Speaking:
Fellow and National Treasurer, ACS
Speaking:
Executive Dean, School of Science, Edith Cowan University and Acting Director, ECU Security Research Institute
April 28 | 09:00 - 09:25
When a threat actor broke into the network of Sitel, it could have been a good story for Okta. Our preventative and detective controls frustrated and inhibited the threat actor. But our response to the incident was stunted. APJ CSO Brett Winterford talks through the processes that - with the benefit of hindsight - should have turned this “near miss” into a non-event.
Speaking:
Regional CISO, Okta
April 28 | 09:25 - 09:50
When a threat actor broke into the network of Sitel, it could have been a good story for Okta. Our preventative and detective controls frustrated and inhibited the threat actor. But our response to the incident was stunted. APJ CSO Brett Winterford talks through the processes that - with the benefit of hindsight - should have turned this “near miss” into a non-event.
Speaking:
Global Head of Information Security, Navitas
April 28 | 10:45 - 11:10
Microsoft’s Active Directory (AD) is the foundation for most organisation’s identity and access control system. Staff log in to their workstations and applications using AD, and their access to applications and other resources is usually controlled through AD group memberships.
For most organisations, AD “just works” and is considered part of the infrastructure. However - now that you have opened your networks to the cloud, remote workers, and the public internet in general, threat actors are targeting your AD for reconnaissance, lateral movement, credential theft and as the primary way to gain complete dominance over your network. In this talk, Gil Kirkpatrick will outline some of the ways attackers target AD and how you can apply the NIST Cybersecurity Framework to improve AD security, detect attacks, and recover quickly from a cyber disaster.
Speaking:
Chief Architect, Semperis
April 28 | 11:10 - 11:35
Microsoft’s Active Directory (AD) is the foundation for most organisation’s identity and access control system. Staff log in to their workstations and applications using AD, and their access to applications and other resources is usually controlled through AD group memberships.
For most organisations, AD “just works” and is considered part of the infrastructure. However - now that you have opened your networks to the cloud, remote workers, and the public internet in general, threat actors are targeting your AD for reconnaissance, lateral movement, credential theft and as the primary way to gain complete dominance over your network. In this talk, Gil Kirkpatrick will outline some of the ways attackers target AD and how you can apply the NIST Cybersecurity Framework to improve AD security, detect attacks, and recover quickly from a cyber disaster.
“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” Sun Tzu
Speaking:
Cybersecurity Operations Manager, Woodside Energy
April 28 | 11:35 - 12:00
“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” Sun Tzu
Open-source libraries have become an essential part of almost all modern applications. Without open-source, software development would be stuck in the slow lane. Not “reinventing the wheel” each time you need certain functionality in an app saves you time and effort, and as a result, open-source isn’t going away anytime soon. If anything, it’s becoming more and more widespread. But there’s a certain amount of risk that comes with using open-source components, modules and libraries. Today, it’s increasingly important to protect yourself from these risks.
In this presentation, we will discuss the importance and prevalence of open-source software as well as the ways you can protect yourself from its attendant risks and licensing issues. The goal is to catch issues early before they can become fatal.
Speaking:
Regional Director, ANZ, Checkmarx
April 28 | 12:00 - 12:25
Open-source libraries have become an essential part of almost all modern applications. Without open-source, software development would be stuck in the slow lane. Not “reinventing the wheel” each time you need certain functionality in an app saves you time and effort, and as a result, open-source isn’t going away anytime soon. If anything, it’s becoming more and more widespread. But there’s a certain amount of risk that comes with using open-source components, modules and libraries. Today, it’s increasingly important to protect yourself from these risks.
In this presentation, we will discuss the importance and prevalence of open-source software as well as the ways you can protect yourself from its attendant risks and licensing issues. The goal is to catch issues early before they can become fatal.
During this discussion, you’ll learn about how to support career transitions to InfoSec & Cyber, from other professions. Explore how diversified skills and capabilities acquired in other professions can be used to strengthen your workforce strategy and fill roles. These inspiring journeys shared by the panelists will include their insights into what hiring managers and talent acquisition teams can do to support career transitioners. You’ll also hear real-life experiences on how to plan and prepare for a career transition.
Speaking:
Security Training Manager, Atlassian and Perth Chapter Lead, AWSN
Pentester, Bunnings
Security Analyst, REA Group
Perth Chapter Lead, AWSN
Perth Chapter Lead, AWSN
April 28 | 12:25 - 13:00
During this discussion, you’ll learn about how to support career transitions to InfoSec & Cyber, from other professions. Explore how diversified skills and capabilities acquired in other professions can be used to strengthen your workforce strategy and fill roles. These inspiring journeys shared by the panelists will include their insights into what hiring managers and talent acquisition teams can do to support career transitioners. You’ll also hear real-life experiences on how to plan and prepare for a career transition.
Speaking:
Head of Cyber Security, Western Power
April 28 | 14:10 - 14:45
Sophisticated hackers are often attacking silently, making it harder for organisations to realise that they’ve suffered a breach. Ensuring your company has an effective threat management strategy is critical, but how you manage the team during a crisis to respond to and recover from events is even more important. During this session, we will explore best-in-class ways to implement successful detection, response and recovery plans.
