Victorian Cyber Security Showcase
Agenda
Albert Park, 23 July 2024
All times in AEST
8:00 am
Registration and Networking
9:00 am
Acknowledgement of Country and PSN Welcome
9:10 am
Welcome from Event Chair
9:30 am
Government Keynote: Cybersecurity Landscape: The Year Ahead
- The biggest threats facing government agencies
- How the global threat landscape impacts Victoria
- What’s next – future strategy and actions
9:50 am
A Compelling and Practical Guide for VIC Government Agencies to Turn Their Security Budget Constraints into Cyber Resilience
Our budgets are static or reducing and our 3rd party costs increasing 1.5x to 2x”, this was a quote from a CIO panel at a recent industry event. We see this effect in industry research that reveals 65% of organisations pursuing or planning to pursue security consolidation to improve their overall risk posture and reduce Total Cost of Ownership (TCO).
This session will cover key drivers enforcing a need for this approach including how to capitalise on existing whole of government license agreements. In the face of swift technological innovation and growing attack surface at a rapid rate, Andrew will take you through a quantified risk management that will enable you to better understand your organisational cyber risk level, effectively communicate to the board, and orchestrate risk mitigation – presenting measurable business outcomes from your security investments.
10:10 am
Panel Discussion: Information Sharing Initiatives to Enhance Cyber Threat Intelligence in Victorian Government
- Sharing safely to increase collaboration
- How cyber threat intelligence improves response
- New initiatives to improve dissemination
Philip Wales, Domain Security Architect, Security, Information and Privacy Division, Victoria Police
Cindy Tarczon, Senior Manager, Cyber Incident Response, Department of Government Services
Murtaza Masood, Managing Director, State & Local Government, Box
10:40 am
Morning Tea and Networking
11:20 am
Welcome from Stream Chair
11:20 am
Welcome from Stream Chair
11:30 am
Keynote: Digital Government Initiatives: Balancing Innovation with Security in Victoria
- Innovation Labs: Promote innovation in a secure environment
- Guardrails: Security capabilities for fast-tracking cloud migrations
- Security paradigm shift to enable innovation
11:30 am
Keynote: Ransomware Resilience and Lessons Learned from Recent Attacks in Victoria
- Why ransomware attacks remain such a prominent threat
- What can the past teach us
- Response to recent breaches – how can we improve
11:50 am
Unpacking Supply Chain Risks: A Procurer's Guide to Technology Acquisitions
In an era where technology is the backbone of every operation, understanding and mitigating supply chain risks in the ICT sector is crucial. This presentation dives deep into the complexities of supply chain vulnerabilities, offering a comprehensive guide for procurers navigating the tech landscape. Attendees will learn key considerations for purchasing ICT products, essential questions to pose to technology partners, and gain insights into the latest government policies shaping the sector. Equip yourself with the knowledge to make informed decisions and safeguard your technology investments against potential disruptions.
11:50 am
Cyber Security is National Security
Understanding the geo-political and the legislative environment, and how this is driving government and business response to cyber security.
12:10 pm
Fireside Chat: Next-Gen Technologies: Shaping the Future of Victorian Government Cybersecurity
- The latest methods to detect and mitigate cyber threats
- Securing data with technology
- Enhancing identity management and access control
12:10 pm
Panel Discussion: Evolving Threat Landscape: Future Cybersecurity Risks in Victoria
- The evolving threat landscape – what poses the greatest risks?
- How can Victorian government agencies work together against more sophisticated attacks?
- What are potential issues moving forward?
Maxine Harrison, Chief Information Security Officer, DEECA
Michael Wenn, Lead Enterprise Security and DevSecOps, Greater Western Water
Ilsa Shaw, Enterprise Account Executive, Rubrik
12:40 pm
Cybersecurity as a data problem
Innovation can drive complexity for cyber security. If we were to look simply at this problem, we would likely see data as the foundation of our security complexity. As cybersecurity threats intensify, the volume and complexity of data that organisations need to process have grown exponentially.
