cyber security for government 2013 conference brochure
TRANSCRIPT
-
7/27/2019 Cyber Security for Government 2013 Conference Brochure
1/6T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:[email protected] n W:www.cybersecurity-conerence.com.au
REGISTER NOW!
Event
Partner:
Networking Partner: Media partners:
Recognising cyber risks and building capabilities to preserve
data condentiality, integrity, and availability
EXTRA
EARLYBIRD
RegisterNow
and
Save$300**
Oferends7June2013
FeaturingkeynotesromFederala
nd
StateGovernm
entCIOsandCI
SOs
nMain Conerence & Workshops: 6 & 7 August 2013
nNetworking Drinks: 6 August 2013
nVenue: LAqua, Cockle Bay Whar, Darling Harbour, Sydney
5th Annual
CYBER SECURITYFOR GOVERNMENT2013
MAKE THE MOST OF YOUR TIME OUT OF OFFICEAND ATTEND OUR INTERACTIVE WORKSHOPS:
KEY SPEAKERS INCLUDE:
Assistant Commissioner
Tim Morris
National Manager HighTech Crime Operations,AUSTRALIAN FEDERAL
POLICE
Karl Maftoum
CIO, AUSTRALIANCOMMUNICATIONS
AND MEDIA AUTHORITY
David Watts
Commissioner or LawEnorcement Data Security,STATE GOVERNMENT
VICTORIA
Dr. Suresh Hungenahally
CISO, DEPARTMENT OFBUSINESS AND
INNOVATION
Andrew Walduck
CIO,AUSTRALIA POST
KEY TOPICS TO BE ADDRESSED INCLUDE:
nSecuring BYOD and mobilenMitigating internal IS threatsnDening the cyber security role or
the Non-IT personnImplementation challenges o
application whitelistingnReducing inormation security
risks o social media adoption
nMoving towards an integrated,whole o government approach todata security
nGuarding against mobile malwarethreats
nPartnering IT and business leadershipto build cyber capabilities
nImproving cyber security throughsystem design and governance
WORKSHOP A:
Eective Sta Training or aMore Cyber Alert Workorce
WORKSHOP B:
Meeting BYOD SecurityDemands Designing a Mobile
Data Protection Strategy andGuarding against Mobile MalwareThreats
>> For the complete list of speakers, refer to page 2.
Troy Braban
CISO,AUSTRALIA POST
-
7/27/2019 Cyber Security for Government 2013 Conference Brochure
2/6
5th Annual
CYBER SECURITYFOR GOVERNMENT2013
T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:[email protected] n W:www.cybersecurity-conerence.com.au
REGISTER NOW!REGISTER NOW!
Dear ICT/ Security Proessional,
Id like to invite you to take a rst look at the program or
Government IQs 5th Annual Cyber Security or Government 2013event.
The conerence is to be held in Sydney rom 6th-8th August and willbring together ICT Security Directors, Managers, CIOs and CISOsrepresenting Federal, State and local government departments andagencies.
FOR 2013 OUR KEY AREAS OF FOCUS WILL BE:
(A) Building capabilities in existing systems and processes
(B) Data privacy and protection
(C) Security concerns surrounding BYOD, social media and
the cloud
Government IQ understands the increasing importance or theAustralian public sector to mitigate cyber risks rom a whole-o-government policy perspective, down to organisational strategiesthat will encompass people, processes and technical capabilities.
Benchmark alongside like-minded proessionals acing similarchallenges, and participate in stimulating discussions to uncovernew ideas that you can implement to strengthen your cybersecurity resilience.
I look orward to seeing you at this event in August.
