2019 Agenda

 

 

Day 1: Identity, Tuesday 6 August 2019

09:00

Opening Remarks

Major General Marcus Thompson
09:10

Department of Defence: Cyber operations

  • The Australian Defence Force’s approach to cyberspace operations
  • Capabilities development
  • How other government departments can assist
Stefan Hajkowicz
09:30

Digital megatrends and artificial intelligence

  • Recent developments in artificial intelligence and machine learning worldwide and their implications for Australia.
  • How digital technology will change the operations of government over the coming decade.
  • Strategic foresight techniques for exploring the future capabilities and impacts of digital technology.
Robinson Roe
09:50

Why privacy regulation is great for the public and private sectors

  • Trust is fundamental for people to provide their personal data
  • Personal data fuels artificial intelligence, machine learning and analytics
  • With institutional trust at all-time lows, a privacy culture is now critical
Day 1: Identity
11:00

Chairperson's Opening Remarks

Fergus Hanson
Day 1: Identity
11:05

Unlocking the potential of digital identity in Australia

  • What does an Australia with digital identity look like?
  • What are the benefits of digital ID?
  • The Australian government has a sorry history trying to roll out national identity documents, how do we avoid the same pitfalls this time?
  • Why aren’t we setting ourselves up for success and how do we get things back on track?
Stephen Wilson
Day 1: Identity
11:25

Identity is dead - The digital identity movement has failed us, but there are lessons for the digital economy

  • Identity is dead. All that matters now is data
  • There are no identity providers, just data brokers
  • Data supply and provenance are critical infrastructure for the digital economy
Stephen Pratt
Day 1: Identity
12:05

We only have one identity so how do we look after it ?

  • There is much talk about digital identity, but digital is just another channel representing your identity credentials
  • Linking the physical credential to the digital credentials isn’t a nice to have, it’s a necessity!
  • Authentication of your identity is just as important as securing your identity
last published: 05/Aug/19 23:25

Day 1: Round Table Discussions, Tuesday 6 August 2019

Robinson Roe
Day 1: Round Table Discussions
14:00

Roundtable 01: Why privacy regulation is great for the public & private sectors

Andrew Ford
Day 1: Round Table Discussions
14:00

Roundtable 02: Workshop - Key ingredients in government A.I analytics

An interactive roundtable session that enables attendees to explore four key inputs into successful AI projects. 1. Data, 2. People, 3. Process, 4. Platforms. This session centers the participants thinking around prioritising the requirements for beginning an AI project. Where and what are my data inputs? What skills do I have and what do I need? and what processes need to change? Are just some of the themes we explore in this session. At the end of the session you’ll be equipped with a framework to re-use for your AI projects.
Marcus Vogt
Day 1: Round Table Discussions
14:00

Roundtable 03: Identity at Rest and Identity in Motion

  • Identity is at the heart of today's IT services. Be it ordering McDonalds, to paying your bills, identity is used to improve customer experience, security and enable integrations such as digital assistants, etc..
  • To realize the full power of identities, it is important to understand that identities can leverage paradigms from data science (e.g. identity at rest and identity in motion) to deliver more value.
  • How can organizations leverage both identity at rest (authorization & consent) and identity in motion (authentication) to improve both operational simplicity, security and customer experiences.
Neil Ferreira
Day 1: Round Table Discussions
14:00

Roundtable 04: Why Cyber - Security Now Affects Both Government & Private Enterprise (both Big and Small organisations)

Julian Fay
Day 1: Round Table Discussions
14:00

Roundtable 05: The secure integrated data networks solution - end-to-end encryption for protected networks and shared data; maximum performance and Government certified!

CDM + Senetas

Concerned about network security and data breach protection - Cloud, SaaS, public and private?

High-performance network solutions. Australian government certified encryption security - high-assurance security without compromising performance. Secure network architecture used by the world's most secure organisations.
  • Trusted network integration
  • Certified encryption security
  • Zero management overhead
  • Quantum ready
Aaron Cockerill
Day 1: Round Table Discussions
14:00

Roundtable 06: Current threat landscape for mobile devices

Hassan Baickdeli
Day 1: Round Table Discussions
14:00

Roundtable 07: Digital Transformation, Security and Compliance and the application in Government