In simple terms we need to protect data, use data for detection and response, make decisions based on what data tells us whilst holding data to demonstrate our compliance to reporting frameworks.
In this talk, Ash will outline how we can better understand and use our security data to help achieve technology innovation outcomes securely.
12:40 pm
Partner Perspective: Presented by Sekuro
1:00 pm
Panel Discussion: Focusing on the Human Element in Cyber Security
- Team training for all government workers
- Creating a cyber aware culture
- Looking after our Human defenders
Antoine Acklin, Manager Organisational Technology, Whitehorse City Council
Sophia Kakavoules, Cyber Culture and Engagement Lead, Department of Government Services
Adam Bevilacqua, Cyber Security Advisor, eHealth Cybersecurity and Assurance, Department of Health
Peter Johnson, Partner, Scyne Advisory
1:00 pm
Keynote: How to manage a complex data breach
1:20 pm
Lunch & Networking
2:30 pm
Interactive Roundtable Discussions
Roundtable 1: How is Industry responding to Government guidance and needs in the context of National and State level cyber security strategies?
Tony Sheehan, Strategic Advisor and Former Non-Executive Director, Tesserent; Former ASIO Deputy Director General / Former Deputy Secretary, DFAT
Roundtable 2: Top 10 things you should do before the IR cavalry arrives
Max Jeffries, Incident Response Specialist, Scyne Advisory & Lewis Ingram, Incident Response Specialist, Scyne Advisory
Roundtable 3: Surfaces and Gaps: Barriers and solutions for uniting government departments to effectively disrupt cyber threats
Jane Standish, Director – Digital Government Lead, CyberCX
Roundtable 4: Understanding the difference between being Cyber Secure and Cyber Resilient
Dave Young, Director, 11:11 Systems APAC
Roundtable 5: The Future of Citizen Identity – Building Trust BY Enhancing Security
Punnen Syriac, Partner, Cyber – Digital Trust, Deloitte
Roundtable 6: Securing Remote Workforces: BYOD and Contractor Integration Strategies
Luke Jarmin, Systems Engineer, Government ANZ, Palo Alto Networks
Roundtable 7: Defining an XDR Strategy – What Does It Mean To Your Organisation?
Sachin Sohani, Regional Sales Manager, ExtraHop
Roundtable 8: From Defence to Enablement: Cybersecurity the Business Enabler
Steven Woodhouse, CISO ANZ, Fortinet
Roundtable 9: The Essential Eight & The Modern Threat Landscape
Steven Baker, Regional Director, Rubrik
Brett Philp, Enterprise Account Executive, Rubrik
Roundtable 10: AI-powered cybersecurity operations and the integration of GRC
Ash Smith, Technology Strategist, ANZ – CrowdStrike
Roundtable 11: Leveraging the Power of AI to Turn Security Budget Constraints into Cyber Resilience
Andrew Philp, ANZ Platform Strategy Director, Trend Micro
Roundtable 12: Evolving your security posture with Risk Based Vulnerability Management
Nathan Wenzler, Chief Security Strategist, Tenable
Roundtable 13: Consolidating Network and Security Capabilities onto a Single SASE Platform
Hamish Thompson, Senior Technology Specialist, Netskope
Ravi Chandar, Regional Sales Director, Public Sector, Netskope
Roundtable 14: Breaching Government Facilities: Redacted Stories of Physical Intrusions
Craig Dutton, Offensive Security Consultant, Sekuro
James Vercillo, Southern Region Sales Director, Sekuro
Roundtable 15: Mitigating Threats from Third Parties: Addressing the Modern Challenges
Anthony Panuccio, Regional VP APAC, Process unity
3:40 pm
Fireside Chat: Developing and Delivering a Successful Cyber Strategy
