Jun 27
Ways to convince Your Boss Ways to Save Submit Your Talk
X

Submit Your Talk

Overview of the event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.



Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Conference Schedule

Cyber Security Summit, Sydney

X Topic Abstract

The European Data Privacy Law (GDPR) came into effect last June and is profoundly changing the Information Security culture of companies dealing with private data. Everyone selling goods or services into the EU must adhere to the standards defined in the law. However, the law implicitly demands efforts in Cyber Security as well. This means there must be a substantial effort in place in order to demonstrate compliance and to avoid stiff fines.

Speaker profile

Mr. Gaertner is a permanently sworn in and publicly accredited expert witness for information systems in Germany. He also is a member of the IT-Security council of the Federal Minister of Economy and Commerce and Vice President of the "Nationale Initiative für Informations- und Internetsicherheit e.V." (NIFIS).
He is working in the Information Security Area since over 20 years and is data privacy officer for more than 20 companies throughout Europe

X Topic Abstract

In December 2018, the Australian Federal parliament passed the Telecommunications (Assistance and Access) Act. This legislation will permit certain Federal and State Government agencies to force security vulnerabilities to be introduced in to various software application. This presentation will discuss the impact of this regime on the Australian Software sector and what organisations need to understand about the scope and implications of this regime.


X Topic Abstract

Cyber security is complex enough with thousands of products, unknown ROI and confusing effectiveness. So when adding a compliance requirements such as CSA CCM, HIPPA, NIST SP 800-53, EU GDPR, Mandatory Breach Notification, ISO 27001-2, PCI DSS and FTC's unfair business practice it becomes very complex. During this talk we will go over the key steps for simplifying this complexity and getting specific steps that can be taken to align with cyber security compliance requirements and improve cyber security. We will also look at a real company and what did and didn't work for them.


X Topic Abstract

As a society our most precious assets are our children or future generations. We all love and care for our children and want to do the best for them in terms of their education. We buy the latest technology for them from mobile phones, to laptops, and tablet computers. In fact such technology has become a standard in many schools across the world. Yet we don't consistently teach children about the importance of cyber security, we don't provide funds to secure the IT and communications infrastructure in schools, and we don't have highly specialized cyber security professional protecting schools, colleges, and universities. Politicians are attempting to push responsibility back onto the parents and children. Is the proposed Digital License an answer to this problem?"


X Topic Abstract

The talk will focus on getting people ready for the next phase of CyberSecurity, which relates to IoT, Robotics, Drones, Smart Home/Cities - is going to be quite interesting and that something people need to know about. The quality of Cybersecurity people at the moment need for better training. The presentation will be one that contains video and audio.


X Topic Abstract

When we talk of Digital Security, we talk about Next Generation technologies like Cloud Security, Artificial Intelligence, Machine Learning, Internet of Things (IoT) and other new generation Security technologies. The need for looking into Digital Security arises because of the massive shift in the way businesses are now delivering their services to the customers and the way they are looking to optimize their own costs by reducing Operational Costs. At the same time, the attack surface has moved on from signature based malware to zero day threats with an average of 200,000 new threats every day, so the need to Malware detection to be done on Behavioral patterns rather than rely on signature detection has driven Security Product vendors to look at Artificial Intelligence and Machine Learning in ways they have not done in the past half decade. However, are we ready for Digital Security in a way that our Security Implementer, Practitioner, End User and Business Stakeholders can fully benefit out of them in the current landscape? To know the answer, we have to look at common practices related to more traditional Security Controls such as SIEM, Firewall Management, Vulnerability Management, Patch Management, Penetration Testing, End user Security Awareness and Identity and Authentication Management. Are we doing what we need to do is what my talk will focus on and finally I will be providing the answer to the question "Are we ready for Digital Security?"

