Jul 31
Ways to convince Your Boss Ways to Save Submit Your Talk
X

Submit Your Talk

Overview of the event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.



Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Conference Schedule

Cyber Security Summit, Melbourne

X Topic Abstract

The landscape looks like this: DMARC is not longer an option, you must secure your domain. The effects the one dns entry can have is devastating and also brilliant. Gloobalk SPAM volumes with decrease, less BEC attacks etc

X Topic Abstract

What works best for SME's. How do you develop a cyber risk management strategy to support small and medium-sized businesses (SME) that addresses real cyber risks faced by SME’s and is simple to implement and affordable to manage?


X Topic Abstract

The demand for Data has grown multi-fold, due to which organisations are sparing no cost to gather more of it in order to address the numerous business use cases. However, given the changing Privacy regulations landscape and new attack vectors that are being designed everyday, the challenge to teams responsible for Data Protection seems like Mission Impossible.
This presentation looks at ways in which Cybersecurity and Data Protection teams can turn the tide and make protection of Data Mission Possible.

Speaker profile

DJ is a Cyber Security, Data Governance and Architecture Executive with 22+ years experience. His career highlights include Head of Cyber Security & Data Governance Advisory at SXiQ, President and Chair of (ISC)2 Melbourne Chapter, Executive Advisory Board Member (APAC) for EC-Council’s Threat Intelligence program (CTIA), and a self-made entrepreneur.
DJ regularly speaks at conferences and is actively involved in mentoring budding talent in the Cyber Security & Data Governance domains.


X Topic Abstract

I will cover FedRAMP/NIST 800-53 and how it is opening doors to US Federal govt

Speaker profile

17+ years of solid experience leading security, compliance and functional initiatives for SaaS and Mobile applications. With an exemplary track record of on-time, on-budget & high quality delivery serving large scale real life projects. Managing client relationships through the delivery life cycle working with some of the leading organizations like Department of Defense (DoD), Tesla, Bechtel & BHP Billiton. Extensive experience in concurrently managing multiple onshore, offshore & 3rd party teams with a range of skill set. Innovative, passionate & results-focused. Solid understanding of FedRAMP, IRAP, SRG DoD IL4, ISO 27001, GDPR, SOC, Governance framework and secured authentication mechanisms like SSO and MFA.


X Topic Abstract

Cybersecurity awareness to secure the industrial network has increased greatly. Organisations are securing their industrial network with firewalls, OT-IDS and other technology. However the cybersecurity management of the OT network is still separated / independent from IT.Based on the expected challenges in managing OT cybersecurity, we anticipate OT cybersecurity will be managed as part of organisation’s overall risk management strategy. This risk management strategy will encompass IT and OT, and will most likely be oversee by a single cybersecurity team.

I will be presenting the global trends in securing industrial network, the challenges faced today, and our opinion on how future challenges will be resolved.

Speaker profile

Zhanwei Chan has been helping NTT group of companies to securely transform from legacy Industrial Control Systems to digital industrial systems for 3 years. He manages the OT Cybersecurity global portfolio across NTT group of companies (Dimension Data, NTT ICT Communications, and NTT Data). His team help organisations to develop strategies, operationalise, manage and monitor security risks in industrial networks.


X Topic Abstract

Virtual worlds have become highly popular in recent years with reports of over a billion people accessing these environments and the virtual goods market growing to near 50 billion US dollars. An undesirable outcome to this popularity and market value is thriving criminal activity in these worlds. The most profitable cyber security problem in virtual worlds is named Virtual Property Theft. The aim of this study is to us an online survey to gain insight into how hackers (n=100) in these synthetic worlds conduct their criminal activity. This survey is the first to report an insight into the criminal mind of hackers (virtual thieves). Results showed a clear-cut profile of a virtual property thief, they appear to be mainly aged 20-24 years of age, live in the United States of America, while using virtual worlds for 5-7 hours a day. These and the other key results of this study will provide a pathway for designing an effective anti-theft framework capable of abolishing this cyber security issue.




Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at contact@1point21gws.com, naveen@1point21gws.info

Our Sponsors


Media Partners


       

Our Past Sponsors


Media Partner



Sponsors






Our Speakers


David Barnes

Global CEO & Director

Zulu Labs


Michael Hyatt

Head of Consulting and Cyber Services

Cyber Indemnity Solutions


Dhananjaya Naronikar

Head of Cybersecurity & Data Governance Practice

SXiQ


Surayansh Surana

Program Director Security and Compliance

Oracle


Zhanwei Chan

Global OT/IoT Practice Director

NTT Security


Dr. Nick Patterson

Director

Cognivity





Our Pricing

Group of 3 or more(Early Bird)
AUD 362 Till June 16
Group of 3 or more(Standard)
AUD 434 Till July 31
Early Bird

AUD 577 Till June 30
Standard

AUD 722 Till July 31


Our Testimonial



FAQs

Who can attend Cyber Security Summit in Melbourne?

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

Board members
CEOs
CIOs
CFOs
HR
Information technology staff
PR departments
In-house and general counsels
Insurance and risk managers
Security Systems Integrators
IT and Cybersecurity Leaders
Integration Engineers
Product Developers and Manufacturers
Senior Technology Business Executives
Security Specifiers and Engineers
Security Consultants
Anyone who is responsible for the cybersecurity of integrated security systems!

Why to attend Cyber Security Summit in Melbourne?

Following are the three key questions you and your cyber security organization or cyber security department and cyber security center of excellence should be solving for now: How do we as testers and cyber security company evolve and thrive in SMAC & IoT world?
From tooling to skilling and from strategies to fundamental values what needs to change and how? What are solutions and services available in market which I can leverage? Cyber Security Summit 2019 is an attempt to seek and share answers to these basic questions.

What will you learn about?

Learn latest techniques and skills required to test disruptive technologies from industry stalwarts themselves Latest trends, concepts, processes and tools for cyber security in SMAC & IoT Recognize, understand and acknowledge challenges in cyber security emerging technologies. Meet and network with fellow cyber security experts from leading companies.Learn how to adapt and adopt these changes quickly and swiftly within a team and also across the enterprise.

Are there any prerequisites to attend this program?

No

Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.