Speaking:
Senior Manager, Penetration Testing, CommBank
Cyber and Information Security Officer, Horizon Power
April 28 | 14:10 - 14:45
Sophisticated hackers are often attacking silently, making it harder for organisations to realise that they’ve suffered a breach. Ensuring your company has an effective threat management strategy is critical, but how you manage the team during a crisis to respond to and recover from events is even more important. During this session, we will explore best-in-class ways to implement successful detection, response and recovery plans.
With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Darktrace’s Jarryd Pagonis, Regional Director in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios
Speaking:
Regional Director, Darktrace
April 28 | 14:45 - 15:20
With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Darktrace’s Jarryd Pagonis, Regional Director in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios
During this session, we’ll discuss how the implementation of a Zero Trust architecture can impact the organisation’s operating model, and what are the considerations of these strategies into your future and targeted operating model.
Speaking:
Information Security & Industry Compliance Manager, Australian Payments Network
Executive Dean, School of Science, Edith Cowan University and Acting Director, ECU Security Research Institute
April 28 | 14:45 - 15:20
During this session, we’ll discuss how the implementation of a Zero Trust architecture can impact the organisation’s operating model, and what are the considerations of these strategies into your future and targeted operating model.
Our increasing reliance on data creates a variety of data governance challenges. During this session, we’ll explore cases studies and common scenarios to address the security issues presented by data governance and AI.
Speaking:
Senior Manager Data Governance, Beyond Bank
April 28 | 15:20 - 15:55
Our increasing reliance on data creates a variety of data governance challenges. During this session, we’ll explore cases studies and common scenarios to address the security issues presented by data governance and AI.
As operational technology (OT) becomes more connected, the growing number of devices and endpoints offer a larger attack surface and create more vulnerabilities. Securing this space is no easy task but there is an opportunity to go beyond minimum compliance requirements and improve your overall security posture.
Speaking:
Risk Business Partner, Rio Tinto
Cyber Security Lead, Arc Infrastructure
April 28 | 15:20 - 15:55
As operational technology (OT) becomes more connected, the growing number of devices and endpoints offer a larger attack surface and create more vulnerabilities. Securing this space is no easy task but there is an opportunity to go beyond minimum compliance requirements and improve your overall security posture.
During this session, we’ll explore the diversity and inclusion challenges facing the Australian cybersecurity community, and how that can be the answer to drive cultural change, fill the talent gap and achieve your organisation’s cybersecurity goals.
Speaking:
Director, WA AustCyber Innovation Hub
April 28 | 16:25 - 16:40
During this session, we’ll explore the diversity and inclusion challenges facing the Australian cybersecurity community, and how that can be the answer to drive cultural change, fill the talent gap and achieve your organisation’s cybersecurity goals.
Speaking:
Country Manager, ANZ, Abnormal Security
Speaking:
Director, WA AustCyber Innovation Hub
CISO, Western Australia Police Force
Chief Security Officer, Silver Chain Group
April 28 | 16:55 - 17:30
The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.
All registrations are subject to final approval.
10% GST will be applied upon registration. All prices quoted are exclusive of GST.
Please note: No additional discounts can be applied on top of existing special offers or discounts.
Vendor prices apply to any delegate from a company providing technology or services to end-user companies. Contractors who are attending on behalf of end users are expected to register as vendors. Any vendor / solution provider company that registers at the end-user rate will automatically be charged at the vendor rate. Completing this registration form means you agree to this condition of registration.
As soon as we have processed your registration, we will email you confirmation. We look forward to seeing you at the conference.
For any questions concerning your registration, please email us at info@coriniumintel.com
Payment terms
Payment is due in full upon completion and on submission of this registration form. By returning this registration form you agree to Corinium issuing an invoice or charging your credit card for the amount stated above and you agree to pay Corinium the price in order to secure your conference package. Your registration will not be confirmed until payment has been made by credit card or cleared funds are received in full. Admission to the conference will be refused if payment has not been received. All payments will be issued with a receipt and the delegate is liable to pay any necessary taxes and service fees where applicable.
Cancellation and substitution policy
Cancellations must be received in writing and we do not offer refunds once payment has been made. If the cancellation is received more than 14 days before the conference, attendees will receive a full credit to a future conference. Cancellations received 14 days or less (including the fourteenth day) prior to the conference will be liable for the full fee. A substitution from the same organisation can be made at any time in writing at no extra charge. In the event that Corinium Global Intelligence cancels a conference, payments received at the cancellation date will be credited towards attendance at a future conference or in the event of postponement by Corinium Global Intelligence, towards the rescheduled date. Credit notes remain valid for twelve months
Changes to conference and agenda
Corinium Global Intelligence reserves the right to postpone or cancel an event, to change the location or alter the advertised speakers for an event.
Corinium Global Intelligence is not responsible for any loss or damage as a result of substitution, alteration, postponement or cancellation of an event due to causes beyond its control including without limitation, acts of God, natural disasters, sabotage, accident, trade or industrial disputes, terrorism or hostilities. In the event that a conference is cancelled, Corinium Global Intelligence is not liable for any costs incurred by delegates in connection with their attendance.
Occasionally it is necessary for reasons beyond our control to alter the content and timing of the programme, venue or the identity of the speakers without any liability to the delegates. Changes to the agenda will be updated on our website as soon as possible.
Disclosure of your information.
You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including: Business partners, suppliers and sub-contractors for the performance of any contract we enter into with either them or you.
Professional organisations involved in the provision of services for the event contracted for. Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing info@coriniumintel.com.
Data protection
The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at info@coriniumintel.com
Please refer to our Privacy Policy for further details.