Roundtables are small group discussions focused on a particular topic and directed by a central table host who will guide the conversation and facilitate the questions and answers from the participants. This is not death by power-point –the emphasis is on the discussion and debate among the 20 or so delegates sharing the table at any given time. Swap war stories, ask questions, gain a better understanding and then put it all into practice back in your department or agency.
The roundtable discussions will run on day two, running as 30 minute topic centric discussions, with three rotations, delegates will have the opportunity to pre-select which tables they would like to attend ahead of the event. With three time slots available, there is something for everyone on offer, allowing you to build your own agenda and tailor the content to suit your enterprise and your job function.
Our delegates enjoy this interactivity and opportunities to share knowledge and a chance to hear what other departments and agencies are up to, which will benefit their organisation. The high-level interactive roundtable format is where delegates can tailor their content in line with their current investment priorities. The roundtable discussion is a platform to confirm and contrast ideas with subject matter experts, understand available solutions, share challenges with peers and make new professional contacts.
How to deliver a government online project on-time and under budget
Bruce Young, CEO, Speedwell
Johanes Iskandar, Senior Account Executive, Sitecore
In 2017 the Department of Health (DoH) successfully launched HeadtoHealth.gov.au with the objective to connect Australians with high quality mental health advice and resources via an online service. The project involved a complex co-design process that brought together over 40 community members with lived experience of mental illness, 30 service providers at both executive and operational levels, mental health professionals, government staff, and five vendors covering project management, design and development, co-design facilitation and user research.A Minimum Viable Product (MVP) was delivered in 3 months, on-time and under budget.
In this roundtable, you will get to:
Protecting digital environments and implementing high-velocity security best practices
Alex Margarit, ITOM Enterprise Sales Specialist, ServiceNow
Gen Fields, Advisory Solution Consultant, ServiceNow
For all the benefits that hybrid cloud environment and digital/ agile process deliver, there is still a lot of uncertainty around the level of security provided by cloud vendors. Join us to discuss how to gain better visibility and control of highly dynamic digital hybrid environments against a backdrop of increased threats on data, applications and access. This discussion will clear up the confusion and assist government departments and agencies with running secure, compliant, and operationally efficient cloud-based services.
Releasing the value of government data to deliver better citizen outcomes
Peter Hong, GM, Public Sector, A/NZ, Teradata
In the past Government policy makers have traditionally reached across to technology to solve its data problems. Whether delivered by SDLC or agile techniques, technology alone has failed to deliver the promised benefits of big data and advanced analytics because:
This Roundtable will discuss with the aid of Use Cases based on successful implementation of big data and analytics capabilities across government, how agencies can draw a line of sight from their data analytics technology implementation to the outcomes they seek to deliver citizens, focusing on:
The Future of Work - Intelligent Automation
Karen Astley, Vice President - Asia Pacific, Appian
How to do you transfer your organisation to Digital? An interactive session to discuss how you can optimise and automate your business processes that unify your data across all applications using AI and Robotic Process Automation
We will outline how to bring these capabilities in one single solution. Building Apps Faster. Run Smarter
Gain Social Confidence: Managing Digital Risk & Ensuring Compliance Without Fear
Otavio Freire, President/CTO, Social Safe Guard
Digital channels and tools present private and public sector organizations with an array of new opportunities. With those opportunities also come new risks, all of which lay far outside a firewall. However, security shouldn’t be an afterthought, it should be a catalyst that drives business forwards. When an enterprise is secure, it will be freer to adopt new technologies that improve efficiency, enhance collaboration, and generate higher returns. Learn how to take position your digital defense to a more proactive stance. Find out how to determine exactly what your digital risks are, where they are, how to defend against them quickly, and how to automate information governance.
Cyber security success: Why organisational culture and people are the keys to cyber security
James Carlopio, BA MA PhD, Executive Director, Cultural Cyber Security Pty Ltd
Join us for this interactive Roundtable discussion where we will give you more insight into understanding why your biggest security risk is not your hardware or software … technology is not the problem nor the sole solution to cybercrime. By transforming your organizational culture to a high-performance security-oriented culture, you increase your staff productivity, performance and moral.
The guidelines to the topics we will discuss are:
TES – Preventing Data Breaches through end-of-life IT equipment disposal
Eric Keser, Chief Executive Officer, Certitude
Government departments continuously retire end-of-life IT equipment containing sensitive organisational or customer data. This often includes financial information, personal records, or a trove of other information which could cause a notifiable data breach. An often overlooked and surprisingly complex area of data security, IT equipment is often discarded through the most cost effective channels with little regard for the disposal method and partner’s credentials.