Speaker profile

An experienced ICT professional (nearly 20 Years) with rich experience in Information Security, Cyber Security, Compliance, Consulting and Advisory for organisations to help them in their journey of uplifting their Cyber Security Capabilities including but not limited to creating framework and policies to ground level implementation of security framework and GRC encompassing People, Process and Technology .
My in-depth experience in Information Security, Cyber Security, Risk Mitigation and Stakeholder Management, Vendor & Resource Management, Service Delivery through compliance of ISO 27001, 31000, PCI DSS and NIST standards under unified compliance framework (UCF) helps me to flexibly create or transmute to a secured and reliable Cyber resilient organisation while efficiently contributing further to continuously evolve the role of Security to keep it ahead of the curve.
A firm believer of continuous learning and acquiring new skills by scanning for challenges in my professional landscape to convert or mitigate them into opportunity.
I have industry revered certifications like CISM, CPISI PCI DSS, ITIL, PRINCE2 and product specific qualifications from QualysGaurd and CyberArk
Currently working as Advisor Information Security with DXC Technology in Sydney with the Cyber Internal Assurance team and tasked with doing the Risk Assessments for the Mergers and Acquisitions for DXC and Security review of Projects across their lifecycle to identify and highlight potential risks and provide mitigation strategy for treating the risk


X Topic Abstract

The proliferation of IoT devices leads to a new attack vector which sits on Telco’s backyard. Recent DDoS attacks attackers leverage vulnerabilities in IoT devices to launch massive botnet-based DDoS (Ex. Mirai botnet). Current security architectures in telcos are not effective if the attack originates from their backyard. This talk presents an analysis of recent IoT botnet-based DDoS attacks. Further, the talk discusses the limitations of current security architectures of Telcos in terms of DDoS detection and mitigation. Then the talk looks into modified security architecture for Telco’s to deal with IoT-based DDoS attacks

X Topic Abstract

With billions of connected devices projected to swamp every industry, one impediment to the growth of IOT adoption is security. Considering Industry 4.0 ecosystem is vulnerable due to connected objects that are not always secure at the outset, coordinating our efforts and collaborating to secure the assets is important in this dynamic and fast growing IOT market. Few solution elements include identifying the vulnerabilities in the detected assets and orchestrating and automating the response driven by prescriptive analytics. This session would focus on feedback from customers and solutions to safeguard OT environment.



Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at contact@1point21gws.com, naveen@1point21gws.info

Our Sponsors


Media Partners


               

Digital Marketing Partner




Marketing Partner




Our Past Sponsors


Media Partner



Sponsors






Our Speakers


Mathias Gaertner

Founder , Vice President

GR IT Experts & NIFIS


Sorin Toma

Director - Digital Transformation || Cyber Security

Xpotentia


Skeeve Stevens

Senior Researcher & Advisor, Mentor, Speaker, Cyborg, Ex-Hacker, Black Teams, Polymath, Q

Future Crime


Debrup Bhattacharjee

Advisor - Information Security

DXC Technology


Martin Boyd

Director of Cyber Security & Cyber Security Lecturer

Vertex Security & Optus Macquarie University


Udaya Wijesinghe

Senior Cyber Security Architect

Optus


Adrian McCullagh

Legal Advisor, Research Supervisor

University of Queensland, Legaler ICO, Inkrypt, Keaz


Sumanth Devara

Head of Digital Innovation - NRNZ

Orange Business Services





Our Pricing

Special Offer
AUD 340 Till February 10
Group of 3 or more
AUD 390 Till June 27
Early Bird
AUD 520 Till May 27
Standard
AUD 649 Till June 27


Our Testimonial



FAQs

Who can attend Cyber Security Summit in Sydney?

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

Board members
CEOs
CIOs
CFOs
HR
Information technology staff
PR departments
In-house and general counsels
Insurance and risk managers
Security Systems Integrators
IT and Cybersecurity Leaders
Integration Engineers
Product Developers and Manufacturers
Senior Technology Business Executives
Security Specifiers and Engineers
Security Consultants
Anyone who is responsible for the cybersecurity of integrated security systems!

Why to attend Cyber Security Summit in Sydney?

Following are the three key questions you and your cyber security organization or cyber security department and cyber security center of excellence should be solving for now: How do we as testers and cyber security company evolve and thrive in SMAC & IoT world?
From tooling to skilling and from strategies to fundamental values what needs to change and how? What are solutions and services available in market which I can leverage? Cyber Security Summit 2019 is an attempt to seek and share answers to these basic questions.

What will you learn about?

Learn latest techniques and skills required to test disruptive technologies from industry stalwarts themselves Latest trends, concepts, processes and tools for cyber security in SMAC & IoT Recognize, understand and acknowledge challenges in cyber security emerging technologies. Meet and network with fellow cyber security experts from leading companies.Learn how to adapt and adopt these changes quickly and swiftly within a team and also across the enterprise.

Are there any prerequisites to attend this program?

No

Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.