AGENDA


Cyber Security Day 1

Speaker to be announced
09:00

Opening remarks by Chair

Speaker to be announced, TBC
Angus Taylor
09:10

MINISTERIAL OPENING KEYNOTE ADDRESS: Advancing Australia’s cyber security through partnerships between government, business and research

Charles McHardie
09:20

Creating a citizen-centric, digital-experience platform?

  • Creating a converged digital experience platform that supports “any device, any location, any time”
  • Moving from a forms-based paradigm to a Conversation AI Platform
  • The value proposition for Virtual Assistants in the citizen-facing digital channel – good for citizens, good for government
Hudson Hollister
09:50

How to turbocharge your data transformation

  • How US federal data was improved
  • Research insights into federal grant reporting (worth over $600 billion in revenue), and how the US is working towards automating grantees’ compliance burden
  • Discussion on bringing system-wide transparency for government agencies
10:10

Morning tea, exhibition exploration, and expo main stage presentations

Cyber Security Day 1
11:50

PANEL: Women in Cyber

  • Encouraging more women into public sector cyber security workforce
  • Barriers and skills gap for women in cyber roles
  • Incentivising organisations to boost the new cyber roles
12:30

Lunch, exhibition exploration, and expo main stage presentations

Cyber Security Day 1
14:00

Case study: commonwealth games cyber strategy

Speaker to be announced, TBC
Cyber Security Day 1
14:20

PANEL: Cyber human factors- why employees are still a security risk

  • Rise of insider threat
  • Social engineering
  • Strategies to mitigate the risk
  • Set up the right structure for strong cyber security
Cyber Security Day 1
14:50

PANEL: Cyber engagement and awareness

  • Selling cyber to the board and senior management
  • Cybersecurity stakeholders
  • Cyber training and awareness
15:20

Afternoon tea, exhibition exploration, and expo main stage presentations

Cyber Security Day 1
16:10

Data is to Oil as the Internet is to ...what?

They say data is the new 'crude oil' - the defining raw material of the emerging digital economy. But the Internet is still a Wild West. What cyber infrastructure is needed to safeguard data supply chains? And what can we learn about data provenance from the past decade of identity management and privacy law reform?
Cyber Security Day 1
16:30

Will robots need passports? Extending the digital id across the Internet of Things (IoT)

Twenty five years ago, on the internet nobody knew you were a dog. Now they don’t know if you’re a fridge pretending to be a dog. Pretty soon they won’t know if you’re a bot pretending to be a fridge pretending to be a dog. In a world of fake identities and fake news, where it is your car’s braking system getting hacked not your credit card, we need to up the priority of digital identity and we need to develop digital identity infrastructure for people, things and bots. This presentation sets out a practical model for digital identity and explores how we might make progress in solving some the key problems.
17:00

Networking drinks

last published: 15/Jun/18 06:15 GMT


Cyber Security Day 2

Cyber Security Day 2
09:00

How Israel became a world-leader on cyber security

  • How Israel achieved its cyber security success?
  • Policy and Practice which supports or inhibits cyber innovation.
  • Building eco-system and collaboration private enterprise with public sector and academia
  • Which technologies will propel Israel’s cyber success?
  • What are the roadblocks to innovation and how can they be
Avi Shavit, Strategic Adviser Cyber Security, Israel Innovation Authority
Cyber Security Day 2
09:30

PANEL: Collaboration between industry, government, academia and vendors

  • What government can learn from private sector cyber security
  • How government can partner with private sector on cyber security
Jamie Norton, Chief Security Information Officer, ATO
10:10

Morning tea, exhibition exploration, and expo main stage presentations

11:00

Roundtables

Delegates will select their roundtables ahead of the event – choosing the topic that is most pertinent to their role and their enterprise. Don’t miss out on your opportunity to share your own experiences and take a deep dive into your most pressing issues facing your team. Bring the team, split up, ask questions, get answers and compare notes back at the office. This is knowledge sharing and intelligence gathering on a whole new level.

Attend up to 3 x 30 min roundtable topics.
12:50

Lunch, exhibition exploration, and expo main stage presentations

Cyber Security Day 2
14:00

Policies and strategies implemented to reduce cyber-crime

  • What are the latest cyber crime threats facing the public sector
  • Continuously responding and adapting cyber security policies
  • Collaboration of industry, law enforcement and government to outpace cyber criminals
Commander David McLean, Manager Cybercrime Operations, Australian Federal Police
Cyber Security Day 2
14:20

PANEL: Successfully reducing attacks- who, what, when, where and how?

Insights on the threats of: DDoS, Hardware attacks, Mobile Security, Ransomware , Social Engineering, Darknet, Hackers; Phishing, email spam, IoT and future threats
Speaker to be announced, TBC
Cyber Security Day 2
14:40

PANEL: Cyber workforce closing the skill gaps

  • Where are the cyber skills in deman now and in the future
  • Cyber education and training straties
Adam Henry, Australian Co-Lead Cybersecurity Workforce Alliance, UNSW Canberra
Cyber Security Day 2
15:40

Afternoon tea, exhibition exploration, and expo main stage presentations

Exhibition exploration and expo main stage presentations, Cyber Security in Government
Cyber Security Day 2
16:20

Security/identity challenges confronting the financial sector

Cyber Security Day 2
17:10

PANEL : What’s the world going to look like in the future?

last published: 15/Jun/18 06:15 GMT