WA Cyber Security Showcase
Agenda
Perth, 13 February 2024
All times in AWST
8:00 am
Registration and Networking
9:00 am
Public Sector Network Opening and Acknowledgement of Country
9:10 am
Welcome from the Chair
9:20 am
Opening Address: An Update on WA’s Cyber Security
- Overall update
- Security Operations
- Capability and uplift in WA government
- Strategy and policy for government
9:40 am
Comparing the Cybersecurity Approach of Australia to the EU
- The experiences of NIS and NIS2 implementation in Europe (regulating critical infrastructure)
- The AU, EU and UK approaches to cybersecurity
10:00 am
Failure to Plan Opens the Door to Disruption
• Planning and Security Policy blueprints
• How Security Policy maps to the requirements of the WA Government Cyber Security Policy
• Practical methods to aid Security Policy Planning
10:20 am
Strategies to Safeguard WA’s Critical Infrastructure
- Enhancing Cyber Security through industry and government partnerships
- The greatest threats to the state’s critical infrastructure
- Initiatives to enhance security and protect vulnerabilities
- How collaboration boosts resilience and aids in advancing threat detection and response
Demogene Smith, Chief Information Officer, South Metropolitan Health Service
Helen McLeish, Chief Cyber Security Officer, East Metropolitan Health Service
Yusef Denath, Manager Cyber Security, Child and Adolescent Health Service
Neil Barry, WA Regional Manager, Cohesity
11:00 am
Morning Tea and Networking Break
11:30 am
Government Case Study: Cyber Security Culture in Operational Environments with WA Police
- How Cyber Security is different with operational aspects at play
- What is different when educating operational staff on cyber security
- What are the future cyber considerations for WA Police
11:50 am
WA Zero Trust Exchange
- Why Zero Trust, current public sector trends and the future
- Inside the Zero Trust Exchange
- What will be new for 2024
12:10 pm
Implementing the WA Cybersecurity Policy: An agency case study - State Government
- The challenges in cyber security for local government
- What is needed to increase resilience
- Protecting data and breaches and improving cyber strategies
12:30 pm
How a Cyber Partnership has Broader Implications for the State
- How universities are leading the state in research and solution-planning in cyber security
- Why partnerships are important and how they can assist in overall cyber uplift
- What agencies partnerships are critical to improve WA cyber security
Andrew Woodward, Executive Dean – School of Sciences, Edith Cowen University
Miriam Sanchez-Blanco, Chief Technology Officer, City of Stirling
Ryan Menezes, Partner, Scyne Advisory
1:05 pm
Lunch and Networking Break
2:10 pm
Concurrent Roundtables
Roundtable 1: Expanding the WA Government Cyber Security Policy: Requirements for Continuous Incident Detection and Response
• Assessing security operation readiness
• Key components of threat detection and response solutions
• Security Policy Blueprints and threat detection and response readiness
• How to measure success
Natalie Timms, Security Operations and Threat Detection and Response Specialist, Cisco & David De Lima, Technical Solutions Architect, Cisco
Roundtable 2: Achieve Secure Collaboration in Microsoft 365 within a Zero Trust Architecture
• How to protect your critical data in Microsoft 365
• How to apply Zero Trust principles in a “free and open sharing” environment
• How intelligent reporting can reduce your risk exposure when dealing with sensitive information (such as health records, financial data etc.)
• How to automate policy enforcement and information lifecycle management
Victor Lai, Solution Engineering Manager, AvePoint
Roundtable 3: Responding to Ransomware – Tools to Build Your Threat Defense Architecture
• The rise and the evolution of ransomware attack
• How modern data protection capabilities can enhance an organization’s security posture
• Building a Threat Defence Architecture that brings SecOps and IT Ops together
Walter Bevacqua, Senior Systems Engineer, Cohesity
Roundtable 4: Help, I think we’re being hacked again: Managing the human impacts of detecting and responding to major incidents.
• In recent years, Australia has been elevated in prominence for threat actors seeking inappropriate financial gain from cyber crime and to make a name for themselves, resulting in an ever increasing number of attacks against Australian government departments, agencies, trading entities and corporations. This is placing an ever increasing toll on the cyber and technology teams in these organisations, who are constantly on their toes to identify and respond to these attacks. The outcome is a adverse human impact on our teams and an already constrained cyber workforce.
• This roundtable will focus on learnings from major incidents across the country, on the means to manage the human elements of responding to these. We will look at personal resiliency, fatigue management, information overload and other related factors that can impact your teams, and what strategies you can take away to help improve the human factor for your teams.
Peter Johnson, Partner, Scyne Advisory
3:10 pm
Securing Critical Infrastructure Hospitals – People, Processes and Technology
- An introduction to cyber attacks on medical devices in healthcare
- A People, Process and Technology approach to securing healthcare organisations like hospitals
3:30 pm
Cyber Security Capability and Uplift - Lessons Learnt from the Trenches
- Common security issues seen in our engagements across the sector
- The importance of government collaboration and leveraging expertise within it
- How your security program can maximise resources available to the sector
3:50 pm
Closing Remarks
4:00 pm
Event Close
2024 Event Partners
Gold
Cisco
Cisco is the worldwide leader in networking that transforms how people connect, communicate and collaborate. Today, networks are an essential part of business, education, government and home communications, and Cisco Internet Protocol-based (IP) networking solutions are the foundation of these... Learn More
Cloud & Computing, Collaboration, Data Centres, Information Technology & Services, IOT (Internet of Things), Mobility & Wireless, Networking, Software
Enterprise
Zscaler
Secure your entire digital experience. Learn More
Business & Digital Transformation, Cloud & Computing, Cybersecurity, Enterprise & IT Solution Architecture
Enterprise
Silver
Cohesity
Leading Data Security and Management Learn More
Data Management, Information Technology & Services
Enterprise, Medium, Small Business
Bronze
AvePoint
AvePoint provides the most advanced platform to optimise SaaS operations and secure collaboration. Learn More
Collaboration, Compliance, Data Management, Information Management System, Information Technology & Services
Enterprise
Exhibitors
Abnormal Security
Secure Your Cloud Email Learn More
AI/ML, Cybersecurity
Enterprise
Fortinet
Cybersecurity, Everywhere You Need It. Learn More
Cybersecurity
Enterprise
KPMG
We are a global network of professional firms providing a full range of services and digital products to industries, government, and not-for-profit sectors. Learn More
Management Consulting, Project Management, Technology Cloud Consulting
Enterprise
Proofpoint
Protect people. Defend data Learn More
AI/ML, Cybersecurity, Enterprise Software
Enterprise
Coffee Carts