- Conducting comprehensive risk assessments to prioritize vulnerable areas
- Establishing clear goals and objectives aligned with organisational priorities
- Continuously evaluating and updating your strategy
4:00 pm
Partner Perspective: Rethinking Perimeter Security - State of the Nation and the need for Zero Trust
- Overview of the current threat landscape
- Why VPNs pose security risks
- The need for Zero Trust Architecture in Government
- How Zero Trust delivers security benefits and cost savings
4:20 pm
Panel Discussion: The Government’s Role in Protecting the Community
- Evolving roles within cyber teams to protect citizen data
- Community expectations and communication
- Expectations of government organisations
Anique Owen, Assistant Commissioner, Privacy Guidance and Dispute Resolution, Office of the Victorian Information Commissioner
Timothy McKinney, Detective Superintendent, Crime Command, Victoria Police
Justin Bree, CIO, Department of Justice and Community Safety
4:50 pm
Closing Remarks from Event Chair
5:00 pm
Drinks & Networking
2024 Event Partners
![](https://publicsectornetwork.com/wp-content/uploads/2023/02/Victoria-State-Government-logo-blue-PMS-2945.png)
![](https://publicsectornetwork.com/wp-content/uploads/2023/02/Cenitex-Logo-Full-Colour-Positive.png)
![Logo of Tesserent](https://cdn.publicsectornetwork.com/Tesserent-Thales-Logo-Horizontal-Positive-RGB_ce0fb7.png)
![Logo of Tesserent](https://cdn.publicsectornetwork.com/Tesserent-Thales-Logo-Horizontal-Positive-RGB_ce0fb7.png)
Tesserent
Our mission is to be the cybersecurity provider of choice for the protectionof Australia and New Zealand’s digital assets. Learn More
Cybersecurity, Data Privacy & Governance, Information Technology & Services, Managed Services, Technology Cloud Consulting
Enterprise, Medium
![Logo of CyberCX](https://cdn.publicsectornetwork.com/CyberCX_logo_JPEG_updated_4c616d.jpg)
Cybersecurity
Enterprise
Deloitte Australia
We help clients navigate the complexities and challenges of a rapidly changing world through services that create value and drive innovation, productivity and sustainable growth. Learn More
Advisory, Cybersecurity, Data Privacy & Governance, Information Technology & Services, Technology Cloud Consulting
Enterprise
![Logo of Trend Micro](https://cdn.publicsectornetwork.com/TM_Logo_Primary_2c_1200x255_cb6fb6.png)
Cybersecurity
Enterprise, Female owned, Medium, Small Business
![Logo of Zscaler](https://cdn.publicsectornetwork.com/Screenshot_2023-05-08_at_10.55.30_am_035bb9.png)
Business & Digital Transformation, Cloud & Computing, Cybersecurity, Enterprise & IT Solution Architecture
Enterprise
![Logo of Fortinet](https://cdn.publicsectornetwork.com/Fortinet_Logo_Black-Red_4_a41075.jpg)
Cybersecurity
Enterprise, Medium
![Logo of Sekuro](https://cdn.publicsectornetwork.com/Sekuro_Logo_H_RGB_black_c6d1a8.png)
Enterprise & IT Solution Architecture, Identity Management, Information Management System, Information Technology & Services, Infrastructure Engineering, IOT (Internet of Things), Managed Services, Professional Services, Security
Enterprise, Medium, Not for Profit, Small Business
![Logo of CrowdStrike](https://cdn.publicsectornetwork.com/CS_Logo_2022_Stacked_Full-Red_RGB_7e591d.png)
Automation, Cloud & Computing, Cybersecurity, Identity Management, Information Technology & Services
Enterprise, Medium
![Logo of Palo Alto Networks](https://cdn.publicsectornetwork.com/PANW_Parent_Brand_Primary_Logo_RGB_4fb2d9.png)
