Dec 14
Ways to convince Your Boss Ways to Save

Overview of the event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.

Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Conference Schedule

Cyber Security Summit, Auckland

X Topic Abstract

Identity and access management is an essential component to addressing security issues in the cloud. Cloud identity system architecture supports universal assignment management for all assets, application access, subscriptions, and physical access for every business user and administrator across any enterprise. Private organizations and government agencies at any level spend billions of dollars – and go to great lengths – in an effort to protect user' identity, user' information, and digital access while complying with legislation that mandates the implementation of security measures, ultimately producing the substantiated appearance of the organizations’ due diligence in this domain. This presentation intends to illuminate and discusses in more detail three legislative acts: ENISA, CSA, and NIST. These guidelines address the significant business and technical decisions that need to be considered by an organization seeking to implement the IAM component of Security as a Service (SecaaS) as a part of the cloud environment, or an organization that is looking for guidance on how to assess an IAM offering. The presentation also provides a brief description of all three legislative acts, a high-level comparison of suggested and/or mandated guidelines (highlighting gaps and overlaps) and suggests a possible threshold model that may incorporate security settings that satisfy requirements of all three legislative acts.

X Topic Abstract

One of the greatest misconceptions in business today is that compliance equates to good business practice – particularly with regard to security. In reality, compliance ensures a base level of security to which companies must adhere in order to 'tick the box'. Cybercrime, however, is evolving at an exceedingly rapid pace, meaning it is often difficult for regulations and legislation to keep up with a changing security landscape. The result is outdated requirements that are often unfit for purpose.

The EU's General Data Protection Regulation (GDPR) presents an opportunity to level the scales and drive greater convergence between cyber-security and compliance – two areas often seen as disparate by business leaders.

Speaker Profile

Abhishek is currently working for Vodafone where he is responsible for performing Privacy & Cyber Security risk assessments on the high-risk processes and systems involved to ensure Vodafone's compliance with the national and inter-national regulations.
Before this he was working as Information Security Officer for a tourism company called THL. He was responsible for ensuring effective staff training programs to increase security awareness across all employees, maintaining & enforcing the IT Security Policies and standards framework. He took the lead on preparing the company for EU General Data Protection Regulation and ensure that the company is compliant across all businesses around the world.
He also has experience in IT Auditing while he worked at KPMG. He is a Certified Information Systems Auditor (CISA). He has experience in performing IT Audits of major companies in various sectors including banking, tourism, liquor manufacturing, telecommunications, insurance, food safety and bio-security services. Assessed the General IT Controls (GITCs), IT Application Controls (ITACs) and any other associated risks during these audits.

X Topic Abstract

The cyber domain is a multi-disciplinary joining of computer science, mathematics, economics, law, psychology, and engineering. It encompasses not only the networking of online devices together, but also how humans interact and are influenced by these devices.

This presentation aims to address the feasibility issue of best practices in cyber security, in order to showcase them as ideal-type situations. The overarching aim of this presentation, therefore, is to provide an understanding that there is a gap in the existing study of the cyber domain and what skills are necessary for the future of cyber security best practices.

Speaker Profile

Hanif is working as an IT Security Programme Developer in Nelson Marlborough Institute of Technology, and as the same time, he is a Ph.D. candidate in the Department of Computer Science at the Auckland University of Technology, New Zealand.

Prior to coming to AUT, he was a researcher in the field of cyber security at the Unitec Institute of Technology. Hanif received his Bachelor’s degree in Software Engineering and his Master’s degree in software engineering and software architecture.

He has spent many years working in different IT companies and academic research centres around the globe. He has published several conference and journal papers and received four award from the Kaspersky antivirus company research center in Malaysia, Poland, Singapore, and Korea in 2009, 2010, 2012, and 2014 respectively.

His primary work and research interests are in the field of cyber security, malware analysis, and cloud computing.

X Topic Abstract

New Zealand is predominantly made up of small and medium size business's with limited IT budgets and even smaller IT teams. Thus a fertile ground for potential compromise is created. This presentation aims to discuss the 5 different phases of an attack - Reconnaissance & Scanning, Exploitation & Privilege Escalation, Installation, Exfiltration & Command/Control and finally Obfuscation. Finally a discussion on what can be done at each phase to protect (based on different budgets) and the professional certifications necessary to bridge the cybersecurity skill gap.

