2019 Agenda

 

 

Day 1: Cyber Security in Government, Tuesday 6 August 2019

09:00

Opening Remarks

Major General Marcus Thompson
09:10

Department of Defence: Cyber operations

  • The Australian Defence Force’s approach to cyberspace operations
  • Capabilities development
  • How other government departments can assist
Stefan Hajkowicz
09:30

The development of Australia's A.I. ethics framework

  • A.I. roadmap for the Australian government Department of Industry, Innovation and Science
  • How can government adapt to a rapidly changing world
Robinson Roe
09:50

Why privacy regulation is great for the public and private sectors

  • Trust is fundamental for people to provide their personal data
  • Personal data fuels artificial intelligence, machine learning and analytics
  • With institutional trust at all-time lows, a privacy culture is now critical
Day 1: Cyber Security in Government
11:00

Chairperson's Opening Remarks

Gus Mclachlan
Day 1: Cyber Security in Government
11:05

Army cyber capability

  • Cyber, electronic warfare and intelligence capability
  • Robotics and data analytics within the Australian army
  • Anticipating disruption by emerging technologies and organisations
Panel discussion
Day 1: Cyber Security in Government
11:45

The global cyber landscape: Past, present and future

  • The evolving world of cyber security - where we were, where we are and where we are headed
  • How does Australia’s cyber landscape compare to rest of world?
  • Upcoming trends
Aidan Tudehope, Managing Director, Macquarie Government
Fergus Hanson
Day 1: Cyber Security in Government
12:05

The growth of the Australian cyber security ecosystem

  • How does the Australian cyber security ecosystem compare to the rest of the world?
  • Our growth to date and the initiatives to continue
last published: 19/Jul/19 10:15

Day 1: Round Table Discussions, Tuesday 6 August 2019

Robinson Roe
Day 1: Round Table Discussions
14:00

Roundtable 01: Why privacy regulation is great for the public & private sectors

Andrew Ford
Day 1: Round Table Discussions
14:00

Roundtable 02: Workshop - Autonomous Machine Decision Tree Process

An interactive roundtable session that enables attendees to explore four key inputs into successful AI projects. 1. Data, 2. People, 3. Process, 4. Platforms. This session centers the participants thinking around prioritising the requirements for beginning an AI project. Where and what are my data inputs? What skills do I have and what do I need? and what processes need to change? Are just some of the themes we explore in this session. At the end of the session you’ll be equipped with a framework to re-use for your AI projects.
Marcus Vogt
Day 1: Round Table Discussions
14:00

Roundtable 03: Identity at Rest and Identity in Motion

  • Identity is at the heart of today's IT services. Be it ordering McDonalds, to paying your bills, identity is used to improve customer experience, security and enable integrations such as digital assistants, etc..
  • To realize the full power of identities, it is important to understand that identities can leverage paradigms from data science (e.g. identity at rest and identity in motion) to deliver more value.
  • How can organizations leverage both identity at rest (authorization & consent) and identity in motion (authentication) to improve both operational simplicity, security and customer experiences.
Neil Ferreira
Day 1: Round Table Discussions
14:00

Roundtable 04: Why Cyber - Security Now Affects Both Government & Private Enterprise (both Big and Small organisations)

Andrew Walker
Day 1: Round Table Discussions
14:00

Roundtable 05: Digital Transformation, Connectivity, Managed Services, Intelligent Systems

Andrew Walker, Government ICT Solutions, Communications Design & Management Pty Limited
Aaron Cockerill
Day 1: Round Table Discussions
14:00

Roundtable 06: Current threat landscape for mobile devices

Hassan Baickdeli
Day 1: Round Table Discussions
14:00

Roundtable 07: Digital Transformation, Security and Compliance and the application in Government

Remaining at the forefront of technology and innovation is crucial for many organisations and Government is no different, the requirement for this not only stems froma desire to enable digital transformation and all the benefits that come with it but to also ensure that imperative elements such as policy and cybersecurity from theend user compute piece right through to the data centre are up-to-date, enabled and compliant.Join Lenovo for an informative and engaging round table covering off identity, device, connectivity and data security from an EUC perspective.
Hassan Baickdeli, Head of Emerging Technology & Solutions, Lenovo
Eban Escott
Day 1: Round Table Discussions
14:00