![Logo of Palo Alto Networks](https://cdn.publicsectornetwork.com/PANW_Parent_Brand_Primary_Logo_RGB_4fb2d9.png)
Palo Alto Networks
Palo Alto Networks, is the global cybersecurity leader, securing digital transformation in Government and Critical Infrastructure organisation all over the world. Learn More
AI/ML, Business & Digital Transformation, Cybersecurity, Data Privacy & Governance, Devops, DevSecOps, Digital Government & CX, IOT (Internet of Things), Networking, Security
Enterprise, Medium
![Logo of Scyne Advisory](https://cdn.publicsectornetwork.com/Scyne_Brandmark_RGB_White_Rev_72_1_e665c1.jpg)
Advisory, Business & Digital Transformation, Change Management, Cybersecurity, Government Administration
Medium
![Logo of Rubrik](https://cdn.publicsectornetwork.com/LOGO_rubrik_public_sector_horizontal_primary_b61795.png)
![Logo of Rubrik](https://cdn.publicsectornetwork.com/LOGO_rubrik_public_sector_horizontal_primary_b61795.png)
Rubrik
[Don’t fight today’s cyberwar with a switchblade.] Keep your data safe with data security that’ll keep it from being deleted, encrypted, or compromised. Learn More
Cloud & Computing, Compliance, Cybersecurity, Data Privacy & Governance, Information Technology & Services, Risk, Security, Software
Enterprise, Medium, Not for Profit
![Logo of Box](https://cdn.publicsectornetwork.com/Box_Logo_Blue_0061D5_2b8065.png)
![Logo of Box](https://cdn.publicsectornetwork.com/Box_Logo_Blue_0061D5_2b8065.png)
Box
The leading Content Cloud, a platform empowering organisations to manage the entire content lifecycle, work securely from anywhere, and integrate across best-of-breed apps Learn More
Business & Digital Transformation, Cloud & Computing, Collaboration, Cybersecurity, Data Privacy & Governance, Data Science & Artificial Intelligence Services, Digital Signatures, Document Management, Enterprise & IT Solution Architecture, Information Technology & Services
Enterprise, Medium, Micro, Not for Profit, PSN Advisor, Small Business
![Logo of Netskope](https://cdn.publicsectornetwork.com/2021-04-Netskope_Primary-Full_Color-500-RGB_1_2b7136.jpg)
![Logo of Netskope](https://cdn.publicsectornetwork.com/2021-04-Netskope_Primary-Full_Color-500-RGB_1_2b7136.jpg)
Netskope
Netskope, a global SASE leader, helps organisations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. Learn More
AI/ML, Cloud & Computing, Information Technology & Services, Security
Enterprise
![Logo of 11:11 Systems](https://cdn.publicsectornetwork.com/logo_e1bbd5.jpg)
Cloud & Computing
Enterprise, Medium, Micro, Small Business
![Logo of ExtraHop](https://cdn.publicsectornetwork.com/EH-logo-200x200_v2_4d4cee.jpg)
Cybersecurity, Data Analysis
Enterprise
![Logo of Tenable](https://cdn.publicsectornetwork.com/tenable_logo.png)
![Logo of Tenable](https://cdn.publicsectornetwork.com/tenable_logo.png)
Tenable
With Tenable One, you can now translate technical asset, vulnerability and threat data into clear business insights and actionable intelligence for security executives. Learn More
Cloud & Computing, Cybersecurity, IOT (Internet of Things), Security
Enterprise
![Logo of Sparx Solutions Pty Ltd](https://cdn.publicsectornetwork.com/Sparx_Process_Unity_Logo1_33c6a8.jpg)
![Logo of Sparx Solutions Pty Ltd](https://cdn.publicsectornetwork.com/Sparx_Process_Unity_Logo1_33c6a8.jpg)
Sparx Solutions Pty Ltd
Sparx Solutions is a leading provider of IT infrastructure solutions to medium and large organisations. Our vision is to empower our customers with knowledge and solutions to meet their objectives. Learn More