Join TES at a thought leadership round table to:
• Identify areas where your organisation is most at risk of data breach through disposal of IT equipment
• Learn how to minimise the risk of data exposure
• Develop a best-practice framework for IT equipment disposal within your organisation
Building Cyber Defence capability within Government
Leon Fouche, Partner and National Cyber Security Lead, BDO
Robert Champion, Executive Director, Cyber Security Unit and QGCID, Queensland Government
The changing cyber threat landscape requires organisations to become more resilient and effective in their cyber defence capability. What are the challenges and lessons from building successful cyber defence capability to support resilience? Listen to the experiences of others and raise questions that you would like to have answered on building a cyber defence capability.
Topics we will cover include:
• Importance of Government and industry collaboration – what are the rules and responsibilities
• How to establish trust in sharing security incidents and intelligence information
• Testing your cyber defence capability and readiness to respond to incidents • Importance of reporting – who, when, how
• Federated vs centralised Cyber Defence capability – what are the pros and cons
• Getting the right funding/investment for your cyber defence capability?
• Build, buy or outsource your cyber defence capability – what are the pros and cons.
Staying Ahead of the Hackers
Brendan Leitch, APAC Marketing Manager, Ixia Solutions Group/Key Sight Technologies
It takes highly skilled, experienced professionals to investigate and remediate after security incidents. Last year, ESG surveyed 412 cybersecurity and IT professionals and asked them about the size and skill set of their organization’s cybersecurity team. Fifty-four percent of survey respondents said the skill level of their team is inappropriate for an organization of their size and 57% said the staff size is inappropriate. Given this situation, how can organizations develop the elite cyber warriors they need to protect their business and customers?
We’ve gone Digital but can’t find a record of it!
Demos Gougoulas, Director of Sales & Marketing, EzeScan
Information management and critical record-keeping is quickly transitioning to become a function of the business process as opposed to an obligation at the end of the information life cycle. This round table discussion will examine the relationship between the current trend in digital transformation and the obligatory governance and compliance requirements on best practice information and records management.
• Why are digital transformation initiatives not considering records capture?
• How do we simplify electronic records management and add value to the business processes?
• What is the difference between Centralised and Decentralised capture?
• How can we successfully capture records in real time?
• Whose responsibility is it anyway?
Cybersecurity – common problems and getting the fundamentals right.
Steve Challans – CISO, Prophecy International
Leigh Purdie - Senior Security Architect, Prophecy International
In the increasingly complex world of applications, systems, networks and different security zones, in most organisations the process of implementing a logging, SIEM or Threat Intelligence solution can present some challenges. For many its often a daunting task of not knowing what to do or how to do it.
Building a Next-Generation Data Lake
Yifeng Jiang; Solution Architect, Data Science, Pure Storage, Inc
Government departments are gathering more and more data from multiple different sources. With more data comes complexity, as we scale beyond traditional analytics solutions. Join Yifeng Jiang, Pure Storage’s Data Science Solution Architect, as he explores how to build a modern analytics data lake with the ability to support current and future initiatives. How do I start building a data lake and what does that data lake look like? What are the key criteria of a modern data lake and where does the Cloud fit?
• Open platforms ensuring what you build today can be used in machine learning and AI futures
• The big data journey: Steps, technologies and practices
• Data lake technology overview: Past, present and future
• Building the team around your lake; roles, responsibilities and skill sets.
Transform to cloud in a zero trust environment
Lee Dolsen, Technical Director, Asia Pacific, Zscaler
Cyber Exposure in the Australian Government – Protect Critical Infrastructure and Citizen Data
Nick Clark, Senior Security Engineer, Tenable
Government agencies and institutions are under mounting pressure to protect citizen data, critical infrastructure, and the delivery of public services. The proliferation of sophisticated attacks by organised crime and nation-states against commercial entities has raised awareness in the government sector and driven a heightened sense of urgency to prevent breaches. Establishing a more resilient cybersecurity defence is essential to maintaining our nation’s security and way of life.
According to the Center for Internet Security, state and local governments are still playing catch up in cybersecurity and fall well below minimum maturity level benchmark recommendations. Government organisations often lack the visibility and actionable intelligence to assess their current security posture, and the proper controls and protections to prevent and respond to breaches or hostile activity.
Join this roundtable session to discuss how we can empower governments to protect citizen data and critical infrastructure. This session is hosted by Tenable – the global standard for the entire US Department of Defense. Our vulnerability management and analytics tools enable agencies to gain full visibility and continuously monitor security and compliance posture; evaluate vulnerabilities across the ecosystem; measure and analyse effectiveness of security mechanisms; and understand, prioritise and mitigate risk.