WA Cyber Security Showcase

Full event details


Perth, 13 February 2024

All times in AWST

8:00 am

Registration and Networking

9:00 am

Public Sector Network Opening and Acknowledgement of Country

9:10 am

Welcome from the Chair

Helge Janicke, Deputy CEO and Research Director, CSCRC

9:20 am

Opening Address: An Update on WA’s Cyber Security

Peter Bouhlas, WA Chief Information Security Officer, Office of Digital Government
  • Overall update
  • Security Operations
  • Capability and uplift in WA government
  • Strategy and policy for government

9:40 am

Fireside Chat

Comparing the Cybersecurity Approach of Australia to the EU

Leandros Maglaras, Professor of Cyber Security, Edinburgh Napier University and Helge Janicke, Deputy CEO and Research Director, CSCRC
  • The experiences of NIS and NIS2 implementation in Europe (regulating critical infrastructure)
  • The AU, EU and UK approaches to cybersecurity

10:00 am

Gold Partner

Failure to Plan Opens the Door to Disruption

Natalie Timms, Security Operations and Threat Detection and Response Specialist, Cisco

• Planning and Security Policy blueprints
• How Security Policy maps to the requirements of the WA Government Cyber Security Policy
• Practical methods to aid Security Policy Planning

10:20 am

Panel Discussion

Strategies to Safeguard WA’s Critical Infrastructure

  • Enhancing Cyber Security through industry and government partnerships
  • The greatest threats to the state’s critical infrastructure
  • Initiatives to enhance security and protect vulnerabilities
  • How collaboration boosts resilience and aids in advancing threat detection and response

Demogene Smith, Chief Information Officer, South Metropolitan Health Service
Helen McLeish, Chief Cyber Security Officer, East Metropolitan Health Service
Yusef Denath, Manager Cyber Security, Child and Adolescent Health Service
Neil Barry, WA Regional Manager, Cohesity


11:00 am

Morning Tea and Networking Break

11:30 am

Government Case Study

Government Case Study: Cyber Security Culture in Operational Environments with WA Police

Mark Barratt, Acting Assistant Director – Enterprise Security and Risk, Western Australia Police Force
  • How Cyber Security is different with operational aspects at play
  • What is different when educating operational staff on cyber security
  • What are the future cyber considerations for WA Police

11:50 am

Gold Partner

WA Zero Trust Exchange

Louis Fourie, Sales Engineer – Government/Healthcare/Education, Zscaler
  • Why Zero Trust, current public sector trends and the future
  • Inside the Zero Trust Exchange
  • What will be new for 2024

12:10 pm

Government Keynote

Implementing the WA Cybersecurity Policy: An agency case study - State Government

Tim Evans, Chief Technology Officer, Department of Health, WA
  • The challenges in cyber security for local government
  • What is needed to increase resilience
  • Protecting data and breaches and improving cyber strategies

12:30 pm

Panel Discussion

How a Cyber Partnership has Broader Implications for the State

  • How universities are leading the state in research and solution-planning in cyber security
  • Why partnerships are important and how they can assist in overall cyber uplift
  • What agencies partnerships are critical to improve WA cyber security

Andrew Woodward, Executive Dean – School of Sciences, Edith Cowen University
Miriam Sanchez-Blanco, Chief Technology Officer, City of Stirling
Ryan Menezes, Partner, Scyne Advisory


1:05 pm

Lunch and Networking Break

2:10 pm

Concurrent Roundtables

Roundtable 1: Expanding the WA Government Cyber Security Policy: Requirements for Continuous Incident Detection and Response

• Assessing security operation readiness
• Key components of threat detection and response solutions
• Security Policy Blueprints and threat detection and response readiness
• How to measure success
Natalie Timms
, Security Operations and Threat Detection and Response Specialist, Cisco & David De Lima, Technical Solutions Architect, Cisco

Roundtable 2: Achieve Secure Collaboration in Microsoft 365 within a Zero Trust Architecture

• How to protect your critical data in Microsoft 365
• How to apply Zero Trust principles in a “free and open sharing” environment
• How intelligent reporting can reduce your risk exposure when dealing with sensitive information (such as health records, financial data etc.)
• How to automate policy enforcement and information lifecycle management
Victor Lai, Solution Engineering Manager, AvePoint

Roundtable 3: Responding to Ransomware – Tools to Build Your Threat Defense Architecture

• The rise and the evolution of ransomware attack
• How modern data protection capabilities can enhance an organization’s security posture
• Building a Threat Defence Architecture that brings SecOps and IT Ops together
Walter Bevacqua, Senior Systems Engineer, Cohesity

Roundtable 4: Help, I think we’re being hacked again: Managing the human impacts of detecting and responding to major incidents.
• In recent years, Australia has been elevated in prominence for threat actors seeking inappropriate financial gain from cyber crime and to make a name for themselves, resulting in an ever increasing number of attacks against Australian government departments, agencies, trading entities and corporations. This is placing an ever increasing toll on the cyber and technology teams in these organisations, who are constantly on their toes to identify and respond to these attacks. The outcome is a adverse human impact on our teams and an already constrained cyber workforce.
• This roundtable will focus on learnings from major incidents across the country, on the means to manage the human elements of responding to these. We will look at personal resiliency, fatigue management, information overload and other related factors that can impact your teams, and what strategies you can take away to help improve the human factor for your teams.
Peter Johnson, Partner, Scyne Advisory

3:10 pm

Government Keynote

Securing Critical Infrastructure Hospitals – People, Processes and Technology

Trevlyn Farrar, Manager Information Security, South Metropolitan Health Service
  • An introduction to cyber attacks on medical devices in healthcare
  • A People, Process and Technology approach to securing healthcare organisations like hospitals

3:30 pm

Government Keynote

Cyber Security Capability and Uplift - Lessons Learnt from the Trenches

Peter Gigengack, Director Cyber Security, Office of Digital Government
  • Common security issues seen in our engagements across the sector
  • The importance of government collaboration and leveraging expertise within it
  • How your security program can maximise resources available to the sector

3:50 pm

Closing Remarks

4:00 pm

Event Close