Business & Digital Transformation, Cloud & Computing, Cybersecurity, Enterprise & IT Solution Architecture, Information Technology & Services
Enterprise, Medium, Not for Profit
![Logo of Trellix](https://cdn.publicsectornetwork.com/Trellix_LOGO_Color_Graphite_7a68af.png)
AI/ML, Cybersecurity, Information Technology & Services, Software
Enterprise
![Logo of Abnormal Security](https://cdn.publicsectornetwork.com/Abnormal-logo-black_2_f63484.jpg)
AI/ML, Cybersecurity
Enterprise
![Logo of Phriendly Phishing](https://cdn.publicsectornetwork.com/PP_LOGO_RGB_Colour_Dark__d89e68.jpg)
![Logo of Phriendly Phishing](https://cdn.publicsectornetwork.com/PP_LOGO_RGB_Colour_Dark__d89e68.jpg)
Phriendly Phishing
Cyber security awareness training and phishing simulation solution that educates and empowers your people. Learn More
Cybersecurity
Medium
![Logo of Checkmarx](https://cdn.publicsectornetwork.com/Checkmarx_Logo_-_CMYK_Blue_1a3447.png)
Application Management, Cybersecurity, Devops, DevSecOps, Information Technology & Services
Enterprise
![Logo of ThreatLocker](https://cdn.publicsectornetwork.com/ThreatLocker__Mobile_App_Logo_Stacked_500x500_abe7d0.png)
Cybersecurity
Enterprise
![Logo of AC3](https://cdn.publicsectornetwork.com/AC3_Web_19.webp)
![Logo of AC3](https://cdn.publicsectornetwork.com/AC3_Web_19.webp)
AC3
AC3 is a privately owned Australian ICT Managed Services Provider (MSP). Founded in 1999, Our purpose is to make technology real and we do this for over 50 of NSW State Government and over 700 enterprise customers, with over 14.000... Learn More
Cybersecurity, Data Centres, Data Management, Devops, DevSecOps, Enterprise & IT Solution Architecture, Information Technology & Services, Managed Services, Professional Services, Security
Enterprise
![Logo of Airlock Digital](https://cdn.publicsectornetwork.com/AIRLOCK_LOGO_COLOUR_25788d.png)
Application Management, Cybersecurity, Data Privacy & Governance, Security
Small Business
![Logo of Akamai Technologies](https://cdn.publicsectornetwork.com/Akamai_Logo_no-tagline_Full-Color_RGB_1_8c2cd5.jpg)
Cloud & Computing, Cybersecurity
Enterprise
![Logo of Logicalis Australia](https://cdn.publicsectornetwork.com/Logicalis_2019_CMYK_860b83.jpg)
Business & Digital Transformation, Cloud & Computing, Compliance, Cybersecurity, Data Privacy & Governance, Data Science & Artificial Intelligence Services, Digital Government & CX, Enterprise & IT Solution Architecture, Managed Services, System Integration
Enterprise, Medium
![Logo of Phronesis Security](https://cdn.publicsectornetwork.com/Phronesislogo_4f2aae.png)
Consulting, Critical Infrastructure, Cybersecurity, Data Privacy & Governance, Information Technology & Services
Micro, Small Business
![Logo of DekkoSecure](https://cdn.publicsectornetwork.com/DekkoSecure_Night_14x_83867a.png)
Cloud & Computing, Cybersecurity, Data Privacy & Governance, Enterprise Software , Web/SaaS Development
Female owned, Small Business
![Logo of Macquarie Government](https://cdn.publicsectornetwork.com/Macquarie-Government-RGB-Col-Positive.png)
![Logo of Macquarie Government](https://cdn.publicsectornetwork.com/Macquarie-Government-RGB-Col-Positive.png)
Macquarie Government
As part of the ASX-listed Macquarie Technology Group, Macquarie Government protects agencies with managed cyber security services including detection and response, secured internet and cloud. Learn More
Cybersecurity, Data Centres, Information Technology & Services
Enterprise