Professional Documents
Culture Documents
Cyber Security For Government 2013 Conference Brochure
Cyber Security For Government 2013 Conference Brochure
5th Annual
Recognising cyber risks and building capabilities to preserve data confidentiality, integrity, and availability
Dr. Suresh Hungenahally CISO, DEPARTMENT OF BUSINESS AND INNOVATION Troy Braban CISO, AUSTRALIA POST
MAKE THE MOST OF YOUR TIME OUT OF OFFICE AND ATTEND OUR INTERACTIVE WORKSHOPS:
WORKSHOP A:
WORKSHOP B:
Meeting BYOD Security Demands Designing a Mobile Data Protection Strategy and Guarding against Mobile Malware Threats
Event Partner:
Networking Partner:
Media partners:
REGISTER NOW!
T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:registration@iqpc.com.au n W:www.cybersecurity-conference.com.au
5th Annual
DO YOU HAVE THE SECURITY SOLUTIONS WE ARE LOOKING FOR? GET IN FRONT OF YOUR TARGET AUDIENCE
Benefits of Sponsoring & Exhibiting: 1. 2. 3. 4. Demonstrate what your solution can do to the Security specialists who do it on a daily basis Gain direct access to your target market Increase your competitive selling advantage Achieve high profile association with key decision makers
If you feel that you have a credible offering in this space that you would like to showcase to Government, please contact Christina McLoughlin on +61(0)2 92291044 or Christina.McLoughlin@iqpc.com.au
5th Annual
DAY ONE:
08.30 09.00
09.10 Evolving Cyber Threats Are we Equipped Enough to Respond? n Exploring emerging trends in cyber attacks including ransomware n Developing capabilities in our internal control mechanisms n Building intelligence that highlights current security activities n The human factor - educating employees to recognise a potential fraudulent attack Assistant Commissioner Tim Morris, National Manager High Tech Crime Operations, AUSTRALIAN FEDERAL POLICE
12.20 Lunch 13.20 Not Everything is What it SIEMs n Evaluation considerations for using SIEM n Some insights when implementing SIEM into a multi-platform IT environment n Expectations, perceptions and reality Ross Spooner Independent IT Security Specialist
09.50 Business and IT Leadership for strong Security n How Cyber Security and threats are changing the ways executives look at their business n How IT and Business leaders can work together to build security capability n Security conversations for executives: what is really important n Prioritising security investments for business outcomes 10.30 11.00 Andrew Walduck CIO, AUSTRALIA POST Morning tea Government Initiatives for Stronger Information Security Governance n Techniques for stronger governance n Strategies at both Commonwealth and State levels n Implementation challenges faced at all levels n Aligning Commonwealth and State strategies David Simpson Managing Director, CQR CONSULTING
14.00 Cyber Incidents: There isnt Much We Havent Seen! n How does AusCERT, Australias premier computer emergency response team, deal with the daily influx of cyber threats? n A case study of ransomware, and a crystal-ball gaze into where this threat might turn next n What keeps the online crime industry in business, and how can we stop it? 14.40 Mike Holm Coordination Centre Manager, AUSCERT Afternoon tea
15.10 RESEARCH EXCELLENCE IN ICT: Building Trustworthy Systems for E-government n Developing formally proven architecture to protect critical systems n Designing highly-dependable systems that are resilient to emerging cyber threats 16.10 16.15 17.15 Dr Jodi Steel Director Security and Environment Business Team, NICTA Prof Gernot Heiser Research Group Leader, NICTA Close of Conference Networking Drinks (1 hour) WORKSHOP A: Effective Staff Training for a More Cyber Alert Workforce
11.40 Roundtable Discussion: Reducing Information Security Risks of Social Media Adoption n Communicating and enforcing sound usage policies among users n Tracking your agency's official social media accounts n Adopting a risk-management approach to moderating social media use
In 2012 the number of serious cyber incidents leapt 52 per cent in the first nine months alone"
Defence Minister Stephen Smith
5th Annual
DAY TWO:
08.30
09.00
09.10 Education and Reinforcement Defining the Cyber Security Role for The Non-IT Person n Building an adequate understanding of cyber threats and how it manifests n Instilling responsibility in each employee towards data protection n Customising training efforts for varied levels of user cyber awareness n Embedding better cyber security practices across the organization Dr. Suresh Hungenahally CISO, DEPARTMENT OF BUSINESS AND INNOVATION
09.50 Managing Data Security Risks of BYOD n Applying centralised management and user authentication n Educating users on proper security precautions to minimise data breaches or leakage n Setting network access controls at application and device levels n How far a company can or should go in controlling devices? 10.30 Karl Maftoum CIO, AUSTRALIAN COMMUNICATIONS AND MEDIA AUTHORITY Morning tea
14.00 Improving IT Security Governance n Devising an IT Security Framework that is aligned with your organisations needs n Establishing an enterprise wide security governance to assist decision making n Obtaining senior management engagement at the highest possible level n Ensuring compliance through a consistent governance program 14.40 Troy Braban CISO, AUSTRALIA POST Afternoon tea
11.00 Data Security and Information Privacy Victorias new regulatory approach n Moving towards an integrated, whole of government approach to data security n Responding to emerging challenges affecting information privacy and data protection n Strengthening the protection of personal information in the Victorian public sector n Outlining the new Victorian Protective Security Policy Framework (VPSPF) David Watts Commissioner for Law Enforcement Data Security, STATE GOVERNMENT VICTORIA
