Loading Events

Agenda

  • Registration

    Arrival Coffee & Tea, Exhibition Showcase

  • CLOUDSEC Welcome Address

    Stephen Parker
    Director & Senior Industry Evangelist
    1 Vision OT

  • +Opening Keynote: Take Control: Empower the People

    Rik Ferguson
    Vice President Security Research
    Trend Micro
    Download Presentation Slides

    Recent news and events give the impression that the world is spinning out of control. The same thing can be said when it comes to technology and cybersecurity. Big data, cloud computing, and developments in mobile and Internet of Things, among others, are also met with unprecedented threats and risks from enterprising cybercriminals and threat actors. Data breaches and online extortion have become the new norm in the threat landscape. This leaves organizations at a constant state of prioritizing the right talent and infrastructure to protect their networks, managing and empowering employees into having a security-savvy mindset, and keeping an eye out on cyber-attacks. This thematic keynote presentation will provide insights on current organizational challenges when it comes to information security and risk management. It will also provide recommendations on how organizations can work past chaotic situations, and it begins by empowering the supposed weakest links—the humans. What better way to empower people than turning them into your best defenders.
  • +Analyst Keynote: Cloud Powers the New Connected Economy

    Michael Barnes
    VP Research Director
    Forrester Research
    Download Presentation Slides

    Digital technologies have empowered your customers and competitors alike. C-level decision makers increasingly understand that optimising traditional IT approaches is not enough to ensure success. In response, organisations are embracing cloud-based solutions as a strategic enabler of connected economies and require a new generation of software to address the security requirements of highly distributed IT infrastructure, which Forrester calls cloud security solutions. Key topics covered include:
    • Increasing agility, improving efficiency, and embracing digital transformation by orchestrating cloud ecosystems to connect employees, customers, partners, vendors, and devices to serve rising customer expectations.

    • Supporting and managing your firms’ inevitable embrace of cloud as a strategic enabler of connected economies.

    • Understanding the role that new cloud security solutions will play in making up for the missing features of perimeter-based security solutions.

  • +Cyber Intelligence Keynote: Quantifying the Threat: A Perspective On the Status and Evolution of Global Cybercrime

    Timothy Wallach
    Supervisory Special Agent Cyber Taskforce
    FBI

    The cybercrime threat is evolving rapidly and every organization regardless of the industry,sector or business vertical will be affected. The goal of the presentation will be to provide the audience with a high level understanding of the current cybercrime threat and attempt to put it into perspective. This presentation will cover such topics as: The roles of government agencies responsible for cybercrime investigations and intelligence collection; International cooperation on cyber crime; The cybercrime threat spectrum differentiating between cyber criminals, nation state actors/threats and insider threats; The intended targeted organizations by cyber threat actors; and recommendations to reduce vulnerability to the cyber threats.
  • Morning Tea & Exhibition

    Networking Break & Exhibition Showcase

  • +Executive Keynote: Business Driven Perspectives on Security

    Dhanya Thakkar
    Vice President
    Trend Micro
    Download Presentation Slides

    In the relentless pursuit of competitive advantage, businesses today are advancing at lightning speed. But IT security must move even faster. Expanding reliance on cloud computing, burgeoning customer demand, and other challenges all putting intense pressure on companies to ensure they’re keeping up with securing their data at every access point. From a security perspective this means a greater attack surface and a much harder to define perimeter. In this hyper connected world where so much sits in the cloud and other business operations are connected through technology, how will you drive innovation, compliance and business efficiency without compromising security. In this Executive Keynote, Dhanya Thakkar Trend Micro’s Vice President for Asia Pacific, discusses how the person most responsible for setting strategy, the CISO, must respond and in today’s enterprise, Risk Management is an art. Intelligence isn’t just tracking bad guys and bad things, it plays a critical role in decision making. To manage risk effectively, we need to understand how people feel about, and react to risk. Dhanya will focus his keynote on demonstrating how organisations ‘operationalise’ their cybersecurity policies with effective tools, processes and people. Finally, Dhanya will also provide his perspective on leadership, what the industry has been doing well and some of the key lessons he has learnt in his 20+ years as a global information security leader.
  • +Panel Discussion: Reality Check: Do We Have What It Takes To Take Control?

    Moderated by Stephen Parker
    Director & Senior Industry Evangelist
    1 Vision OT

    The increasingly personal impact of cyberattacks and cybercrime are just some of the factors organisations need to manage in order to defend their greatest assets: their data. But are businesses really ready to face these challenges? Do they have a clear understanding of the current realities of the security landscape? Do they have the people, the processes and policies, and the tools and knowledge to take control? In this panel discussion, we zero in on real-world factors that drive the numbers game in terms of what causes the most losses and how to prevent them, what contributes to the success of cyber security, and what is the cost of good security versus a poor one.
  • Lunch & Exhibition

    Networking Break & Exhibition Showcase VIP Luncheon Social Wall

    Break networking in exhibition show casing Sponsor Solution Pods
    • +AWS Session: Security and Compliance in the AWS Cloud

      Shiva Narayanaswamy
      Solutions Architect
      Amazon Web Services
      Download Presentation Slides

      Security must be at the forefront for any online business. At AWS, security is priority number one. We will share insights into cloud security and how AWS meets customers’ demanding security and compliance requirements—and in many cases helps them improve their security posture. In this session, you will also get introduced to the range of security tools and features that Amazon Web Services offers, and the latest security innovations coming from Amazon Web Services.

      +Gigamon Session: Rethinking Security

      Ian Farquhar
      Senior Security Solutions Engineer ANZ, Security Virtual Team
      Gigamon
      Download Presentation Slides

      Breaches are not only proliferating to impact every corporation, organisation and citizen, they are also growing in sophistication and frequency. Making headline and impacting on business reputations daily. A rethink about how we secure our IT within the business is needed and we will explore how this can be achieved.

      +Microsoft session: Connecting to Digital Business with Security and Trust

      Ben Gilbert
      Attorney
      Microsoft Australia
      Download Presentation Slides

      Microsoft is leading the way in the Cloud world. Microsoft Cloud services give organizations an enterprise-ready foundation built on industry-leading infrastructure and service operations for private, public or hybrid cloud deployment. Learn how Microsoft delivers a cloud environment organisations can trust, with robust and transparent security, privacy and compliance policies.

      AFTERNOON TEA

      Tea break in Exhibition Show casing Sponsor Solution Pods

      +Tackling Security Challenges in the Hybrid Cloud

      Sasha Pavlovic
      Head of Cloud Security ANZ
      Trend Micro
      Download Presentation Slides

      It’s no secret that Australian organisations have been heavily embracing cloud computing services, transforming the traditional datacentre to a hybrid cloud model.

      While a hybrid environment can reap the benefits of both public and private cloud through the vast array of as-a-Service options available, it can also introduce significant complexities in the way IT security is deployed, managed and most importantly, its effectiveness to protect your digital assets.

      In this session we will explore these challenges in further detail and learn how to apply security controls that are designed and built for the hybrid cloud.

      +The State of Web Defacements and Hacktivism

      Ryan Flores
      Forward Threat Researcher
      Download Presentation Slides

      Website defacements may have become passé, but the number of websites being compromised is still significant. This session will reveal the trends in web defacement and hackavists based on recent research, focusing on attacker hotbeds in East Asia. You will understand the motivations and behaviours of hackers in order to better protect your organisations from potential damage.
    • +VMware Session: Virtualization as the organising framework for Security Innovations

      Brett Drayton
      Senior Security Engineer ANZ
      VMware
      Download Presentation Slides

      As network virtualization transforms networking into a software industry, it gives rise to new technologies and use cases, accelerating innovation throughout the business. How will network virtualization be the bridge between data centre and cloud networking, and what does this mean for your data centre security? Join us to learn how extending the operational model of compute virtualization to the network can achieve greater flexibility while providing a much tighter, fine grained way of securing applications, data and other workloads. You will find out how network virtualization provides a pathway for securing your on premise applications, your containerised applications, and your workloads in public cloud providers.

      +Understanding and Defeating Ransomware

      Eric Skinner
      Vice President Market Strategy
      Trend Micro
      Download Presentation Slides

      Is your organisation well-prepared to fight ransomware? This threat category is growing dramatically over the last twelve months, disrupting business, taxing IT teams and triggering expensive ransom payments. Early generations of ransomware were more easily detected and defeated, in some cases with weak cryptography that enabled easy decryption and cleanup. But ransomware is getting steadily more resilient and dangerous. Lately, ransomware works hard to avoid detection, and the encryption is more robust. Trend Micro’s research teams have even seen ransomware that threatens to publish data on the internet until the ransom is paid, reducing the value of a sound backup strategy.

      This session will cover the evolution of ransomware threats, so that you can better anticipate how an attack might enter your organisation and how it would behave once on a target endpoint or server. Next, the session will propose best practices to reduce the likelihood of a successful ransomware attack, and the effectiveness of various protection and detection techniques that can be used on endpoints, email and web gateways, networks, and servers.

      With a better understanding of the ransomware threat and a clear action plan, you can say no to ransomware!

      +Sumo Logic Session: Disruption in Cloud Security

      Robert De Haan
      CEO
      Layer 8 Security
      Download Presentation Slides

      Robert will speak about the current state of security issues companies are facing in today’s ever changing digital world. What have been the issues? What types of attacks have they faced? Internal and external security challenges companies are facing. He will take a look at new solutions like Sumo Logic and how they differ from traditional SIEM systems. Security information and event management (SIEM) solutions have been around since 2000, and they were developed with the goal of helping organisations in the early detection of targeted attacks and data breaches. Needs cut across analysing event data in real time to the collection, storage and analysis of log data for incident forensics and regulatory compliance. While these solutions hold out tremendous promise, are they failing to deliver?

      Then he will highlight how Sumo Logic is providing for Security use cases including an app that integrates with Trend Micro. Then he will take a look at AirBNB and Anheuser-Busch case studies and how Sumo Logic helped solve complex security use cases.

      AFTERNOON TEA

      Tea break in Exhibition Show casing Sponsor Solution Pods

      +Enabling Cloud Security – It’s More Than Just Ticking a Box

      Puneet Kukreja
      Partner Cyber Advisory
      Deloitte Australia
      Download Presentation Slides

      Cloud and IoT is now in mainstream adoption phase, often being referred to as the fourth revolution.

      The presentation will share experiences from early adopters and focus on challenges that vendors will not share when selling cloud enablement services.

      The effort and areas of focus that are often overlooked when initiating and securing cloud capability within an organisation. The session will commence with a snapshot of how the cloud security market has transformed and advanced over the past few years. The session will then share the learnings from implementation of multiple cloud enablement services, more specifically the challenges from an information security domain. Walk through of experiences of what works and what does not work, learnings and pitfalls that organisations need to be aware of when investing and enabling cloud services.

      The presentation will explain the typical lifecycle of a cloud ecosystem from contract sign to consumption and reporting. It will then discuss methods on how depending on the service being invoked distinct architectural and operational activities are required to enable success. The presentation will end with a model on how to evaluate and govern cloud services within an organisation which will be more than an audit of the cloud service provider for contractual clauses.

      +The Challenges of ‘the cloud’ for a Digital Forensic Investigator and How to Overcome Them

      Nick Klein
      Certified Instructor
      SANS
      Download Presentation Slides

      While cloud services can provide significant benefits to an organisation, they can also create real headaches for digital forensic investigators. Whether you’re investigating theft of confidential material, responding to a suspected network breach or collecting documents and email for legal discovery, cloud services create unique challenges due to limited technical capabilities, weak security models, poor logging, bandwidth restrictions and general loss of control. In this presentation, SANS Certified Instructor and experienced DFIR practitioner Nick Klein will discuss some of these real world challenges and offer practical advice on how to overcome them.

Speakers

Ben Gilbert

Attorney
Microsoft Australia

Brett Drayton

Senior Systems Engineer
VMware Australia & New Zealand

Dhanya Thakkar

Vice President, APAC
Trend Micro

Eric Skinner

Vice President, Market Strategy
Trend Micro

Ian Farquhar

Distinguished Sales Engineer (Worldwide Security Team Lead for the Field)
Gigamon

Michael Barnes

VP Research Director
Forrester

Nick Klein

Certified Instructor
SANS

Puneet Kukreja

Partner
Cyber Advisory Deloitte Australia – CSA

Rik Ferguson

VP Security Research
Trend Micro

Robert De Haan

CEO
Layer 8 Security

Ryan Flores

Senior Manager Future Threat Research
Trend Micro

Sasha Pavlovic

Director, Cloud & Datacenter Security
Asia Pacific at Trend Micro

Shiva Narayanaswamy

Solutions Architect
Amazon Web Services

Stephen Parker

Director and Senior Industry Evangelist
1 Vision OT

Timothy Wallach

Supervisory Special Agent
FBI

Hosted By

Platinum Sponsors

Gold Sponsors

Supporting Organizations

Media Partners