Roundtable 08: Bots That Code: The Continuous Modernisation Playbook

Legacy systems are hurting business agility. Data is often trapped in offline systems meaning visibility across an organisation is limited. Using bots, Codebots can migrate these legacy systems to full stack applications with API documentation. Learn about how you can overcome the pitfalls of legacy and enter a mode of continuous modernisation.
Chip Redden
Day 1: Round Table Discussions
14:00

Roundtable 09: Building Intelligent Communities: Opportunities, Challenges & Case Studies

Bruce Young
Day 1: Round Table Discussions
14:00

Roundtable 10: How to deliver a government online project on-time and under budget

Manvinder Hara
Demos Gougoulas
Day 1: Round Table Discussions
14:00

Roundtable 12: Capture in the age of digital born

Paul Domoney
Day 1: Round Table Discussions
14:00

Roundtable 13: How can cyber consultancy be different? Create structural value for our Customer and not just be a black provider

  • Addressing the cybersecurity skills gap and selecting the right cybersecurity specialist to provide, trusted and structured knowledge transfer as part of your security project.
  • Upskilling your people in your organisation to build cyber-resilience as part of your security engagement.
Jason Duerden
Day 1: Round Table Discussions
14:00

Roundtable 14: AI Based Cybersecurity – How to Decouple Legacy from Innovation

  • What is AI in cyber security and what is not, cut through the noise
  • Simplify security operations with a prevention first approach, leveraging AI and machine learning
  • Support, extend and enhance security on legacy infrastructure in a highly cost effective way to enable innovation
Allan Foster
Day 1: Round Table Discussions
14:00

Roundtable 15: Managing Data and Trust - The Principles of “Good Identity”

Digital Services have changed how we interact with the world around us from government to local stores and social media. Core to the success of digital services is trust and with it a robust identity strategy. We will explore good identity principals to drive successful digital services with privacy, consent management and security.
Allan Foster, Founder, ForgeRock
Aaron Dinnage
Day 1: Round Table Discussions
14:00

Roundtable 16: The Modern Workplace

Aaron Dinnage, Modern Workplace Specialist, Microsoft
Jason Lee
Day 1: Round Table Discussions
14:00

Roundtable 17: End-to-end solutions to improve the efficiency, capability and flexibility of those working in the public sector.

Day 1: Round Table Discussions
14:00

Roundtable 18: Right Data Fuels AI/ML – How do we know what “Right Data is?”

Artificial Intelligence (AI) and Machine Learning (ML) no longer a buzz word, today it is available within your enterprise, join a conversation around what you need to think about to benefit from AI/ML in your pursuit of Data Analytics.
last published: 19/Jul/19 10:15

Day 1: Closing Plenary, Tuesday 6 August 2019

David Birch
Day 1: Closing Plenary
16:15

Digital Identity: Cyberwar and peace

  • A famous media theorist (“the medium is the message”) once said that WWIII would be an information war with no differentiation between military and civilian participants.
  • And as renowned, cyber security guru, Bruce Schneier, wrote “Book Press here to Kill Everybody,” cyber war is the new normal. So, what are we going to do?
  • Digital identity is a fundamental component of our defences against fake people, fake news and fake things. But what are you going to do to make it a reality?
Stephen Scheeler
Day 1: Closing Plenary
16:45

Inside Facebook: The secrets behind Facebook's meteoric rise and how you can apply them to your business

Facebook’s unprecedented rise to world dominance is well-known. Harvard dorm room. Geeky teen founder. Hackathons. Billions of friends, fans, shares and likes. Fake news. Filter bubbles.But the true story of Facebook’s journey is far more fascinating than any outsider’s book or Hollywood movie. Former Facebook CEO for Australia and New Zealand, Stephen Scheeler, knows this story because he was there. In this captivating keynote, Stephen shares his insider’s insights about what makes Facebook tick, how the company makes decisions, how it nurtures its famous “move fast and break things” culture, how it drives innovation and disruption, and what Mark Zuckerberg and other Facebook leaders really do to maintain Facebook’s explosive growth, even in the face of front-page controversy.
Gero Decker
Day 1: Closing Plenary
17:05

