Jul 31
Ways to convince Your Boss Ways to Save Submit Your Talk

Submit Your Talk

Overview of the event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.

Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Conference Schedule

Cyber Security Summit, Melbourne

X Topic Abstract

The landscape looks like this: DMARC is not longer an option, you must secure your domain. The effects the one dns entry can have is devastating and also brilliant. Gloobalk SPAM volumes with decrease, less BEC attacks etc

X Topic Abstract

What works best for SME's. How do you develop a cyber risk management strategy to support small and medium-sized businesses (SME) that addresses real cyber risks faced by SME’s and is simple to implement and affordable to manage?

Speaker profile

Michael leads the Cyber Risk Advisory and Crimson Risk divisions of Cyber Indemnity Solutions globally. Michael developed a NIST based holistic cyber assessment expanding it into people and indemnity disciplines. Michael has over 20 years management consulting experience and is highly skilled in guiding boards and c-suites in business risk, people and culture, cyber risk and innovation. Considered a trusted adviser, Michael has deep expertise in cyber strategy, cyber risk management with hands-on experience, helping boards and business leaders address business threats and adapting to fast-changing complex environments. Michael passion is on providing SME's a simple and affordable cyber defence solution.

X Topic Abstract

The demand for Data has grown multi-fold, due to which organisations are sparing no cost to gather more of it in order to address the numerous business use cases. However, given the changing Privacy regulations landscape and new attack vectors that are being designed everyday, the challenge to teams responsible for Data Protection seems like Mission Impossible.
This presentation looks at ways in which Cybersecurity and Data Protection teams can turn the tide and make protection of Data Mission Possible.

Speaker profile

DJ is a Cyber Security, Data Governance and Architecture Executive with 22+ years experience. His career highlights include Head of Cyber Security & Data Governance Advisory at SXiQ, President and Chair of (ISC)2 Melbourne Chapter, Executive Advisory Board Member (APAC) for EC-Council’s Threat Intelligence program (CTIA), and a self-made entrepreneur.
DJ regularly speaks at conferences and is actively involved in mentoring budding talent in the Cyber Security & Data Governance domains.

X Abstract

1. Please provide an overview of your organization, and the expectations from Cybersecurity team, in these changing times

2. Given digital transformation in your organization how has this influenced Cybersecurity practices and strategies

3. Would you be able to share insights/approaches in Cybersecurity to enhance competitive advantage?

4. How are you leveraging Artificial Intelligence in delivering business outcomes?

5. What are your views on the AI use cases which will be leveraged in future for Cybersecurity?

6. What transformation are you seeing in Cybersecurity teams currently from skills, organization structure or operating model perspective. Will Cybersecurity teams/roles exist in future. If yes, in what form and shape

7. What are the top 3 capabilities you need from your IT service providers to enhance business outcomes from Cybersecurity perspective?

X Topic Abstract

I will cover FedRAMP/NIST 800-53 and how it is opening doors to US Federal govt

Speaker profile

17+ years of solid experience leading security, compliance and functional initiatives for SaaS and Mobile applications. With an exemplary track record of on-time, on-budget & high quality delivery serving large scale real life projects. Managing client relationships through the delivery life cycle working with some of the leading organizations like Department of Defense (DoD), Tesla, Bechtel & BHP Billiton. Extensive experience in concurrently managing multiple onshore, offshore & 3rd party teams with a range of skill set. Innovative, passionate & results-focused. Solid understanding of FedRAMP, IRAP, SRG DoD IL4, ISO 27001, GDPR, SOC, Governance framework and secured authentication mechanisms like SSO and MFA.

X Topic Abstract

Cybersecurity awareness to secure the industrial network has increased greatly. Organisations are securing their industrial network with firewalls, OT-IDS and other technology. However the cybersecurity management of the OT network is still separated / independent from IT.Based on the expected challenges in managing OT cybersecurity, we anticipate OT cybersecurity will be managed as part of organisation’s overall risk management strategy. This risk management strategy will encompass IT and OT, and will most likely be oversee by a single cybersecurity team.