Speaker Profile

Feroze has over 14 years' experience as a lecturer & trainer and over 18 years of working experience in ICT, both in New Zealand and Malaysia. He has a Master's degree in Information Systems Security and holds the prestigious CISSP qualification, held by only 263 people in New Zealand (as of October 2018) and he is currently the only CompTIA's Master level Advanced Security Practitioner - CASP certification holder in Australasia. He also holds certifications from CompTIA (Cloud+, Security+, A+), Microsoft (MCSA, MCSE) and Cisco (CCNA Cyberops).

Feroze has had the opportunity to offer his experience as a trainer to the University of Auckland, Malaysian Airlines, Philips (Malaysia), Toshiba (Malaysia), Western Digital (Malaysia) to name a few. Currently he is working as a Senior ICT Lecturer with New Zealand School of Education.

A highlight of his IT career was working as an Information Systems Manager in charge of an IT Infrastructure spanning over 12 locations across New Zealand, India and China.

X Topic Abstract

I'll be addressing the above from a Business/ Marketing/ Comms perspective covering... organisatonal risk, reputational cost, PR risk, internal education, partner awareness, level of readiness, corporate espionage, and collateral damage associated with a cybersecurity breach... with a micro-focus on education within the family @ home esp. kids & elderly.

Speaker Profile

I'm your Business Solutions Go-to Guy. My work/life mantra: Serve Solve Share Support Simplify

Experienced in Integrated Marketing Communications, Holistic Content Marketing, Social Media & Social Business Strategy, Project/ Brand/ Event/ Business Management.

I have been fortunate to work with some highly talented people on international brands in global advertising & marketing communications agencies in India, Bahrain and New Zealand.

X Topic Abstract

New Zealand is investing heavily to defend against breaches. Yet, we frequently read about successful attacks in the media. What makes New Zealand so attractive? This presentation will cover a review of 2018 cyber threats on our shores focusing primarily on social engineering as the attack vector. The main solution, since there is no patch for the “human vulnerability”, is training. But is it?

Speaker Profile

Ananth has been actively involved in the world of offensive security for over 2 years. He is currently CCNA CyberOps and CompTIA Security+ certified. His next milestone is the prestigious OSCP certification. As a freelance cyber security professional, his passion is penetration testing, spending his nights with Kali Linux and tinkering away on his customized home lab lovingly called as “Ananth’s Militarized Zone”
He passed CompTIA Pentest+ certification and also achieved stackable cert from CNVP(Comptia Network vulnerability assessment professional).

Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at,

Media Partner

Knowledge Partner


Our Speakers

Eghbal Ghazizadeh

Cloud Computing Advisor

AUT University

Abhishek Dubey

Privacy Business Analyst


Amar Trivedi


Keeping Madness Alive

Hanif Deylami

Programme Developer

Nelson Marlborough Institute of Technology

Feroze Ashraff




CCNA CyberOps


Our Pricing

Group of 3 or more
NZD 414 Till December 14
Early Bird
NZD 553 Till November 14
NZD 692 Till December 14

To Register Via Eventbrite

Our Testimonial


Who can attend Cyber Security Summit in Auckland?

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

Board members
Information technology staff
PR departments
In-house and general counsels
Insurance and risk managers
Security Systems Integrators
IT and Cybersecurity Leaders
Integration Engineers
Product Developers and Manufacturers
Senior Technology Business Executives
Security Specifiers and Engineers
Security Consultants
Anyone who is responsible for the cybersecurity of integrated security systems!

Why to attend Cyber Security Summit in Auckland?

Following are the three key questions you and your cyber security organization or cyber security department and cyber security center of excellence should be solving for now: How do we as testers and cyber security company evolve and thrive in SMAC & IoT world?
From tooling to skilling and from strategies to fundamental values what needs to change and how? What are solutions and services available in market which I can leverage? Cyber Security Summit 2018 is an attempt to seek and share answers to these basic questions.

What will you learn about?

Learn latest techniques and skills required to test disruptive technologies from industry stalwarts themselves Latest trends, concepts, processes and tools for cyber security in SMAC & IoT Recognize, understand and acknowledge challenges in cyber security emerging technologies. Meet and network with fellow cyber security experts from leading companies.Learn how to adapt and adopt these changes quickly and swiftly within a team and also across the enterprise.

Are there any prerequisites to attend this program?


Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.

Contact Us