Kind regards,
Elizabeth Li
Conerence Director Cyber Security or GovernmentGovernment IQ
EXPERT SPEAKER
PANEL INCLUDE:
Assistant Commissioner Tim Morris
National Manager High Tech CrimeOperations,AUSTRALIAN FEDERAL POLICE
David Watts
Commissioner or LawEnorcement Data Security,STATE GOVERNMENT VICTORIA
Andrew Walduck
CIO,AUSTRALIA POST
Karl Matoum
CIO, AUSTRALIAN COMMUNICATIONSAND MEDIA AUTHORITY
Dr. Suresh Hungenahally
CISO, DEPARTMENT OFBUSINESS AND INNOVATION
Troy Braban
CISO,AUSTRALIA POST
Proessor Craig Valli
Director,ECU Security Research Institute
Al Blake
CIO, Department o Sustainability,Environment, Water,POPULATION AND COMMUNITIES
Mike Holm
Coordination Centre Manager,AUSCERT
Dr Jodi Steel
Director Security and Environment
Business Team,NICTA
Pro Gernot Heiser
Research Group Leader,NICTA
Troy Braban
CISO,
AUSTRALIA POST
Angela Donohoe
CIO, OFFICE OF STATE REVENUE,NSW GOVERNMENT
David Simpson
Managing Director,CQR CONSULTING
DO YOU HAVE THE SECURITY SOLUTIONS WEARE LOOKING FOR? GET IN FRONT OF YOURTARGET AUDIENCE
Benefts o Sponsoring & Exhibiting:
1. Demonstrate what your solution can do to the Security specialistswho do it on a daily basis
2. Gain direct access to your target market
3. Increase your competitive selling advantage
4. Achieve high prole association with key decision makers
I you eel that you have a credible oering in this space that you wouldlike to showcase to Government, please contact Christina McLoughlin on+61 (0)2 9229 1044 or [email protected]
WHO WILL YOU MEET AT CYBER SECURITYFOR GOVERNMENT 2013?
n CIOs
n Directors o ICT Securityn Inormation Security Managersn CISOsn Cyber Crime Experts
n Technical Security Analysts
n Network Security Ocersn Cyber Intelligence Specialistsn Security Architects
-
7/27/2019 Cyber Security for Government 2013 Conference Brochure
3/6
5th Annual
CYBER SECURITYFOR GOVERNMENT2013
DAY ONE:Tuesday, 6 August 2013
n Maintaining an access control list includingadministrators and users
Facilitated by Conerence Chair
12.20 Lunch
13.20 Not Everything is What it SIEMs
n Evaluation considerations or using SIEM
n Some insights when implementing SIEM into a
multi-platorm IT environment
n Expectations, perceptions and reality
Ross Spooner
Independent IT Security Specialist
14.00 Cyber Incidents: There isnt Much We Havent Seen!
n How does AusCERT, Australias premier computeremergency response team, deal with the dailyinfux o cyber threats?
n A case study o ransomware, and a crystal-ballgaze into where this threat might turn next
n What keeps the online crime industry in business,
and how can we stop it?
Mike Holm
Coordination Centre Manager, AUSCERT
14.40 Aternoon tea
15.10 RESEARCH EXCELLENCE IN ICT: BuildingTrustworthy Systems or E-government
n Developing ormally proven architecture to
protect critical systems
n Designing highly-dependable systems that areresilient to emerging cyber threats
Dr Jodi Steel
Director Security and Environment Business Team,NICTA
Pro Gernot Heiser
Research Group Leader, NICTA
16.10 Close o Conerence
16.15 Networking Drinks (1 hour)
17.15 WORKSHOP A:Efective Staf Training or a More Cyber Alert
Workorce
T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:[email protected] n W:www.cybersecurity-conerence.com.au
REGISTER NOW!REGISTER NOW!