Remaining at the forefront of technology and innovation is crucial for many organisations and Government is no different, the requirement for this not only stems froma desire to enable digital transformation and all the benefits that come with it but to also ensure that imperative elements such as policy and cybersecurity from theend user compute piece right through to the data centre are up-to-date, enabled and compliant.Join Lenovo for an informative and engaging round table covering off identity, device, connectivity and data security from an EUC perspective.
Eban Escott
Day 1: Round Table Discussions
14:00

Roundtable 08: Bots That Code: The Continuous Modernisation Playbook

Legacy systems are hurting business agility. Data is often trapped in offline systems meaning visibility across an organisation is limited. Using bots, Codebots can migrate these legacy systems to full stack applications with API documentation. Learn about how you can overcome the pitfalls of legacy and enter a mode of continuous modernisation.
Chip Redden
Day 1: Round Table Discussions
14:00

Roundtable 09: Building Intelligent Communities: Opportunities, Challenges & Case Studies

Bruce Young
Day 1: Round Table Discussions
14:00

Roundtable 10: How to deliver a workable mobile application on-time and within budget using agile delivery and UX design

As part of its digital strategy, DFAT’s Australian Passport Office (APO) has developed its first mobile application with biometric capabilities to help DFAT staff across its network of posts to digitally capture data using a portable device. The application will improve overall service capabilities, enhance the client experience and strengthen security around identity verification.Join this roundtable to learn and discuss the critical factors that enabled DFAT to go from concept to delivery of a workable Minimum Viable Product (MVP) in just 6 months using Agile delivery and UX design. We will provide an overview of the project and discuss and share ideas on:
  • Best practices for Going To Market
  • The benefit of keeping contracts lean
  • Agile delivery (Planning / Sprint 0 and execution using 2 week sprints)
  • Challenges around Technology, Testing, Integration, Security, Documentation
  • How to get effective stakeholder engagement
Manvinder Hara
Day 1: Round Table Discussions
14:00

Roundtable 11: The X Factor: Why Employee Experience – not Customer Experience – is the next frontier of competitive advantage

Business success hinges on the ability to find and keep competitive advantage. In this regard, it makes sense to build this advantage by leveraging one of your largest (and most expensive) resources: your employees.Yet in a recent Nitro survey, 78% of respondents who did not feel productive at work also felt they weren’t being supported by management.

Where is the disconnect?

Join this intimate Nitro roundtable to discuss with experts and your peers:
  • The impact digital transformation is having on employee experience
  • How to better enable employees to effect change within the organization
  • How some of Australia’s largest government departments are empowering their employees toward change
  • The power of analytics and other tools to drive measurable and lasting change
Demos Gougoulas
Day 1: Round Table Discussions
14:00

Roundtable 12: Capture in the age of digital born

Damon Zemanek
Day 1: Round Table Discussions
14:00

Roundtable 13: How can cyber consultancy be different? Create structural value for our Customer and not just be a black provider

  • Addressing the cybersecurity skills gap and selecting the right cybersecurity specialist to provide, trusted and structured knowledge transfer as part of your security project.
  • Upskilling your people in your organisation to build cyber-resilience as part of your security engagement.
Jason Duerden
Day 1: Round Table Discussions
14:00

Roundtable 14: AI Based Cybersecurity – How to Decouple Legacy from Innovation

  • What is AI in cyber security and what is not, cut through the noise
  • Simplify security operations with a prevention first approach, leveraging AI and machine learning
  • Support, extend and enhance security on legacy infrastructure in a highly cost effective way to enable innovation
Allan Foster
Day 1: Round Table Discussions
14:00

Roundtable 15: Managing Data and Trust - The Principles of “Good Identity”

Digital Services have changed how we interact with the world around us from government to local stores and social media. Core to the success of digital services is trust and with it a robust identity strategy. We will explore good identity principals to drive successful digital services with privacy, consent management and security.
Aaron Dinnage
Day 1: Round Table Discussions
14:00

Roundtable 16: The Modern Workplace

The modern workplace is evolving at lightning speed, with distributed teams, brand-new business models and complex security issues. The right digital tools connect and support government staff, wherever they are to encourage productivity, engagement and collaboration.ASI will be hosting roundtable discussions on the Modern Workplace which will focus on the four key areas:
  • Built for teamwork
  • Unlocks creativity
  • Intelligent security
  • Integrated for simplicity
Presented by ASI Solutions and Microsoft
Jason Lee
Day 1: Round Table Discussions
14:00

Roundtable 17: Explore how connected technologies are improving public safety and communication within communities, and how the mobilisation of government is impacting both the state and federal publi

Satian Vasudevan
Day 1: Round Table Discussions
14:00

Roundtable 18: Right Data Fuels AI/ML – How do we know what “Right Data is?”

