May 03
Ways to convince Your Boss Ways to Save

Overview of the event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.



Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Conference Schedule

Cyber Security Summit, Sydney

X Topic Abstract

- That what the cyber security industry has been doing for the past 40 years hasn't worked.
-How, as an entire industry, to get ahead and be proactive rather than responsive.
-What will work in the future and that the future will involve Ai and ML.

Speaker Profile

John’s passion lies in the role that technology can play in driving forward an organisation. As a technologist at heart, his career has been built on his ability to marry ICT and its broadest and most innovative applications with the needs of a business.
John is CEO of blockchain and IoT based supply chain management ecosystem UCOT, CEO of cyber security consulting firm Revio Cyber Security, and Chairman of the Cyber Security Advisory Council for the New South Wales Department of Finance, Services and Innovation.
Previous roles include CTO at Deutsche Bank, VP at Credit Suisse, Technology Manager at Grant Thornton and Head of IT at Toshiba International Corporation.

X Topic Abstract

Physical environments are an often neglected area of cyber security, yet that is where a lot of the cyber security risks lie.
- While a lot of physical environments are secured, many cyber security risks are associated with humans entering spaces they're not supposed to be in. Facial recognition technology can prevent these incidents from occurring.

Examples:
- Access cards can be stolen or passwords exchanged. Facial recognition software can act as a double verification to ensure people cannot enter restricted areas unless they're really that person, for instances at turnstiles into a secured building. You can even map out an entire physical space and detect in real time when someone sits in front of a computer that's not theirs. This will close the loopholes that card and password access systems leave behind.
- Another cyber security risk is the skimming of bank ATMs. With Optic Insights it's instantly detected when a skimming device is placed on an ATM and a photo/video of the person doing so is captured in the system. When the person is spotted near another ATM/bank branch, security can be alerted in real time.


X Topic Abstract

The talk will focus on getting people ready for the next phase of CyberSecurity, which relates to IoT, Robotics, Drones, Smart Home/Cities - is going to be quite interesting and that something people need to know about. The quality of Cybersecurity people at the moment need for better training. The presentation will be one that contains video and audio.


X Topic Abstract

The European Data Privacy Law (GDPR) came into effect last May and is profoundly changing the Information Security culture of companies dealing with private data. Everyone selling goods or services into the EU must adhere to the standards defined in the law. However, the law implicitly demands efforts in Cyber Security as well. This means there must be a substantial effort in place in order to demonstrate compliance and to avoid stiff fines.

Speaker profile

Mr. Gaertner is a permanently sworn in and publicly accredited expert witness for information systems in Germany. He also is a member of the IT-Security council of the Federal Minister of Economy and Commerce and Vice President of the "Nationale Initiative für Informations- und Internetsicherheit e.V." (NIFIS).
He is working in the Information Security Area since over 20 years and is data privacy officer for more than 20 companies throughout Europe


X Topic Abstract

This talk will look at current trends in the technology scenery and the key cyber security challenges they pose and their impact on businesses and society. In particular, we will examine key cyber security issues that arise with technologies such as Internet of Things, Big Data, Software Defined Networks, and Machine Learning technologies. As part of this, we will outline some projects that we are doing at the Advanced Cyber Security Engineering Research Centre (ACSRC) at Newcastle.

Speaker profile

Vijay has had over 30 years of experience in the cyber security space both in industry and academia, in the UK, US, Europe and Australia. He Vijay was responsible for worldwide Security Research at corporate Hewlett-Packard Labs based in European Headquarters at Bristol, UK. He has held endowed Microsoft Chair Professor in Innovation in Computing supported by Microsoft (USA). He has been on several Industry and Government Boards including Trustworthy Computing Advisory Board (Microsoft, USA), International Security Advisory Board at SAP (Germany), Australian Government’s Peak Security Advisory Body, ITSEAG, Expert in Security for the European Union and for the UK Dept. of Trade and Industry, and Prime Ministerial Cyber Security Task Force, India. Currently he holds the Global Innovation Chair Professor in Cyber Security at the University of Newcastle. (https://www.newcastle.edu.au/profile/vijay-varadharajan)


X Topic Abstract

we invite you to join us for an interactive session regarding the tools and tricks of cyber hackers in today's society. Whilst staying on the right side of the law - we wanted to provide a practical and informative session so you can be better equipped and knowledgeable on the topic.