15.10 PANEL DISCUSSION: Cyber Technology Investments Business vs Security n Justifying the business value for cyber security investments n Prioritising security investments across different layers of management n Balancing the need for application security and agility of the business 16.00 17.15 Panellists: Troy Braban CISO, AUSTRALIA POST Angela Donohoe CIO, OFFICE OF STATE REVENUE Karl Maftoum CIO, AUSTRALIAN COMMUNICATIONS AND MEDIA AUTHORITY Close of Conference WORKSHOP B: Meeting BYOD Security Demands Designing a Mobile Data Protection Strategy and Guarding against Mobile Malware
11.40 Roundtable Discussion: Overcoming the Implementation Challenge of Application Whitelisting n Understanding how whitelisting fits within your unique IT environment n Maximising security while maintaining business application flexibility n Evaluating the effectiveness of whitelisting vs other anti-malware technology n Articulating the business value of application whitelisting vs administrative costs Facilitator: Al Blake CIO, Department of Sustainability, Environment, Water, POPULATION AND COMMUNITIES
5th Annual
Meeting BYOD Security Demands Designing a Mobile Data Protection Strategy and Guarding against Mobile Malware
With the increasing use of BYOD in government agencies, a cyber security strategy has to evolve to account for the growing crop of wireless devices in use. Instead of locking down the device itself, CIOs and security professionals need to take an information-centric approach to secure the files and applications on devices, wherever it moves. This workshop is a practical platform designed to aid security professionals in devising a mobile data protection strategy, covering the following areas: n Reviewing current mobile malware threats n Differentiating between corporate and personal data on employee-owned devices that are accessing the network n Restricting access to sensitive files and applications through access control and identity management n Integrating mobile strategies into your current security framework n Securing the applications that are critical to your agency Facilitator: Professor Craig Valli Director, ECU Security Research Institute Peter Hannay School of Computer and Security Science, ECU
Electronic intelligence gathering is being used against Australia on a massive scale to extract confidential information from governments."
David Irvine, Director-General of ASIO
WHERE
LAqua, Rooftop Level, Cockle Bay Wharf/ Wheat Rd, Sydney CBD New South Wales 2000, Australia 1300 117 118 www.laqua.com.au
WHEN?
TEAM DISCOUNTS
IQPC recognises the value of learning in teams. Take advantage of one of these special rates: Register a team of 3 to the conference at the same time from the same company and receive $500 discount Register a team of 4 to the conference at the same time from the same company and receive a free pass for a 5th delegate Ask about multi-event discounts. Call + 61 2 9229 1000 for more details Please note: Only one discount applies
ACCOMMODATION
The Oaks Goldsborough Hotel is the official accommodation partner for the 5th Annual Cyber Security for Government 2013 event. Attendees of the 5th Annual Cyber Security for Government 2013 event are entitled to take advantage of the negotiated rates available at the hotel. To check availability or book these rates, go to www.cybersecurityconference.com.au and click on the Venue & Accommodation page.
5th Annual
n Main Conference & Workshops: 6 & 7 August 2013 n Networking Drinks: 6 August 2013 n Venue: LAqua, Cockle Bay Wharf, Darling Harbour, Sydney
POSITION
DELEGATE 2
[FIRST NAME]
[SURNAME]
SAVE $300
POSITION
STANDARD PACKAGES
Conference + 2 Workshops Conference + 1 Workshop Conference Only
*Register & pay before 7th June 2013 SAVE AUD $300 $4997 + GST = $5496.70 SAVE AUD $300 $4198 + GST = $4617.80 SAVE AUD $300 $3299 + GST = $3628.90
EARLY BIRD
STANDARD PRICE
DELEGATE 3
[FIRST NAME]
[SURNAME]
ORGANISATION
VENDOR PACKAGE
Conference Only
* Payment must be received by IQPC prior to 5pm AEST on the cut-off date.
# Registrations
VENDOR PRICE
$3999 + GST = $4398.90
ADDRESS
POSTCODE
received without payment or a Government PO will incur a processing fee of $99 + GST = $108.90 per registration.
2 WAYS TO SAVE!
Book early for HUGE EARLY BIRD savings. Book as a TEAM, save & benefit as a team.
TELEPHONE
FAX
APPROVING MANAGER
[FIRST NAME]
[SURNAME]
Please send me _______ set(s) of AUDIO COMPACT DISCS and PRESENTATIONS CD at $878.90 ($799 plus GST) or $603.90 ($549 plus GST) Presentations CD only Please keep me informed via email about this and other related events
POSITION
NOTE: PAYMENT IS DUE WITHIN 7 DAYS FROM REGISTRATION TO SECURE YOUR PLACE. Registrations received without payment or a Government PO will incur a processing fee of $99+GST = $108.90 per registration. Payment prior to the conference is mandatory for attendance. Payment includes lunches, refreshments, a copy of conference presentations via FTP website or workbook and all meeting materials. If payment has not been received two weeks before the conference, a credit card hold will be taken and processed. This card will be refunded once alternate payment has been received.
CHEQUE ENCLOSED FOR $ _____ (Please make cheques payable to: IQPC) PLEASE CHARGE
American Express Visa MasterCard Diners Club
EXPIRY DATE
IQPC CANCELLATION AND POSTPONEMENT POLICY: FOR DETAILS OF IQPCS CANCELLATION AND POSTPONEMENT POLICY PLEASE VISIT: www.iqpc.com.au
2013 IQPC ABN 92 071 142 446 All RIGHTS RESERVED. The format, design, content and arrangement of this brochure constitute a copyright of IQPC. Unauthorised reproduction will be actionable by law.
WEBSITE www.cybersecurity-conference.com.au MAIL IQPC, Level 6, 25 Bligh Street, SYDNEY NSW 2000
o REGISTER ME for 5th Annual Cyber Security for Government 2013 PLUS: o Workshops: o A o B
DELEGATE 1
[FIRST NAME] [SURNAME]