08.30 Registration and Welcome Cofee
09.00 Opening Remarks rom the Chairperson
09.10 Evolving Cyber Threats Are we Equipped Enoughto Respond?
n Exploring emerging trends in cyber attacks
including ransomware n Developing capabilities in our internal control
mechanisms
n Building intelligence that highlights currentsecurity activities
n The human actor - educating employees torecognise a potential raudulent attack
Assistant Commissioner Tim Morris,National Manager High Tech Crime Operations,
AUSTRALIAN FEDERAL POLICE
09.50 Business and IT Leadership or strong Security n How Cyber Security and threats are changing the
ways executives look at their business
n How IT and Business leaders can work togetherto build security capability
n Security conversations or executives: what isreally important
n Prioritising security investments or businessoutcomes
Andrew WalduckCIO, AUSTRALIA POST
10.30 Morning tea
11.00 Government Initiatives or Stronger InormationSecurity Governance
n Techniques or stronger governance
n Strategies at both Commonwealth and State levels
n Implementation challenges aced at all levels
n Aligning Commonwealth and State strategies
David Simpson
Managing Director, CQR CONSULTING
11.40 Roundtable Discussion: Reducing InormationSecurity Risks o Social Media Adoption
n Communicating and enorcing sound usagepolicies among users
n Tracking your agency's ocial social media
accounts n Adopting a risk-management approach to
moderating social media use
In 2012 the number o serious cyber incidents
leapt 52 per cent in the frst nine months alone"
Deence Minister Stephen Smith
-
7/27/2019 Cyber Security for Government 2013 Conference Brochure
4/6
5th Annual
CYBER SECURITYFOR GOVERNMENT2013
08.30 Registration and Welcome Cofee
09.00 Opening Remarks rom the Chairperson
09.10 Education and Reinorcement Dening the CyberSecurity Role or The Non-IT Person
n Building an adequate understanding o cyber
threats and how it maniests
n Instilling responsibility in each employee towardsdata protection
n Customising training eorts or varied levels ouser cyber awareness
n Embedding better cyber security practicesacross the organization
Dr. Suresh HungenahallyCISO, DEPARTMENT OF BUSINESS AND INNOVATION
09.50 Managing Data Security Risks o BYOD
n Applying centralised management and userauthentication
n Educating users on proper security precautionsto minimise data breaches or leakage
n Setting network access controls at applicationand device levels
n How ar a company can or should go incontrolling devices?
Karl MatoumCIO, AUSTRALIAN COMMUNICATIONS AND MEDIAAUTHORITY
10.30 Morning tea
11.00 Data Security and Inormation Privacy Victoriasnew regulatory approach
n Moving towards an integrated, whole ogovernment approach to data security
n Responding to emerging challenges aectinginormation privacy and data protection
n Strengthening the protection o personalinormation in the Victorian public sector
n Outlining the new Victorian Protective SecurityPolicy Framework (VPSPF)
David Watts
Commissioner or Law Enorcement Data Security,STATE GOVERNMENT VICTORIA
11.40 Roundtable Discussion: Overcoming theImplementation Challenge o Application
Whitelisting
n Understanding how whitelisting ts within yourunique IT environment
n Maximising security while maintaining businessapplication fexibility
n Evaluating the eectiveness o whitelisting vsother anti-malware technology
n Articulating the business value o application
whitelisting vs administrative costs
Facilitator:
Al Blake
CIO, Department o Sustainability, Environment,
Water, POPULATION AND COMMUNITIES
DAY TWO:Wednesday, 7 August 2013
12.20 Lunch
13.20 Developing Collaborative Efort between Industry
and Government to combat Cyber Threats
n Exploring cooperative opportunities between theprivate and public sector in tackling Australia'scyber security challenges
n Promoting inormation sharing or cyber securitypredictions
n Maintaining awareness o emerging technologies
and when to adopt n Examining tomorrows standards or cyber
security in Australia
Proessor Craig ValliDirector, ECU SECURITY RESEARCH INSTITUTE
14.00 Improving IT Security Governance
n Devising an IT Security Framework that is aligned
with your organisations needs n Establishing an enterprise wide security
governance to assist decision making
n Obtaining senior management engagement atthe highest possible level
n Ensuring compliance through a consistent
governance program
Troy Braban
CISO, AUSTRALIA POST
14.40 Aternoon tea
15.10 PANEL DISCUSSION: Cyber Technology
Investments Business vs Security n Justiying the business value or cyber security
investments
n Prioritising security investments across dierentlayers o management
n Balancing the need or application security and
agility o the business
Panellists:Troy Braban
CISO,AUSTRALIA POST
Angela Donohoe
CIO, OFFICE OF STATE REVENUE
Karl Matoum CIO, AUSTRALIAN COMMUNICATIONS AND MEDIA
AUTHORITY
16.00 Close o Conerence
17.15 WORKSHOP B:Meeting BYOD Security Demands Designing a
Mobile Data Protection Strategy and Guarding
against Mobile Malware
T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:[email protected] n W:www.cybersecurity-conerence.com.au
REGISTER NOW!REGISTER NOW!
-
7/27/2019 Cyber Security for Government 2013 Conference Brochure
5/6T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:[email protected] n W:www.cybersecurity-conerence.com.au
REGISTER NOW!REGISTER NOW!