Artificial Intelligence (AI) and Machine Learning (ML) no longer a buzz word, today it is available within your enterprise, join a conversation around what you need to think about to benefit from AI/ML in your pursuit of Data Analytics.
last published: 05/Aug/19 23:25

Day 1: Closing Plenary, Tuesday 6 August 2019

David Birch
Day 1: Closing Plenary
16:15

Digital Identity: Cyberwar and peace

  • A famous media theorist (“the medium is the message”) once said that WWIII would be an information war with no differentiation between military and civilian participants.
  • And as renowned, cyber security guru, Bruce Schneier, wrote “Book Press here to Kill Everybody,” cyber war is the new normal. So, what are we going to do?
  • Digital identity is a fundamental component of our defences against fake people, fake news and fake things. But what are you going to do to make it a reality?
Stephen Scheeler
Day 1: Closing Plenary
16:45

Inside Facebook: The secrets behind Facebook's meteoric rise and how you can apply them to your business

Facebook’s unprecedented rise to world dominance is well-known. Harvard dorm room. Geeky teen founder. Hackathons. Billions of friends, fans, shares and likes. Fake news. Filter bubbles.But the true story of Facebook’s journey is far more fascinating than any outsider’s book or Hollywood movie. Former Facebook CEO for Australia and New Zealand, Stephen Scheeler, knows this story because he was there. In this captivating keynote, Stephen shares his insider’s insights about what makes Facebook tick, how the company makes decisions, how it nurtures its famous “move fast and break things” culture, how it drives innovation and disruption, and what Mark Zuckerberg and other Facebook leaders really do to maintain Facebook’s explosive growth, even in the face of front-page controversy.
Gero Decker
Day 1: Closing Plenary
17:05

Congestion busting through digital process management

  • Discover how digital process management can supercharge congestion-busting
  • Understand how digital process management can assist service delivery within your agency
Day 1: Closing Plenary
17:25

Closing remarks

last published: 05/Aug/19 23:25

Day 2: Identity Stream A, Wednesday 7 August 2019

Day 2: Identity Stream A

Opening remarks

Panel discussion
Day 2: Identity Stream A
09:10

Stream A - Digital ID and financial services

  • What problem is digital identity fixing?
  • Why is this a priority for the Australian Payments Council
  • How will business, consumers and government benefit from interoperable identity services
Katryna Dow
Day 2: Identity Stream A
09:50

Stream A - Personal Data as a form of currency

  • Citizens currently live a dual existence - physical and digital
  • The challenge to balance individual privacy with national security is one of the biggest challenge for governments and society around the world
  • The increase in fraud, identity theft and data hacks makes this topic critical from a policy, economic, security and commercial perspective
Panel discussion
Day 2: Identity Stream A
11:20

Panel: Consumer data right - The role of digital ID in open data

  • The impact of the consumer data right beyond banking
  • Will it provide economic benefits through efficiency, competition and innovation?
  • Ensuring privacy by design in the implementation
  • How to ensure data value capture
  • Whose asset is the data?
Skeeve Stevens
Day 2: Identity Stream A
11:40

Identity - Changes in how we understand identity are coming

Day 2: Identity Stream A
12:00

Seamless Contactless Traveller Processing

Anil John
Day 2: Identity Stream A
14:00

Can Blockchain/DLT help prevent forgery and counterfeiting?

Panel discussion
Day 2: Identity Stream A
14:40

Panel: Is self-sovereign identity a real alternative to traditional identity models?

  • Self-sovereign identity examples around the world
  • What is meant by traditional identity models?
  • How can this benefit government organisations?
  • Can self-sovereign identity coexist with the current government and private sector models?
last published: 05/Aug/19 23:25

Day 2: Identity Stream B, Wednesday 7 August 2019

Day 2: Identity Stream B
09:00

Opening remarks

Amanda Robinson
Day 2: Identity Stream B
09:10

Stream B - The Identity Project – Reimagining trust in the digital age

  • How people act and participate has changed dramatically from decades past however structural barriers make it difficult for people to represent themselves to each other and to the organisations and institutions with which they want to engage.
  • Through The Identity Project we are authoring a new narrative for how trust is developed in a digital world and how this might make it easier for people to fully participate in society.
  • We are creating a decentralised self-sovereign identity ecosystem that serves humanity developing both the product that will build the bridge from physical to digital identity as well as the trust standards to support the ecosystem.
Rachel Dixon
Day 2: Identity Stream B
09:30

