|
Main Summit Day 2 – Thursday, 8 June 2023
|
|
TIME |
AGENDA |
|
10:00 |
Welcoming Speech, Opening Remarks & Thank You Sponsor Speech By Summit Producer |
|
|
|
|
10:10 |
Welcome Address By Summit Chairperson |
|
|
Brenda van Rensburg
GRC Specialist within Privacy & Information Security
|
|
|
|
|
10:15 |
Meeting New Cybersecurity Challenges In Australia |
|
|
Hamish Hansford
Head, Cyber Security Policy
Australian Federal Department of Home Affairs
|
|
|
|
|
10:50 |
Securing The Future Of Work With Cyber AI |
|
|
The future of work remains unpredictable. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of regional or even global crises, and while sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience.In this session, learn about:
- Emerging threats from the transition to remote work
- How AI has adapted to new patterns of work
- Darktrace’s use of Cyber AI to protect the dynamic workforce
- Defensive Autonomous Response capabilities
|
|
|
Sushant Arora
Regional VP, ANZ
Darktrace |
|
|
|
|
11:25 |
Breakout Session |
|
|
Room A: Colonial Pipeline: A Case Study On How To Scare The US Government With Ransomware |
|
|
Michael Connory
CEO
Security In Depth
|
|
|
Room B: Antigena Network & Cyber AI Analyst |
|
|
Antigena Network
Antigena Network neutralizes novel attacks and insider threats across the corporate network and Internet of Things. While pre-programmed response tools tend to rely on simplistic pattern matching and static logic, Antigena Network’s decisions are informed by an ever-evolving understanding and awareness of normal and benign behavior. In this way, self-learning AI delivers a categorically different response that understands how, when, and where to neutralize an emerging threat, while allowing the business to operate as usual. |
|
|
Cyber AI Analyst
Powered by advanced artificial intelligence, Cyber AI Analyst can sift through large volumes of data at speed and scale, augmenting human teams and buying back time to focus on strategic work. Its investigations are enterprise-wide, allowing the technology to piece together disparate anomalies before settling on a high-level conclusion about the nature, root cause, and extent of the wider security incident. This powerful analytical capability has been found to reduce triage time by up to 92%.
|
|
|
Audrey Isaac
Account Executive
Darktrace |
|
|
|
|
12:30 |
Lunch Break |
|
|
|
|
13:30 |
Welcome Address By Summit Chairperson |
|
|
Udaya Wijesinghe
Senior Cyber Security Architect
Optus |
|
|
|
|
13:32 |
The Securing Of Buildings And Smart Cities |
|
|
Bob Sharon
Founder & Chief Innovation Officer
Blue IoT
|
|
|
|
|
14:05 |
Instilling The Hacker Mindset To Upskill Your Risk Team |
|
|
Sumeet Kukar
CEO
Arascina |
|
|
|
|
14:40 |
CCTV And Cyber Security |
|
|
Johnny Lee
Smart City & Critical Infrastructure – Business Development Manager
Axis Communications |
|
|
Oshana Jouna
Sales Engineering & Training Manager
Axis Communications |
|
|
|
|
15:15 |
Don’t Pay The Ransom. Rapidly Recover From Ransomware With Rubrik |
|
|
- The current security landscape – why & how big organisations are still being hit and what they could have in place to recover imminently without ransom being contemplated
- What you can do to prepare for and recover from an attack
- Best practices for constructing and managing a security strategy
|
|
|
Dale Heath
Head of Solutions Engineering
Rubrik
|
|
|
|
|
15:45 |
Extortionware: Your Privacy Problems Made Public |
|
|
Over the last decade, ransomware has increasingly become the most popular option for hackers to monetise the access they’ve obtained to corporate computer systems around the world. Over the last few years, we’ve observed the ransomware software and techniques adapt and evolve to include the theft and exposure of private information, creating extortionware as a new breed of malicious software. This talk will provide an overview of these techniques and discuss the potential privacy and security impacts you may face as a result. |
|
|
Lonnie Benavides
Head of Infrastructure and Application Security
OneLogin |
|
|
|
|
16:15 |
Closing Remarks By Summit Chairperson |
|