NSW Cyber Security Showcase
Agenda
Pyrmont, 03 October 2024
All times in AEST
8:00 am
Registration And Networking
9:00 am
Opening from PSN & Acknowledgment of Country
9:15 am
Welcome from Event Chair
9:25 am
Ministerial Address
9:45 am
Opening Address
Sonia Minutillo, Acting Privacy Commissioner, Information and Privacy Commission NSW
Sonia Minutillo, Acting Privacy Commissioner, Information and Privacy Commission NSW
10:00 am
Navigating Cybersecurity's Future: Complementing Your Internal Team in the Age of Platform Consolidation and AI
10:20 am
Panel Discussion: Combatting the Skills Shortage Within Cyber Security Roles
Vanessa Tsaccounis, Chief Information Security Officer, University of Wollongong
- Designing initiatives to encourage growth and new opportunities in cyber security roles
- Collaborating with universities – what is the opportunity for public sector organisations to partner with universities to encourage graduates into cyber security roles within the public sector?
- Creating a clear pathway for talent to assist with talent retention
Vanessa Tsaccounis, Chief Information Security Officer, University of Wollongong
10:50 am
Morning Tea & Networking
11:20 am
Welcome from Stream Chair
11:20 am
Welcome from Stream Chair
11:30 am
Keynote: A Holistic Approach to Balancing Cyber Security Risks Within Healthcare
- Prioritising cyber security enhancements requires a ‘multi-staged’ risk-based approach balancing scale, effort and complexity
- The Cyber SHARP model (Safety, Holistic, Adaptive, Risk-based and People-centric) meets these special needs and expectations
- This approach will highlight what’s most important in healthcare to avoid being driven by technology and process
11:30 am
Fireside Chat: Implementing a Cybersecurity Disaster Recovery Strategy
- Understanding the importance of a disaster recovery plan for your organisation
- Putting into play a continuous risk assessment to improve your disaster recovery strategy
- Learning about disaster recovery plans when working with third-party providers
11:50 am
An Ever-Evolving Threat - The Geopolitical Landscape and How it is Influencing Cyber Strategy
- Explore the impact of the geopolitical environment on Federal and State Governments’ responses to Australia’s cyber security threats
- Update on the Australian Government Cyber Security Strategy, focusing on the six shields
- Insights on how global and domestic legislative landscapes are shaping organisational security strategies for the present and future
11:50 am
Incident Response: An Infinite Game
This talk walks through a continuous, strategic approach to cybersecurity. It highlights resilience, adaptability, and proactive defence, focusing on long-term security rather than short-term victories in threat management.
12:10 pm
Government Case Study: NSW Health’s Data Warehouse (EDWARD) Transition Journey | Out With the Old and in with the New
- Understanding the limitations of the old data warehouse – the ‘why’ behind the transition
- Sharing insights into the engagement of diverse stakeholders
- Laying down the roadmap for the transition – how do you protect the data in this transition?
- Successful navigation of the Privacy and Security Assurance Framework (PSAF) to ensure product compliance
12:10 pm
Keynote: Analysing Cyber Security Risk Assessment Strategies
- Diving into cyber security risk assessment frameworks
- Conducting an effective cyber risk assessment
- Evaluating the impact of cyber threats
12:30 pm
Resilience Innovations Ensure High Availability and Business Continuity
- What Customers Should Expect from a Security Cloud
- How Zscaler delivers a high-availability and performance cloud
- Business Continuity Planning and Disaster Recovery
12:30 pm
Cyber War Games - Building Resilience through Simulated Attacks & Lessons from the Trenches
- An cyber incident is inevitable – becoming a headline doesn’t need to be
- Two things that separate winners from losers.
- Tools, techniques and lessons learned ‘from the trenches’
12:50 pm
Panel Discussion: Digital Transformation of the NSW Public Sector: Bridging the Divide Between Legacy Systems and Modern IT Infrastructure and Architecture
Ashi Dsouza, Cyber Security Advisor, Camden Council
Sarah McCullough, Chief Digital Officer, Essential Energy
Ashwin Ram, Cyber Security Evangelist, Office of the Chief Technology Officer, Checkpoint
- Providing an overview of the digitisation of the NSW public sector
- Balancing the need for innovation with the maintenance of critical legacy systems
- Addressing key challenges when operating on legacy systems versus modern infrastructure
Ashi Dsouza, Cyber Security Advisor, Camden Council
Sarah McCullough, Chief Digital Officer, Essential Energy
Ashwin Ram, Cyber Security Evangelist, Office of the Chief Technology Officer, Checkpoint
12:50 pm
Panel Discussion: Fostering a Cyber Resilient Culture: Implementing Cyber Security Awareness in your Organisation
Jenny Francis, Executive Manager, Digital, Hunter Water
Oliver Sebastian, Director of IT, Landcom
Luke McCoy, Head of Engineering ANZ, Trellix
- Encouraging an organisation-wide upskilling in cyber security – how can the leadership and IT teams collaborate to achieve this?