Stream B - Identity, privacy and open data

  • Current and future issues in privacy and data security
  • Why Identity is key to privacy and security in a digital world
  • Observations on privacy breaches and best responses
  • Informed consent, GDPR, Facebook and the ‘social license’ governments have for the use of data
Panel discussion
Day 2: Identity Stream B
09:50

Stream B - The challenge of combining KYC and user experience

  • Optimising KYC for you and your customers
  • The KYC trinity – optimise security, minimise friction, and maximise customer value
Day 2: Identity Stream B
12:00

Risk Identification

last published: 05/Aug/19 23:25

Day 1: Free Expo Seminar Theatre, Tuesday 6 August 2019

Rajan Barara
Day 1: Free Expo Seminar Theatre
10:25

Game Changing Fraud Aware Security for your business

Thanks to the cloud adoption and mobile devices, organizations worldwide have an ever-expanding online footprint. Employees work online, customers and suppliers do business with organizations online. Business reputation can be made or broken online. Today’s cyberattacks are increasingly sophisticated and complex, driven by elaborate and resilient professional organizations that innovate faster than their targets. Hackers are not only after customers’ credit card details – they’re interested in any information that can be monetized in any way. The hacker’s motivation may be to get money, cause brand damage or just having fun at someone’s expense. A cyberattack can have a domino effect on business culminating in loss of revenue and goodwill, regulatory scrutiny and fines, and even share price plunges.

A key consideration for an organization assessing its cyber security is whether its measures are capable of preventing, detecting and adequately responding to attacks, rather than just complying with industry best practices. Compliance does not guarantee protection, and organizations with a mature approach to cyber security must go further.

Operating in a digital world depends on capability to maintain a secure and trusted environment. Fraud aware security must be the foundation on which digital business should be built. Gone are the days when we could build a walled garden perimeter, and feel secure. Today, businesses partner with others, outsource, have alliances, let customers access our systems and as we extend our reach – the perimeter of walled gardens is gone. All security strategies must align with the changes in the way organizations conduct business and the surrounding environments. We must ensure that our security programs are fraud aware, leverage intelligent identity based solutions, user behavior analytics, monitor and understand what is happening in and to our environment. We must work with the assumption we are being attacked and be prepared to offset those attacks with fraud aware security. The business should understand that their behavior impacts the security of our environment. The business must be invested in security.

During this session, we will take you through the dangers that impact your business and how game changing fraud aware security can help your business grow!
Jon Lang
Day 1: Free Expo Seminar Theatre
10:45

The Future Workforce - Are You Ready?

How prepared is your workforce, as digital continues to take hold and the next wave of powerful technologies ushers in a new era? Disruptive forces such as AI, RPA and Cloud in addition to the evolving workplace methodologies such as ITIL, Agile and DevOps are already transforming Government Services – those who embrace them will push the economy forward, those who don't will be left behind. Join Jon Lang, CEO of Australia’s largest Corporate IT Training Provider DDLS, to learn the latest tech trends along with the skills needed to thrive in a new digital reality. As Australia’s only official training partner across the three major clouds – AWS, Microsoft Azure and Google Cloud, in addition to the number one cybersecurity training business, DDLS is able to provide a unique view on the skills in demand now and into the future.
Ken Soh
Day 1: Free Expo Seminar Theatre
11:05

Protecting CIIs via Detection-less Paradigm

  • Today’s cyber landscape is radically different from the past’s. Advanced threats are stealthy and lethal. They are difficult to detect. Unfortunately, cyber protection technologies continue to progress in a detection-oriented framework. It is therefore not uncommon for malicious codes to reside in a CIIs or enterprises and stay undetected for hundreds of days, exfiltrating data in complete silence.
  • Traditional methods are no longer working. Detect nothing does not mean it is safe. A detection-less strategy is imminently needed.
  • This sharing session focuses on addressing the common gaps in today’s cyber protection strategies collectively, and offers the thought leadership to fill these gaps from a highly operational, practitioner’s perspective.
Samantha McGregor
Day 1: Free Expo Seminar Theatre
11:30

Convene. Secure Governance, Secure Decisions

Good governance should be driven by security. Convene, the leading board meeting software, enables organisations to achieve secure governance and streamlined decisions through its powerful collaboration tools, promoting transparency and accountability. Built with enterprise-grade security, Convene empowers boards in over 80 countries worldwide — transforming the way they meet.
Alex Wilson
Day 1: Free Expo Seminar Theatre
12:30