Speaker profile

Simran has been in the web and computing security industry since the early 90's.
He has deep experience in Technology and Innovation, and applied those to more than half a dozen startups he has been a founder of. He has also worked at the big end of town having been the CTO of organisations like News Interactive (part of News Corp) and Flybuys.
Simran has remained active and hands-on in the Cyber Security space, and advises companies large and small on how to face those challenges without breaking the budget.
He will be giving an interactive presentation, and giving us a glimpse into what happens on the dark side of security.


X Topic Abstract

As a society our most precious assets are our children or future generations. We all love and care for our children and want to do the best for them in terms of their education. We buy the latest technology for them from mobile phones, to laptops, and tablet computers. In fact such technology has become a standard in many schools across the world. Yet we don't consistently teach children about the importance of cyber security, we don't provide funds to secure the IT and communications infrastructure in schools, and we don't have highly specialized cyber security professional protecting schools, colleges, and universities. Politicians are attempting to push responsibility back onto the parents and children. Is the proposed Digital License an answer to this problem?"




Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at contact@1point21gws.com, naveen@1point21gws.info

Our Sponsors


Media Partners


       

Our Past Sponsors


Media Partner





Knowledge Partner




Sponsors






Our Speakers


John Baird

Chairman

Cyber Security Advisory Council


Karen Massit

Managing Director

Optic Insights


Mathias Gaertner

Founder , Vice President

GR IT Experts & NIFIS


Vijay Varadharajan

Global Innovation Chair in Cyber Security and Director of Advanced Cyber Security Engineering Research Centre

University of Newcastle


Simran Gambhir

Director

Payatu Pty Ltd


Sorin Toma

Director - Digital Transformation || Cyber Security

Xpotentia


Skeeve Stevens

Senior Researcher & Advisor, Mentor, Speaker, Cyborg, Ex-Hacker, Black Teams, Polymath, Q

Future Crime





Our Pricing

Special Offer
AUD 340 Till February 10
Group of 3 or more
AUD 390 Till May 03
Early Bird
AUD 520 Till April 03
Standard
AUD 649 Till May 03


Our Testimonial



FAQs

Who can attend Cyber Security Summit in Sydney?

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

Board members
CEOs
CIOs
CFOs
HR
Information technology staff
PR departments
In-house and general counsels
Insurance and risk managers
Security Systems Integrators
IT and Cybersecurity Leaders
Integration Engineers
Product Developers and Manufacturers
Senior Technology Business Executives
Security Specifiers and Engineers
Security Consultants
Anyone who is responsible for the cybersecurity of integrated security systems!

Why to attend Cyber Security Summit in Sydney?

Following are the three key questions you and your cyber security organization or cyber security department and cyber security center of excellence should be solving for now: How do we as testers and cyber security company evolve and thrive in SMAC & IoT world?
From tooling to skilling and from strategies to fundamental values what needs to change and how? What are solutions and services available in market which I can leverage? Cyber Security Summit 2019 is an attempt to seek and share answers to these basic questions.

What will you learn about?

Learn latest techniques and skills required to test disruptive technologies from industry stalwarts themselves Latest trends, concepts, processes and tools for cyber security in SMAC & IoT Recognize, understand and acknowledge challenges in cyber security emerging technologies. Meet and network with fellow cyber security experts from leading companies.Learn how to adapt and adopt these changes quickly and swiftly within a team and also across the enterprise.

Are there any prerequisites to attend this program?

No

Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.