5th Annual
CYBER SECURITYFOR GOVERNMENT2013
INTERACTIVE WORKSHOPS& ABOUT OUR SPONSOR:
Electronic intelligence
gathering is beingused against Australiaon a massive scale to
extract condentialinormation rom
governments."David Irvine, Director-General o ASIO
WORKSHOP A: Tuesday, 6 August 2013
Eective Sta Training ora More Cyber Alert Workorce
Beyond IT saeguards, government personnel play a vital role inensuring critical data is kept within the organisation. Educating staabout cyber threats and their various maniestations will not only
help them to recognise possible risks and vulnerabilities but also helporganisations identiy new threats rom the eedback they receive.This workshop will equip you with the necessary training tools to
eectively disseminate these strategies to users and enable them tounderstand the role they play in mitigating cyber threats.
Attendees will take away implementation tools or:
n Conducting task-specic training according to thespecics o each role
n Complementing procedural documents with scenario training tocover essential points o action in the event o a security breach
n Incorporating assessment tools to ensure cyber policies areadhered to
n Sharing assessment results to empower sta to play an active role
in cyber awareness
n Gauging sta opinion about security habits to determineeectiveness o measures and procedures
Facilitator:
Dr. Suresh Hungenahally
CISO, DEPARTMENT OF BUSINESS AND INNOVATION
WORKSHOP B: Wednesday, 7 August 2013
Meeting BYOD Security Demands Designing a Mobile Data ProtectionStrategy and Guarding against MobileMalware
With the increasing use o BYOD in government agencies, a cybersecurity strategy has to evolve to account or the growing crop owireless devices in use. Instead o locking down the device itsel,CIOs and security proessionals need to take an inormation-centricapproach to secure the les and applications on devices, wherever it
moves. This workshop is a practical platorm designed to aid securityproessionals in devising a mobile data protection strategy, coveringthe ollowing areas:
n Reviewing current mobile malware threats
n Dierentiating between corporate and personal data onemployee-owned devices that are accessing the network
n Restricting access to sensitive les and applications throughaccess control and identity management
n Integrating mobile strategies into your current security ramework
n Securing the applications that are critical to your agency
Facilitator:Proessor Craig Valli
Director, ECU Security Research Institute
Peter Hannay
School o Computer and Security Science, ECU
ABOUT OUR SPONSOR:
CQR is one o Australias leadinginormation security companies.It oers a portolio o businessand technical services to assistorganisations to eectively
manage the risk associated with their inormationassets. CQR does not have afliations withvendors security products and so can oer trulyindependent inormation security services.
CQR has ofces across Australia and in the U.K. Itsclient list includes over two hundred governmentand commercial organisations. Services includeISMS, PCI, BCP and Penetration Testing.
SAI Global, Australiaslargest, most
established audit andcertication provider o business managementand improvement systems in Australia, providestraining and certication services or ISO 27001Inormation Security Standards and ISO 20000.1IT Service Standards, alongside EnvironmentalCompliance, OHS, Greenhouse Gases and QualityManagement. For more inormation visitwww.saiglobal.com/assurance, email [email protected] or call 1300 360 314.
-
7/27/2019 Cyber Security for Government 2013 Conference Brochure
6/6
Register Early & Save!To speed registration, please provide the priority code located on the mailing label or in the box below.
oREGISTER MEor5th Annual CyberSecurity for Government 2013 PLUS:
oWorkshops: oA oB
(PHOTOCOPY
THIS
FORMFO
R
ADDITIONALDELEGATES)
DELEGATE 1 [FIRST NAME] [SURNAME]
POSITION
EMAIL
DELEGATE 2 [FIRST NAME] [SURNAME]
EMAIL
POSITION
POSITION
DELEGATE 3 [FIRST NAME] [SURNAME]
EMAIL
EMAIL
ORGANISATION
ADDRESS
POSTCODE
TELEPHONE FAX
APPROVING MANAGER [FIRST NAME] [SURNAME]
CHEQUE ENCLOSED FOR $ _____ (Please make cheques payable to: IQPC)
PLEASE CHARGE American Express Visa MasterCard Diners Club
CREDIT CARD NUMBER
AMEX 4 DIGIT C ODE EXPIRY DATE
NAME OF CARD HOLDER [PLEASE PRINT]
POSITION
OTE: PAYMENT IS DUE WITHIN 7 DAYS FROM REGISTRATION TO SECURE YOUR PLACE. Registrations received without payment
a Government PO will incur a processing ee o $99+GST = $108.90 per registration. Payment prior to the conerence is mandatory
r attendance. Payment includes lunches, rereshments, a copy o conerence presentations via FTP website or workbook and all
eeting materials. I payment has not been received two weeks beore the conerence, a credit card hold will be taken and processed.
his card will be reunded once alternate payment has been received.