- Investing in tailored cyber security awareness programs for your staff
- Implementing KPIs to track cyber security awareness
Jenny Francis, Executive Manager, Digital, Hunter Water
Oliver Sebastian, Director of IT, Landcom
Luke McCoy, Head of Engineering ANZ, Trellix
1:20 pm
Lunch & Networking
2:20 pm
Interactive Roundtable Discussions
Roundtable 1: How is Industry Responding to Government Guidance and Needs in the Context of National and State Level Cyber Security Strategies?
Tony Sheehan, Strategic Advisor and Former Non-Executive Director, Tesserent; Former ASIO Deputy Director General / Former Deputy Secretary, DFAT
Roundtable 2: Getting your Cyber Risk Story Boardroom-Ready
Simon Berglund, Senior Vice President & General Manager, APAC, Diligent
Roundtable 3: Emerging Threat Landscape and Future Preparedness for NSW Government
Ashwin Ram, Evangelist, Office of the CTO, Checkpoint
Roundtable 4: The Imperative in Adopting Zero Trust Architecture
Tim Shaw, Solutions Engineer, Fortra
Roundtable 5: Beyond the Buzzword: The Realities & Practicality of AI in your SOC
Wojtek Woch, Senior Solutions Engineer, Trellix
Roundtable 6: Surfaces and Gaps: Barriers and Solutions for Uniting Government Departments to Effectively Disrupt Cyber Threats
Jane Standish, Director, Digital Government Lead, CyberCX
Roundtable 7: Is Your Code Safe? Understanding Enterprise Best Practices for Addressing Your Cyber Security Posture, Developer Productivity and Technical Talent Retention
Grant Worner, CEO, x-RD
Roundtable 8: Complementing Your Internal Team in the Age of Platform Consolidation and AI
Andrew Philp, ANZ Platform Strategy Director, Trend Micro
Mick McCluney, Field CTO, ANZ, Trend Micro
Roundtable 9: Breaching Government Facilities: Redacted Stories of Physical Intrusions
Craig Dutton, Consultant | OffSec, Sekuro
Roundtable 10: Defining an Extended Detection and Response Strategy – What Does It Mean to Your Organisation?
Simon Howe, Area Vice President, ANZ, ExtraHop
Roundtable 11: The Critical Intersection of Cybersecurity and National Security
Steven Woodhouse, CISO ANZ, Fortinet
Roundtable 12: Discussing the Importance of Cloud Security in 2024 and Beyond
Adrian Noblett, Chief Technology Officer, Saltt Technologies
Jason Duerden, Senior Director, SentinelOne
Roundtable 13: Securing the Future: Navigating the Intersection of Cyber Risk and Compliance
Mone Vines, Security Manager, AC3
Roundtable 14: The Role of Technology in Adapting to Australia’s New Cyber Directives
Sarah Sloan, Head of Government Affairs and Public Policy, ANZ, Palo Alto Networks
3:30 pm
Panel Discussion: Enhancing NSW Cyber Security Governance, Risk Management, and Compliance
David Griffiths, Chief Information Security Officer, Northern Beaches Council
Jon Blackburn, Executive Director Corporate Services and CFO, Sydney Opera House
Simon Berglund - Senior Vice President & General Manager, APAC, Diligent
- Highlighting the uplifting of regulations for cyber security
- Discussing the re-prioritisation of policies
- Making a business case for budgets for training and other enhancements when it comes to cyber security with your executives
- Fostering accountability organisation wide for cyber resilience, and the role technology plays in this
David Griffiths, Chief Information Security Officer, Northern Beaches Council
Jon Blackburn, Executive Director Corporate Services and CFO, Sydney Opera House
Simon Berglund - Senior Vice President & General Manager, APAC, Diligent
4:00 pm
Navigating Australia's New Cyber Directives: Implications and Actions for Your Organisation
4:20 pm
Interstate Keynote: Understanding Data Sharing and its Impacts
- Framework around responsible sharing principles (RSPs)
- Problems and misunderstandings of data ownership, how to share it or who is responsible for protecting it
- The RSPs and other measures designed to address issue
4:40 pm
Closing Remarks
2024 Event Partners
Tesserent
Our mission is to be the cybersecurity provider of choice for the protectionof Australia and New Zealand’s digital assets. Learn More
Cybersecurity, Data Privacy & Governance, Information Technology & Services, Managed Services, Technology Cloud Consulting
Enterprise, Medium
CyberCX
Securing our communities Learn More
Cybersecurity
Enterprise
Trend Micro
Global Leader in Cybersecurity Learn More
Cybersecurity
Enterprise, Female owned, Medium, Small Business
Zscaler
Secure your entire digital experience. Learn More
Business & Digital Transformation, Cloud & Computing, Cybersecurity, Enterprise & IT Solution Architecture
Enterprise
Fortinet
Cybersecurity, Everywhere You Need It. Learn More
