local hardware build, integrated services and in-house project management; join ACER to discuss why in-country outsourced lifecycle asset services are changing the landscape of technology in government.
Engage in discussions about device as a service and how these fully-managed monthly subscription models encompass lifecycle services and the latest hardware operate in the market.
What value can device as a service and facial recognition provide government departments?
In this roundtable, you will get to: