Arrival Coffee & Tea, Exhibition Showcase
Director & Senior Industry Evangelist
1 Vision OT
Vice President Security Research
Download Presentation SlidesRecent news and events give the impression that the world is spinning out of control. The same thing can be said when it comes to technology and cybersecurity. Big data, cloud computing, and developments in mobile and Internet of Things, among others, are also met with unprecedented threats and risks from enterprising cybercriminals and threat actors. Data breaches and online extortion have become the new norm in the threat landscape. This leaves organizations at a constant state of prioritizing the right talent and infrastructure to protect their networks, managing and empowering employees into having a security-savvy mindset, and keeping an eye out on cyber-attacks. This thematic keynote presentation will provide insights on current organizational challenges when it comes to information security and risk management. It will also provide recommendations on how organizations can work past chaotic situations, and it begins by empowering the supposed weakest links—the humans. What better way to empower people than turning them into your best defenders.
VP Research Director
Download Presentation SlidesDigital technologies have empowered your customers and competitors alike. C-level decision makers increasingly understand that optimising traditional IT approaches is not enough to ensure success. In response, organisations are embracing cloud-based solutions as a strategic enabler of connected economies and require a new generation of software to address the security requirements of highly distributed IT infrastructure, which Forrester calls cloud security solutions. Key topics covered include:
• Increasing agility, improving efficiency, and embracing digital transformation by orchestrating cloud ecosystems to connect employees, customers, partners, vendors, and devices to serve rising customer expectations.
• Supporting and managing your firms’ inevitable embrace of cloud as a strategic enabler of connected economies.
• Understanding the role that new cloud security solutions will play in making up for the missing features of perimeter-based security solutions.
–+Cyber Intelligence Keynote: Quantifying the Threat: A Perspective On the Status and Evolution of Global Cybercrime
Supervisory Special Agent Cyber Taskforce
FBIThe cybercrime threat is evolving rapidly and every organization regardless of the industry,sector or business vertical will be affected. The goal of the presentation will be to provide the audience with a high level understanding of the current cybercrime threat and attempt to put it into perspective. This presentation will cover such topics as: The roles of government agencies responsible for cybercrime investigations and intelligence collection; International cooperation on cyber crime; The cybercrime threat spectrum differentiating between cyber criminals, nation state actors/threats and insider threats; The intended targeted organizations by cyber threat actors; and recommendations to reduce vulnerability to the cyber threats.
Networking Break & Exhibition Showcase
Download Presentation SlidesIn the relentless pursuit of competitive advantage, businesses today are advancing at lightning speed. But IT security must move even faster. Expanding reliance on cloud computing, burgeoning customer demand, and other challenges all putting intense pressure on companies to ensure they’re keeping up with securing their data at every access point. From a security perspective this means a greater attack surface and a much harder to define perimeter. In this hyper connected world where so much sits in the cloud and other business operations are connected through technology, how will you drive innovation, compliance and business efficiency without compromising security. In this Executive Keynote, Dhanya Thakkar Trend Micro’s Vice President for Asia Pacific, discusses how the person most responsible for setting strategy, the CISO, must respond and in today’s enterprise, Risk Management is an art. Intelligence isn’t just tracking bad guys and bad things, it plays a critical role in decision making. To manage risk effectively, we need to understand how people feel about, and react to risk. Dhanya will focus his keynote on demonstrating how organisations ‘operationalise’ their cybersecurity policies with effective tools, processes and people. Finally, Dhanya will also provide his perspective on leadership, what the industry has been doing well and some of the key lessons he has learnt in his 20+ years as a global information security leader.
Moderated by Stephen Parker
Director & Senior Industry Evangelist
1 Vision OTThe increasingly personal impact of cyberattacks and cybercrime are just some of the factors organisations need to manage in order to defend their greatest assets: their data. But are businesses really ready to face these challenges? Do they have a clear understanding of the current realities of the security landscape? Do they have the people, the processes and policies, and the tools and knowledge to take control? In this panel discussion, we zero in on real-world factors that drive the numbers game in terms of what causes the most losses and how to prevent them, what contributes to the success of cyber security, and what is the cost of good security versus a poor one.
Networking Break & Exhibition Showcase VIP Luncheon Social WallBreak networking in exhibition show casing Sponsor Solution Pods
Amazon Web Services
Download Presentation Slides
Security must be at the forefront for any online business. At AWS, security is priority number one. We will share insights into cloud security and how AWS meets customers’ demanding security and compliance requirements—and in many cases helps them improve their security posture. In this session, you will also get introduced to the range of security tools and features that Amazon Web Services offers, and the latest security innovations coming from Amazon Web Services.
Senior Security Solutions Engineer ANZ, Security Virtual Team
Download Presentation SlidesBreaches are not only proliferating to impact every corporation, organisation and citizen, they are also growing in sophistication and frequency. Making headline and impacting on business reputations daily. A rethink about how we secure our IT within the business is needed and we will explore how this can be achieved.
Download Presentation SlidesMicrosoft is leading the way in the Cloud world. Microsoft Cloud services give organizations an enterprise-ready foundation built on industry-leading infrastructure and service operations for private, public or hybrid cloud deployment. Learn how Microsoft delivers a cloud environment organisations can trust, with robust and transparent security, privacy and compliance policies.
Head of Cloud Security ANZ
Download Presentation SlidesIt’s no secret that Australian organisations have been heavily embracing cloud computing services, transforming the traditional datacentre to a hybrid cloud model.
While a hybrid environment can reap the benefits of both public and private cloud through the vast array of as-a-Service options available, it can also introduce significant complexities in the way IT security is deployed, managed and most importantly, its effectiveness to protect your digital assets.
In this session we will explore these challenges in further detail and learn how to apply security controls that are designed and built for the hybrid cloud.
Forward Threat Researcher
Download Presentation Slides
Website defacements may have become passé, but the number of websites being compromised is still significant. This session will reveal the trends in web defacement and hackavists based on recent research, focusing on attacker hotbeds in East Asia. You will understand the motivations and behaviours of hackers in order to better protect your organisations from potential damage.
Senior Security Engineer ANZ
Download Presentation SlidesAs network virtualization transforms networking into a software industry, it gives rise to new technologies and use cases, accelerating innovation throughout the business. How will network virtualization be the bridge between data centre and cloud networking, and what does this mean for your data centre security? Join us to learn how extending the operational model of compute virtualization to the network can achieve greater flexibility while providing a much tighter, fine grained way of securing applications, data and other workloads. You will find out how network virtualization provides a pathway for securing your on premise applications, your containerised applications, and your workloads in public cloud providers.
Vice President Market Strategy
Download Presentation SlidesIs your organisation well-prepared to fight ransomware? This threat category is growing dramatically over the last twelve months, disrupting business, taxing IT teams and triggering expensive ransom payments. Early generations of ransomware were more easily detected and defeated, in some cases with weak cryptography that enabled easy decryption and cleanup. But ransomware is getting steadily more resilient and dangerous. Lately, ransomware works hard to avoid detection, and the encryption is more robust. Trend Micro’s research teams have even seen ransomware that threatens to publish data on the internet until the ransom is paid, reducing the value of a sound backup strategy.
This session will cover the evolution of ransomware threats, so that you can better anticipate how an attack might enter your organisation and how it would behave once on a target endpoint or server. Next, the session will propose best practices to reduce the likelihood of a successful ransomware attack, and the effectiveness of various protection and detection techniques that can be used on endpoints, email and web gateways, networks, and servers.
With a better understanding of the ransomware threat and a clear action plan, you can say no to ransomware!
Robert De Haan
Layer 8 Security
Download Presentation SlidesRobert will speak about the current state of security issues companies are facing in today’s ever changing digital world. What have been the issues? What types of attacks have they faced? Internal and external security challenges companies are facing. He will take a look at new solutions like Sumo Logic and how they differ from traditional SIEM systems. Security information and event management (SIEM) solutions have been around since 2000, and they were developed with the goal of helping organisations in the early detection of targeted attacks and data breaches. Needs cut across analysing event data in real time to the collection, storage and analysis of log data for incident forensics and regulatory compliance. While these solutions hold out tremendous promise, are they failing to deliver?
Then he will highlight how Sumo Logic is providing for Security use cases including an app that integrates with Trend Micro. Then he will take a look at AirBNB and Anheuser-Busch case studies and how Sumo Logic helped solve complex security use cases.
Partner Cyber Advisory
Download Presentation Slides
Cloud and IoT is now in mainstream adoption phase, often being referred to as the fourth revolution.
The presentation will share experiences from early adopters and focus on challenges that vendors will not share when selling cloud enablement services.
The effort and areas of focus that are often overlooked when initiating and securing cloud capability within an organisation. The session will commence with a snapshot of how the cloud security market has transformed and advanced over the past few years. The session will then share the learnings from implementation of multiple cloud enablement services, more specifically the challenges from an information security domain. Walk through of experiences of what works and what does not work, learnings and pitfalls that organisations need to be aware of when investing and enabling cloud services.
The presentation will explain the typical lifecycle of a cloud ecosystem from contract sign to consumption and reporting. It will then discuss methods on how depending on the service being invoked distinct architectural and operational activities are required to enable success. The presentation will end with a model on how to evaluate and govern cloud services within an organisation which will be more than an audit of the cloud service provider for contractual clauses.
Download Presentation SlidesWhile cloud services can provide significant benefits to an organisation, they can also create real headaches for digital forensic investigators. Whether you’re investigating theft of confidential material, responding to a suspected network breach or collecting documents and email for legal discovery, cloud services create unique challenges due to limited technical capabilities, weak security models, poor logging, bandwidth restrictions and general loss of control. In this presentation, SANS Certified Instructor and experienced DFIR practitioner Nick Klein will discuss some of these real world challenges and offer practical advice on how to overcome them.