CyberResilience&SecuritySummit 2020 Nov. 24, 2020 to Nov. 26, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Australian Government Keynote: Cyber-resilience reforms Mike Pezzullo Being recognized as the superhero of your organizationNever underestimating your skillsCommunicating your value
Case Study: Strengthening strategies to measure and manage cyber risk Asaf Ahmad Reviewing your internal controls and digital profilesIdentifying internal vulnerabilities and external threatsBuilding a proactive cyber ...
To Build Customer Trust – we need to be trustworthy Robinson Roe How well do we protect the Personal Data we collect?Can we keep up with new ...
Interactive Panel Discussion: Planning for cyber-attacks in a sophisticated and complex environment Jo Stewart-rattray , Raghu Gandhy , Hai Tran , Angela Donohoe , Syd Griffith Why CIOs & CISOs are pivotal to the cyber-threat planning conversationWhat it takes to beat ...
Case Study: Investing in trusted technology to protect information assets Angela Donohoe Providing a seamless migration for your ICT upgradesEnsuring your information assets and critical infrastructure is ...
Case Study: Securing your data assets as the security landscape changes Kate Carruthers Adapting to data security issues during Covid-19Investing in cyber-preparedness in a remote setting – people, ...
Case Study: Reducing cyber risks through influencing user behaviour and effective awareness programs Chirag D Joshi Importance of human factor to cybersecurity and why most cyber awareness efforts failTailoring security awareness ...
Forensic-State Post-Breach Compromise Assessments Loris Minassian • Forensically Establish Trust in your IT Environment for the Board and Executives• Ascertain whether ...
Forecast: Security controls for computer systems, networks & critical infrastructure: are we there yet? Emeritus Caelli Tackling the risks associated with the rapid growth of multi-access, resource-sharing computer systems, networks, and ...
International Case Study: Tackling cyber-security for online banking Daniel Hooper How banks are dealing with the rise in cyber-attacksWhy this sector remains vulnerable in cyber-spaceWhy ...
Case Study: Protecting information assets in the cloud Bilal Ahmed Managing enterprise data security in the cloudEnsuring your organisation adapts to cross-border data storage arrangementsClarifying ...
Protecting your sensitive data and securing critical IT infrastructure Chris Goldsmith Coordinating defense against advanced attacksIdentifying and thwarting the attacks
Interactive Panel Discussion: Improving your organisation’s security and governance posture Robinson Roe , Daniel Hooper , Bilal Ahmed , Mitra Minai , Dr Mamoun Alazab , Nathan Morelli Maintaining the right systems and security levels across the enterpriseManaging the design phase to reduce ...
Case Study: Raising the industry’s cyber-security awareness – milestones and challenges Dr Ian Martinus Assessing the economic impact of cyber attacksProtecting your critical infrastructure and information assets in a ...
Strategies to identify and manage vulnerabilities across networks and systems Lani Rafiti Managing your network vulnerabilitiesClarifying the security protocols, firewall, and security managementTackling the vulnerability scanning and ...
Interactive Panel Discussion: Identity management during Covid-19 Vijay Varadharajan , David Tregoning , Damien Manuel , Simon Carabetta How to protect end-user identity when working remotelyUsing the right tools and platforms to manage ...
Cyber Security Business Essentials Simon Carabetta Why be prepared for cyberattacks?Australian Government Information Security Manual (ISM)Essential 8 Cyber Security ControlsThe 9thattack ...