The future of authentication. Secure passwordless login for employees and customers

Interested in learning more about how you could transform your users experience and reduce IT support costs with secure passwordless authentication?Unlike early predecessors, newly-developed open authentication standards, such as FIDO U2F and FIDO 2, provide strong authentication and high privacy with characteristics that have eluded previous hardware tokens – elegance and simplicity. Impossible you think?This session will change your perceptions and eventually protect your online accounts.
Brad Bastow
Day 1: Free Expo Seminar Theatre
12:50

Secure Application Development in a Micro-Service World:

In this thought provoking presentation, presenters will question the lack of focus on hardening software practices in a world increasingly based on micro-services underpinned by containerisation, quantum encryption and an obsessive desire from developers to right click on open-source code. With the ASD ISM dedicating some 11 pages to cabling and cable colours and only 5 paragraphs to secure software development, this presentation will challenge the prevailing mindset that underestimates the changing nature of the cyber security ecosystem and address the real risks that lay in protecting your core data, your metadata, your monitoring data and the unique insights derived from your AI analytics. More importantly, how are these risks practically mitigated?
Matt Campbell
Day 1: Free Expo Seminar Theatre
13:10

Next Generation Digital Service Portfolios

For decades, organisations of all sizes, from all industries, have struggled to govern their service portfolios and run their IT departments through a forward looking lens. Cost allocations were guess-timates at best with annual Cost Centre budgets being determined by previous year expenditure rather than transparent financial analysis. This presentation will walk through a working example of a Digital Service Portfolio and how real-time cost assignment identified actionable insights for a Federal Government Chief of IT.
Nick Main
Day 1: Free Expo Seminar Theatre
13:30

Multi-agency and industry collaboration of classified information

Multi-agency collaboration of classified information continues to be challenging for government both here and globally. Extending those collaboration requirements to Industry Partners, adds even more complexity. The solution: Take a proven TS platform and provide it as an accredited Australian PROTECTED Content & Collaboration service for Government and Industry.
Nick Main, CTO, archTIS
Kenny Little
Day 1: Free Expo Seminar Theatre
14:00

Can IT deliver the '1-click' customer experience?

In a digital era, where on-demand service delivery has become the norm, service departments such as IT, HR and Facilities are under increasing pressure to respond to business demands quickly.

Routine requests, such as answering the same question or actioning simple tasks, can take up the bulk of the team’s time. Many delivery departments still rely on manual processes to manage service requests, resulting in bottlenecks, oversights and frustration.

Alemba will demonstrate how Alemba Service Manager can accelerate service request fulfilment to:
  • Reduce workload and increase productivity, by automating and simplifying the delivery of routine services.
  • Improve customer engagement and satisfaction with an easy-to-use customer request portal.
Rupert Taylor-Price
Day 1: Free Expo Seminar Theatre
16:00

Next Generation Secure Cloud

Vault's CEO will outline the next generation in secure cloud technology covering AI acceleration to quantum cryptography
Vijay Chaudhari
Day 1: Free Expo Seminar Theatre
16:20

Monitoring and Administrating Privileged Access in the cloud

Business transformation with complex multi-cloud infrastructures, increase data privacy and security risks – from human and robotic identities. The 2019 Data Breach Investigations Report, highlighted the increasing threat caused by system administrator or Privileged User accounts.

As organisations and Government departments move from their on-premise infrastructure to cloud, they face new challenges and nuances in securing this privileged access. They need a Privileged Access Management (PAM) solution that provides frictionless, effective and scalable control over sensitive access to critical workloads and applications in a multi-cloud ecosystem.

Come see how Saviynt addresses these challenges by providing a Cloud architected solution to help manage privileged access in Azure (Microsoft), Amazon and Google Cloud platforms, from workloads to serverless computing and the DevOps tools.
last published: 05/Aug/19 23:25

Day 2: Free Expo Seminar Theatre, Wednesday 7 August 2019

Tamara Zacharias
Day 2: Free Expo Seminar Theatre
10:25

Everyone wants innovation, but no one wants change. Where does Digital Transformation fit?