Cybersecurity
Enterprise
Sekuro
Building business resilience - enabling fearless innovation. Learn More
Enterprise & IT Solution Architecture, Identity Management, Information Management System, Information Technology & Services, Infrastructure Engineering, IOT (Internet of Things), Managed Services, Professional Services, Security
Enterprise, Medium, Not for Profit, Small Business
Palo Alto Networks
Palo Alto Networks, is the global cybersecurity leader, securing digital transformation in Government and Critical Infrastructure organisation all over the world. Learn More
AI/ML, Business & Digital Transformation, Cybersecurity, Data Privacy & Governance, Devops, DevSecOps, Digital Government & CX, IOT (Internet of Things), Networking, Security
Enterprise, Medium
Trellix
Revolutionary Threat Detection and Response Learn More
AI/ML, Cybersecurity, Information Technology & Services, Software
Enterprise
Abnormal Security
Secure Your Cloud Email Learn More
AI/ML, Cybersecurity
Enterprise
CGI Australia
CGI is among the largest IT and business consulting services firms in the world bringing over 40 years' experience in Australia supporting government and industry. Learn More
Business & Digital Transformation, Cybersecurity, Digital Government & CX, Information Technology & Services, System Integration
Enterprise
Check Point Software Technologies
You Deserve The Best Security Learn More
Cloud & Computing, Cybersecurity, Data Science & Artificial Intelligence Services, DevSecOps, Enterprise & IT Solution Architecture, Information Technology & Services, IOT (Internet of Things), Professional Services, Security, Technology Cloud Consulting
Enterprise
Diligent
Clarify Risk. Elevate Governance. Learn More
Compliance, Cybersecurity, Information Management System, Risk, Software
Enterprise
Checkmarx
Securing The Applications Driving Our World Learn More
Application Management, Cybersecurity, Devops, DevSecOps, Information Technology & Services
Enterprise
ThreatDefence
End-to-End Security Operations and Incident Response Learn More
Cybersecurity
Medium
x-RD
x-RD is an Australian technology company focused on pushing the boundaries with security, automation and AI in secure environments. Learn More
Cloud & Computing, Cybersecurity, DevSecOps, Information Technology & Services, Software Development
Small Business
ExtraHop
ExtraHop is on a mission to reveal cyber risk and build business resilience. Learn More
Cybersecurity, Data Analysis
Enterprise
Fortra
Meet Fortra, Your Cybersecurity Ally. At Fortra, we are bringing positive change to Cybersecurity. Learn More
Advisory, Compliance, Critical Infrastructure, Cybersecurity, Digital Government & CX
B Corporation, Enterprise, Medium, Micro
SailPoint Technologies
The core of enterprise security is identity Learn More
Cybersecurity, Data Privacy & Governance, Data Science & Artificial Intelligence Services, Identity Management, Security
Enterprise
Darktrace
Cybersecurity that learns you Learn More
Cloud & Computing
Enterprise, Medium, Small Business
AC3
AC3, founded in 1999, is an Australian MSP serving 50+ NSW Government entities and 700+ enterprises. Managing over 14,000 virtual machines, our purpose is to make technology real for our clients. Learn More
Cybersecurity, Data Centres, Devops, Managed Services, Security
Enterprise
SALTT Technologies Pty Ltd
Defend The Digital Future Learn More
Cybersecurity
Enterprise
SentinelOne
Secure Tomorrow Learn More
Automation, Cloud & Computing, Cybersecurity, Identity Management, Security
Enterprise
Trusted Impact Pty Ltd
TrustedImpact is a specialised consultancy focused exclusively in cyber security helping clients with tailored, independent, business-focused outcomes leveraging deep cyber experience and expertise. Learn More
Consulting, Cybersecurity, Information Technology & Services, Security
Small Business
Kirra Services
Empowering Indigenous Futures Through Technology, Partnership, and Purpose. Learn More
Audio Visual, Cybersecurity, Information Technology & Services, Procurement, Training & Education
Enterprise, Indigenous owned, Small Business, Social Enterprise
Cydarm Technologies
Secure Case Management for Security Operations Teams Learn More
Automation, Cybersecurity, Information Technology & Services, Software
Enterprise, Medium
CommBox
Do It Better Learn More
Audio Visual, Collaboration, Training & Education
Medium
DekkoSecure
Finally, the totally secure way to share, store and collaborate in the cloud Learn More
Cloud & Computing, Cybersecurity, Data Privacy & Governance, Enterprise Software , Web/SaaS Development
Female owned, Small Business