Congestion busting through digital process management

  • Discover how digital process management can supercharge congestion-busting
  • Understand how digital process management can assist service delivery within your agency
Day 1: Closing Plenary
17:25

Closing remarks

last published: 19/Jul/19 10:15

Day 2: Cyber Security in Government, Wednesday 7 August 2019

Day 2: Cyber Security in Government
09:00

Opening remarks

Tobias Feakin
Day 2: Cyber Security in Government
09:10

Australia's world leading cyber diplomacy - What we've achieved and what's next

  • The 2019 International Cyber Engagement Strategy Progress Report
  • Stepping up the Cyber Cooperation Program
  • Deterring malicious actors and reinforcing a peaceful and stable cyberspace
Panel discussion
Day 2: Cyber Security in Government
09:30

Panel: Protecting the journey to the cloud

  • Transformation of Australia’s government agencies and harnessing the opportunities of the cloud.
  • The distinct advantage of cloud adoption in driving citizen value, managing costs and avoiding risk when compared to those that don’t.
  • Discussing the key areas such as data governance, access, breaches and the know-how to reduce cloud risks and drive success.
David Cullen
Day 2: Cyber Security in Government
09:50

The importance of incident management as a focus of Victoria’s Cyber Security Strategy

  • Understanding the contemporary cyber risk environment
  • Knowing your capability requirements for effective incident management
  • Putting it all in practice - understanding what works
Ian Mckenzie
Day 2: Cyber Security in Government
11:00

Practical strategies to building cyber resiliency in your organisation

  • Building and communicating your cyber security strategy
  • Leveraging a threat intelligence focus approach to cyber security
  • Know your environment and your enemy and planning an effective defence
Panel discussion
Day 2: Cyber Security in Government
11:20

Gaining organsation support for the ASD Essential 8

  • Unpacking the ASD Essential 8 framework and its impact on state government systems
  • The building blocks to getting your cyber security model up to speed
  • Building next gen capabilities
Aaron Cockerill
Day 2: Cyber Security in Government
11:40

Current threat landscape for mobile devices

  • Current Threat Landscape
  • Full Spectrum of Risks - Device threats, app-based threats, and MiTM attacks
  • Security beyond the perimeter
  • Real use cases for Mobile Threat Detection
Panel discussion
Day 2: Cyber Security in Government
12:00

The future workplace design

  • The current cyber security working environment
  • Do we have a resourcing problem?
  • Correlation between diversity and national security
Abbas Kudrati
Day 2: Cyber Security in Government
14:00

Changing cybersecurity threats and trends in Australia and Asia

  • Unveiling the Security Intelligence Report (SIR) to improve cyber resilience in Asia-Pacific
  • Core insights and key trends of the SIR
  • Deriving Asia-pacific insights from analysing data from 15 markets
Tim Hamer
Day 2: Cyber Security in Government
14:20

The Sharing Economy: Getting your information where it needs to go

  • Countering cybersecurity threats through information sharing for organisations
  • Establishing your organisation’s capacity for Information sharing
  • Industry examples that have built sharing communities
Stephen Brady
Day 2: Cyber Security in Government
14:40

The Paris terrorist attacks: some reflections

  • The post-effects and the relationship between France and Australia
  • Global cyber trends and counter-terrorism intelligence
Nalin Asanka Gamagedara Arachchilage
Day 2: Cyber Security in Government
15:00

Cyber innovation isn’t all tech

  • Mental modelling and understanding human behaviour
  • Predicted threat models focussing on the science behind human behaviour
last published: 19/Jul/19 10:15

Day 1: Free Expo Seminar Theatre, Tuesday 6 August 2019

Rajan Barara
Day 1: Free Expo Seminar Theatre
10:25

Game Changing Fraud Aware Security for your business

Thanks to the cloud adoption and mobile devices, organizations worldwide have an ever-expanding online footprint. Employees work online, customers and suppliers do business with organizations online. Business reputation can be made or broken online. Today’s cyberattacks are increasingly sophisticated and complex, driven by elaborate and resilient professional organizations that innovate faster than their targets. Hackers are not only after customers’ credit card details – they’re interested in any information that can be monetized in any way. The hacker’s motivation may be to get money, cause brand damage or just having fun at someone’s expense. A cyberattack can have a domino effect on business culminating in loss of revenue and goodwill, regulatory scrutiny and fines, and even share price plunges.