VACY - YOUR CHOICEinormation provided by you in registering or this conerence is being collected by IQPC and will be held in the strictest confdence. It will
added to our database and will be used primarily to provide you with urther inormation about IQPC events and services. By supplying your
ail address and mobile telephone number you are agreeing to IQPC contacting you by these means to provide you urther inormation aboutC products and services. From time to time IQPC may share inormation rom our database with other proessional organisations (including
event sponsors) to promote similar products and services. Please tick the box below i you do NOT want us to pass on your details.
amend your current details, advise o duplicates or to opt out o urther mailings, please contact our Database Integrity Maintenance Department,el 6, 25 Bligh Street, SYDNEY NSW 2000. Alternatively, email [email protected], call 02 9229 1028 or ax 02 9223 2622.
I do not wish to have my details made available to other organisations
IQPC CANCELLATION AND POSTPONEMENT POLICY: FOR DETAILS OF IQPCSCANCELLATION AND POSTPONEMENT POLICY PLEASE VISIT: www.iqpc.com.au 2013 IQPC ABN 92 071 142 446 All RIGHTS RESERVED. The ormat, design, content and arrangemento this brochure constitute a copyright o IQPC. Unauthorised reproduction will be actionable by law.
yment must be received by IQPC prior to 5pm AEST on the cut-off date.
gistrations received without payment or a Government PO will incur a processing fee of $99 + GST = $108.90
registration.
Please send me _______ set(s) o AUDIO COMPACT DISCS and PRESENTATIONS CD at $878.90
($799 plus GST) or $603.90 ($549 plus GST) Presentations CD only
Please keep me inormed via email about this and other related events
2 WAYS TO SAVE!
Book early or HUGEEARLY BIRD savings.
Book as a TEAM,save & beneft as a team.
18017.005
TEAM DISCOUNTS
WHERE LAqua, Rooftop Level, Cockle Bay Wharf/Wheat Rd, Sydney CBD New South Wales
2000, Australia
1300 117 118 www.laqua.com.au
WHEN? 6 & 7 August 2013
IQPC recognises the value o learning in teams.Take advantage o one o these special rates: Register a team o 3 to the conerence at the same time rom the same
company and receive $500 discount Register a team o 4 to the conerence at the same time rom the same
company and receive a ree pass or a 5th delegate Ask about multi-event discounts. Call + 61 2 9229 1000 or more details
Please note: Only one discount applies
ACCOMMODATION
The Oaks Goldsborough Hotel is the ofcial accommodation partner orthe 5th Annual Cyber Security or Government 2013 event.
Attendees o the 5th Annual Cyber Security or Government 2013 event areentitled to take advantage o the negotiated rates available at the hotel.
To check availability or book these rates, go to www.cybersecurity-conerence.com.au and click on the Venue & Accommodation page.
QUICK and EASY WAYS to REGISTER
TELEPHONE +61 2 9229 1000
FAX +61 2 9223 2622
EMAIL [email protected]
WEBSITE www.cybersecurity-conference.com.au
MAIL IQPC, Level 6, 25 Bligh Street, SYDNEY NSW 2000
STANDARD
PACKAGESEARLY BIRD
*Register & pay beore7th June 2013
STANDARD PRICE
Conference + 2 WorkshopsSAVE AUD $300
$4997 + GST = $5496.70$5297 + GST = $5826.70
Conference + 1 WorkshopSAVE AUD $300
$4198 + GST = $4617.80$4498 + GST = $4947.80
Conference OnlySAVE AUD $300
$3299 + GST = $3628.90$3599 + GST = $3958.90
VENDOR PACKAGE VENDOR PRICE
Conference Only $3999 + GST = $4398.90
SAVE $300
- -
nMain Conerence & Workshops: 6 & 7 August 2013
nNetworking Drinks: 6 August 2013
nVenue: LAqua, Cockle Bay Whar, Darling Harbour, Sydney
5th Annual
CYBER SECURITYFOR GOVERNMENT2013
CLICK HERE SUBMIT THIS FORM