I will be presenting the global trends in securing industrial network, the challenges faced today, and our opinion on how future challenges will be resolved.

Speaker profile

Zhanwei Chan has been helping NTT group of companies to securely transform from legacy Industrial Control Systems to digital industrial systems for 3 years. He manages the OT Cybersecurity global portfolio across NTT group of companies (Dimension Data, NTT ICT Communications, and NTT Data). His team help organisations to develop strategies, operationalise, manage and monitor security risks in industrial networks.

X Topic Abstract

Virtual worlds have become highly popular in recent years with reports of over a billion people accessing these environments and the virtual goods market growing to near 50 billion US dollars. An undesirable outcome to this popularity and market value is thriving criminal activity in these worlds. The most profitable cyber security problem in virtual worlds is named Virtual Property Theft. We used an online survey to gain insight into how hackers (n=100) in these synthetic worlds conduct their criminal activity. This survey is the first in the world to report insights into the criminal mind of hackers (virtual thieves). Results showed a clear-cut profile of a virtual property thief, they appear to be mainly aged 20-24 years of age, live in the United States of America, while using virtual worlds for 5-7 hours a day. These and the other key results of this study will provide a pathway for designing an effective anti-theft framework capable of abolishing this cyber security issue.

Speaker profile

Dr Nicholas Patterson is a Senior Lecturer at a large Australian University and is the founder and CEO of Cognivity, a consultancy that connects advanced academic-research to industry to increase capability and outcomes.
He has a PhD in cyber security which was awarded the Alfred Deakin Medal and is certified by ISACA, is a Certified Blockchain Expert (The Blockchain Council) and IBM Cloud technologies (IBM).
He has peer-reviewed publications in Cyber Security and Blockchain as well as authoring a range of media articles (ABC, Herald Sun, Gizmodo, Lifehacker etc) which have had over 160,000 views worldwide.
He has co-developed award-winning Massive Open Online Courses in topics like cyber security for SMEs which has taught over 40,000 people in over 44 countries.

X Topic Abstract

In this digital age, it is imperative for businesses to have a strong and robust security architecture to protect their most customer and business sensitive. Security Architecture is a foundational element, but it is considered to be complicated, cumbersome and time-consuming. In most enterprises, security architecture related tasks are not completed efficiently and effectively.

In this session, you will learn about the importance of security architecture, ways to improve security architecture related processes, the importance of security reference patterns to fast track the decision-making process.

Speaker profile

12+ years experience in Information Security industry. Experienced in architecture, design and implementation of security solutions and services across business and IT areas using architecture standards, best practices and process.

Experienced in technology architecture and management of infrastructure solutions such as SIEM, Cloud-based Security Monitoring, Web Application Firewall (WAF), DDoS Protection, Identity & Access Management (IAM), Identity Governance and Administration (IGA), Cloud Access Security Brokers (CASB), Privileged Access Management (PAM, Next Generation Firewalls, Endpoint Security, Endpoint Detection & Response, Web and email security systems.

Education: Master’s level education in Information Technology. CISSP/CISM/CompTIA Certified Security Professional and AWS Certified Architect.

X Topic Abstract

Third party vendors and suppliers often have access to your network and your organisation's confidential information. The best way to prevent a data breach is to have a robust program to assess how your third parties are managing their risk and protecting your data. Organisations must have a clear understanding of the risks inherent in their business relationships with third parties. How should you approach managing third party risk?