A key consideration for an organization assessing its cyber security is whether its measures are capable of preventing, detecting and adequately responding to attacks, rather than just complying with industry best practices. Compliance does not guarantee protection, and organizations with a mature approach to cyber security must go further.

Operating in a digital world depends on capability to maintain a secure and trusted environment. Fraud aware security must be the foundation on which digital business should be built. Gone are the days when we could build a walled garden perimeter, and feel secure. Today, businesses partner with others, outsource, have alliances, let customers access our systems and as we extend our reach – the perimeter of walled gardens is gone. All security strategies must align with the changes in the way organizations conduct business and the surrounding environments. We must ensure that our security programs are fraud aware, leverage intelligent identity based solutions, user behavior analytics, monitor and understand what is happening in and to our environment. We must work with the assumption we are being attacked and be prepared to offset those attacks with fraud aware security. The business should understand that their behavior impacts the security of our environment. The business must be invested in security.

During this session, we will take you through the dangers that impact your business and how game changing fraud aware security can help your business grow!
Jon Lang
Day 1: Free Expo Seminar Theatre
10:45

The Future Workforce - Are You Ready?

How prepared is your workforce, as digital continues to take hold and the next wave of powerful technologies ushers in a new era? Disruptive forces such as AI, RPA and Cloud in addition to the evolving workplace methodologies such as ITIL, Agile and DevOps are already transforming Government Services – those who embrace them will push the economy forward, those who don't will be left behind. Join Jon Lang, CEO of Australia’s largest Corporate IT Training Provider DDLS, to learn the latest tech trends along with the skills needed to thrive in a new digital reality. As Australia’s only official training partner across the three major clouds – AWS, Microsoft Azure and Google Cloud, in addition to the number one cybersecurity training business, DDLS is able to provide a unique view on the skills in demand now and into the future.
Samantha McGregor
Day 1: Free Expo Seminar Theatre
11:30

Convene. Secure Governance, Secure Decisions

Good governance should be driven by security. Convene, the leading board meeting software, enables organisations to achieve secure governance and streamlined decisions through its powerful collaboration tools, promoting transparency and accountability. Built with enterprise-grade security, Convene empowers boards in over 80 countries worldwide — transforming the way they meet.
Alex Wilson
Day 1: Free Expo Seminar Theatre
12:30

The future of authentication. Secure passwordless login for employees and customers

Interested in learning more about how you could transform your users experience and reduce IT support costs with secure passwordless authentication?Unlike early predecessors, newly-developed open authentication standards, such as FIDO U2F and FIDO 2, provide strong authentication and high privacy with characteristics that have eluded previous hardware tokens – elegance and simplicity. Impossible you think?This session will change your perceptions and eventually protect your online accounts.
Brad Bastow
Day 1: Free Expo Seminar Theatre
12:50

Secure Application Development in a Micro-Service World:

Steve Clarke, Head of Application Development, AUCloud
Nick Main
Day 1: Free Expo Seminar Theatre
13:30

Multi-agency and industry collaboration of classified information

Multi-agency collaboration of classified information continues to be challenging for government both here and globally. Extending those collaboration requirements to Industry Partners, adds even more complexity. The solution: Take a proven TS platform and provide it as an accredited Australian PROTECTED Content & Collaboration service for Government and Industry.
Nick Main, CTO, archTIS
Kenny Little
Day 1: Free Expo Seminar Theatre
14:00

Can IT deliver the '1-click' customer experience?

In a digital era, where on-demand service delivery has become the norm, service departments such as IT, HR and Facilities are under increasing pressure to respond to business demands quickly.

Routine requests, such as answering the same question or actioning simple tasks, can take up the bulk of the team’s time. Many delivery departments still rely on manual processes to manage service requests, resulting in bottlenecks, oversights and frustration.