Tegan Clarkson, Creative Director, Technology, GrowthOps
Matt Patterson
Day 2: Free Expo Seminar Theatre
11:10

Security Re-Defined - Using Cloud to Transform Security and Accelerate Digital Transformation

Netskope is building a secure on-ramp to the internet for enterprise users accessing SaaS, IaaS, privately hosted apps, and the web itself. The cloud is transforming your organization. It’s changing how you work as everything is becoming more intuitive, connected, open, and collaborative, and that change is rippling across SaaS, IaaS, and the web. This creates new challenges and risks that legacy security vendors can’t address.
Ken Soh
Day 2: Free Expo Seminar Theatre
12:25

Protecting CIIs via Detection-less Paradigm

  • Today’s cyber landscape is radically different from the past’s. Advanced threats are stealthy and lethal. They are difficult to detect. Unfortunately, cyber protection technologies continue to progress in a detection-oriented framework. It is therefore not uncommon for malicious codes to reside in a CIIs or enterprises and stay undetected for hundreds of days, exfiltrating data in complete silence.
  • Traditional methods are no longer working. Detect nothing does not mean it is safe. A detection-less strategy is imminently needed.
  • This sharing session focuses on addressing the common gaps in today’s cyber protection strategies collectively, and offers the thought leadership to fill these gaps from a highly operational, practitioner’s perspective.
Rajan Barara
Day 2: Free Expo Seminar Theatre
12:45

Game Changing Fraud Aware Security for your business

Thanks to the cloud adoption and mobile devices, organizations worldwide have an ever-expanding online footprint. Employees work online, customers and suppliers do business with organizations online. Business reputation can be made or broken online. Today’s cyberattacks are increasingly sophisticated and complex, driven by elaborate and resilient professional organizations that innovate faster than their targets. Hackers are not only after customers’ credit card details – they’re interested in any information that can be monetized in any way. The hacker’s motivation may be to get money, cause brand damage or just having fun at someone’s expense. A cyberattack can have a domino effect on business culminating in loss of revenue and goodwill, regulatory scrutiny and fines, and even share price plunges.

A key consideration for an organization assessing its cyber security is whether its measures are capable of preventing, detecting and adequately responding to attacks, rather than just complying with industry best practices. Compliance does not guarantee protection, and organizations with a mature approach to cyber security must go further.

Operating in a digital world depends on capability to maintain a secure and trusted environment. Fraud aware security must be the foundation on which digital business should be built. Gone are the days when we could build a walled garden perimeter, and feel secure. Today, businesses partner with others, outsource, have alliances, let customers access our systems and as we extend our reach – the perimeter of walled gardens is gone. All security strategies must align with the changes in the way organizations conduct business and the surrounding environments. We must ensure that our security programs are fraud aware, leverage intelligent identity based solutions, user behavior analytics, monitor and understand what is happening in and to our environment. We must work with the assumption we are being attacked and be prepared to offset those attacks with fraud aware security. The business should understand that their behavior impacts the security of our environment. The business must be invested in security.

During this session, we will take you through the dangers that impact your business and how game changing fraud aware security can help your business grow!
Kevin O'Leary
Day 2: Free Expo Seminar Theatre
13:05

Mythbusting Zero Trust

Trust is a dangerous vulnerability that is exploited by malicious actors. The point of Zero Trust is not to make networks, clouds or endpoints more trusted; it’s to eliminate the concept of trust from digital systems altogether.

This session will Illustrate what Zero Trust is, and what Zero Trust is not, and how creating this network is actually much simpler than building a legacy 20th-century hierarchical one. A straightforward five-step methodology will also be shared in this session, that will enable you to simplify your deployment of a Zero Trust network, making it manageable, cost-effective and non-disruptive.
Nick Main
Day 2: Free Expo Seminar Theatre
13:25

Working smarter, faster, and more secure: Agency, government and industry PROTECTED collaboration as a service

In a digital age new technologies and cloud applications have created ways of working smarter and faster than before. However, for sensitive and valuable information, these technologies have remained largely out of reach – until now. Join this presentation for a look into the new SaaS product facilitating PROTECTED collaboration between governments, agencies, and industry.
Nick Main, CTO, archTIS
Peter Stewart
Day 2: Free Expo Seminar Theatre
13:45

Attack chain of an active adversary

Robinson Roe
Day 2: Free Expo Seminar Theatre
14:10

Why privacy regulation is great for the public & private sectors

  • Trust is fundamental for people to provide their personal data
  • Personal data fuels artificial intelligence, machine learning and analytics
  • With institutional trust at all-time lows, a privacy culture is now critical
last published: 05/Aug/19 23:25