This session will cover the following topics:

Discuss the major failings of traditional third party risk management programs
Creating a comprehensive catalogue of vendors and suppliers
Risk based segmentation of vendors and suppliers
Risk assessment and rules based due diligence activities
The key contractual clauses all contracts with third parties should contain and why
Methods for continuous monitoring
How to develop and present a supplier risk dashboard for management
A model for a comprehensive process to effectively and efficiently manage third party risk

Speaker profile

Wayne Tufek is currently a Director of CyberRisk (www.cyber-risk.com.au) an information security and technology risk consulting company. Wayne works with a diverse number of clients from household national brands to small businesses, providing advice on how to secure their information and information systems and how to effectively manage their risk. Before starting CyberRisk, he formulated pragmatic business driven strategies to establish, execute and improve cyber risk management in ASX listed companies and some of Australia’s largest organisations across the public sector, Big 4, financial services, consumer products, education and retail sectors. Wayne brings practical hands on experience leading security functions and successfully uplifting security maturity and capability, all the while managing budgets, resource constraints and stakeholder expectations. Wayne is a member of Chartered Accountants Australia and New Zealand, a Director of the Melbourne Chapter of ISACA and holds the SABSA SCF, CISSP, CRISC, CISM, CISA, PCI QSA and ISO/IEC 27001 Lead Implementer qualifications. He is frequently asked to present at security conferences and events in Australia and internationally including the Australian Cyber Security Centre Conference, AusCERT, CeBIT, SACON, RSA APJ and ISC2 Security Congress.

X Topic Abstract

Late modern societies are now dependent on innumerable digitally networked technologies, yet there are intractable incongruencies between the technologies that we develop, and the corresponding technological literacies of users. This disjuncture has greatly increased the scope and scale of the risks to which globalized publics are exposed. With public cybersecurity literacies necessarily in decline as a result of the techno-social dynamism of “liquid modernity”, we now face an immense and exponentially growing matrix of cyberthreats and vulnerabilities, of which many carry potentially catastrophic consequences.

Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at contact@1point21gws.com, naveen@1point21gws.info

Our Sponsors

Media Partners


Association partner

Digital Marketing Partner

Marketing Partner

Promotional & Media Partners

Our Past Sponsors

Media Partner


Our Speakers

David Barnes

Global CEO & Director

Zulu Labs

Michael Hyatt

Head of Consulting and Cyber Services

Cyber Indemnity Solutions

Dhananjaya Naronikar

Head of Cybersecurity & Data Governance Practice


Surayansh Surana

Program Director Security and Compliance


Zhanwei Chan

Global OT/IoT Practice Director

NTT Security

Dr. Nick Patterson



Magesh Dhanasekaran

Security Architect at Unisuper

Principal Advisor at Archimigo

Wayne Tufek



Patrick Scolyer-Gray

Associate Lecturer - Cybersecurity

La Trobe University

Our Pricing

Group of 3 or more(Early Bird)
AUD 362 Till June 16
Group of 3 or more(Standard)
AUD 434 Till July 31
Early Bird

AUD 577 Till June 30

AUD 722 Till July 31

Our Testimonial


Who can attend Cyber Security Summit in Melbourne?

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

Board members
Information technology staff
PR departments
In-house and general counsels
Insurance and risk managers
Security Systems Integrators
IT and Cybersecurity Leaders
Integration Engineers
Product Developers and Manufacturers
Senior Technology Business Executives
Security Specifiers and Engineers
Security Consultants
Anyone who is responsible for the cybersecurity of integrated security systems!

Why to attend Cyber Security Summit in Melbourne?

Following are the three key questions you and your cyber security organization or cyber security department and cyber security center of excellence should be solving for now: How do we as testers and cyber security company evolve and thrive in SMAC & IoT world?
From tooling to skilling and from strategies to fundamental values what needs to change and how? What are solutions and services available in market which I can leverage? Cyber Security Summit 2019 is an attempt to seek and share answers to these basic questions.

What will you learn about?

Learn latest techniques and skills required to test disruptive technologies from industry stalwarts themselves Latest trends, concepts, processes and tools for cyber security in SMAC & IoT Recognize, understand and acknowledge challenges in cyber security emerging technologies. Meet and network with fellow cyber security experts from leading companies.Learn how to adapt and adopt these changes quickly and swiftly within a team and also across the enterprise.

Are there any prerequisites to attend this program?


Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.