Alemba will demonstrate how Alemba Service Manager can accelerate service request fulfilment to:
  • Reduce workload and increase productivity, by automating and simplifying the delivery of routine services.
  • Improve customer engagement and satisfaction with an easy-to-use customer request portal.
Rupert Taylor-Price
Day 1: Free Expo Seminar Theatre
16:00

Next Generation Secure Cloud

Vault's CEO will outline the next generation in secure cloud technology covering AI acceleration to quantum cryptography
Vijay Chaudhari
Day 1: Free Expo Seminar Theatre
16:20

Application Access Governance

Ever-increasing compliance mandates dictate the deployment and continuous monitoring of GRC Access and Security controls. Saviynt assists enterprises in meeting these compliance mandates by offering one of the most advanced, cloud-based Application Risk and Governance solutions in the industry. Come and see how Saviynt provides Assured Compliance to organizations in on-premises, hybrid, or cloud deployments and operates as a digital transformation enabler.
last published: 19/Jul/19 10:15

Day 2: Free Expo Seminar Theatre, Wednesday 7 August 2019

Matt Patterson
Day 2: Free Expo Seminar Theatre
11:10

Security Re-Defined - Using Cloud to Transform Security and Accelerate Digital Transformation

Netskope is building a secure on-ramp to the internet for enterprise users accessing SaaS, IaaS, privately hosted apps, and the web itself. The cloud is transforming your organization. It’s changing how you work as everything is becoming more intuitive, connected, open, and collaborative, and that change is rippling across SaaS, IaaS, and the web. This creates new challenges and risks that legacy security vendors can’t address.
Matt Patterson, Senior Sales Engineer, Netskope Australia Pty Limited
Rajan Barara
Day 2: Free Expo Seminar Theatre
12:45

Game Changing Fraud Aware Security for your business

Thanks to the cloud adoption and mobile devices, organizations worldwide have an ever-expanding online footprint. Employees work online, customers and suppliers do business with organizations online. Business reputation can be made or broken online. Today’s cyberattacks are increasingly sophisticated and complex, driven by elaborate and resilient professional organizations that innovate faster than their targets. Hackers are not only after customers’ credit card details – they’re interested in any information that can be monetized in any way. The hacker’s motivation may be to get money, cause brand damage or just having fun at someone’s expense. A cyberattack can have a domino effect on business culminating in loss of revenue and goodwill, regulatory scrutiny and fines, and even share price plunges.

A key consideration for an organization assessing its cyber security is whether its measures are capable of preventing, detecting and adequately responding to attacks, rather than just complying with industry best practices. Compliance does not guarantee protection, and organizations with a mature approach to cyber security must go further.

Operating in a digital world depends on capability to maintain a secure and trusted environment. Fraud aware security must be the foundation on which digital business should be built. Gone are the days when we could build a walled garden perimeter, and feel secure. Today, businesses partner with others, outsource, have alliances, let customers access our systems and as we extend our reach – the perimeter of walled gardens is gone. All security strategies must align with the changes in the way organizations conduct business and the surrounding environments. We must ensure that our security programs are fraud aware, leverage intelligent identity based solutions, user behavior analytics, monitor and understand what is happening in and to our environment. We must work with the assumption we are being attacked and be prepared to offset those attacks with fraud aware security. The business should understand that their behavior impacts the security of our environment. The business must be invested in security.

During this session, we will take you through the dangers that impact your business and how game changing fraud aware security can help your business grow!
Sean Duca
Day 2: Free Expo Seminar Theatre
13:05

Mythbusting Zero Trust

Trust is a dangerous vulnerability that is exploited by malicious actors. The point of Zero Trust is not to make networks, clouds or endpoints more trusted; it’s to eliminate the concept of trust from digital systems altogether.

This session will Illustrate what Zero Trust is, and what Zero Trust is not, and how creating this network is actually much simpler than building a legacy 20th-century hierarchical one. A straightforward five-step methodology will also be shared in this session, that will enable you to simplify your deployment of a Zero Trust network, making it manageable, cost-effective and non-disruptive.
Peter Stewart
Day 2: Free Expo Seminar Theatre
13:45

Attack chain of an active adversary

Robinson Roe
Day 2: Free Expo Seminar Theatre
14:10

Why privacy regulation is great for the public & private sectors

  • Trust is fundamental for people to provide their personal data
  • Personal data fuels artificial intelligence, machine learning and analytics
  • With institutional trust at all-time lows, a privacy culture is now critical
last published: 19/Jul/19 10:15