close
EARLY BIRD TICKETS WILL END SOON
  • Days
  • Hours
  • Minnutes
  • Seconds

Schedule and agenda

8:30am - 9:15am

Registration & exhibition open

9:15am - 9:25am

Welcome from Master of Ceremonies

Bastien Treptel
Bastien Treptel
Co-founder
CTRL Group
9:25am - 9:30am

Welcome from Cyber Daily

9:30am - 9:40am

Welcome & industry overview from Palo Alto Networks

Cindy Dickson
Cindy Dickson
District Sales Manager Federal Government & Defence
Palo Alto Networks
9:45am - 10:15am

Keynote: State of play for what Australian businesses are facing in the online world

Commander Chris Goldsmid
Commander Chris Goldsmid
Acting Assistant Commissioner
Cybercrime Operations, Australian Federal Police
10:20am - 10:45am

Outsmarting the Hackers - Unraveling Today’s Threats for a Secure Tomorrow

Luisa Genovese
Luisa Genovese
Consulting Director
Unit 42, Japan & Asia Pacific at Palo Alto Networks
10:45am - 11:15am

Morning networking break

Business stream

11:15am - 11:30am

Session to be announced


11:35am - 12:10am

Panel: How to prepare your business for the aftermath of a cyber security incident

Cyber security incidents are becoming increasingly prevalent, and no organisation is immune to the potential consequences. To navigate the turbulent waters of a post-incident landscape, businesses need to be proactive in their preparation.

This session will explore essential strategies, recovery plans, and best practices for organisations seeking to emerge stronger after a cyber security incident.

Learn from these industry experts as they share their insights, and gain valuable guidance on how to protect your business and its reputation.

They will discuss:

  • Creating a robust incident response plan
  • Legal and regulatory considerations after a breach
  • Communicating with stakeholders and the public and holding brand identity Navigating the intricacies of cyber insurance
  • Lessons learned from successful incident recoveries

David Hollingworth
David Hollingworth
Senior Journalist
Cyber Daily
Annie Haggar
Annie Haggar
Principal
Cyber GC
Helen Texeira
Helen Texeira
Consulting Director
Unit 42 at Palo Alto Networks

12:15am - 12:40pm

Session to be announced


12:45pm - 1:05pm

Keynote: Public and private partnerships: How to build collaboration between the private sector and Australia's cyber agencies

Minister Chris Steel
Minister Chris Steel
ACT Minister for Skills and Training and the ACT Special Minister of State with responsibility for cyber security

1:10pm - 1:20pm

Spotlight session


1:20pm - 2:20pm

Stream close - Lunch & networking break


Technical stream

11:15am - 11:30am

Session to be announced


11:35am - 11:55am

Keynote: Guest from the ACSC to unpack the most common CVEs impacting Australian businesses and how cyber security leaders can overcome them.


12:00pm - 12:10pm

Spotlight session


12:15pm - 12:40pm

Session to be announced


12:45pm - 1:20pm

Panel: An in-depth examination of the latest malware strains and emerging threat vectors

As the digital landscape continues to evolve, so do the tactics and technologies employed by malicious actors. Understanding the latest malware strains and emerging threat vectors is paramount for organisations and cyber security professionals.

This esteemed session offers an in-depth exploration of the ever-changing world of cyber threats, with a focus on dissecting the newest malware strains and identifying the emerging threat vectors. Join us to stay one step ahead of cyber adversaries.

Our panellists will discuss:

  • Emerging threat vectors such as supply chain attacks, zero-day vulnerabilities, and advanced persistent threats (APTs)
  • Strategies for early detection and prevention
  • What is really unique about the code
  • The role of threat intelligence sharing and collaboration
  • How are threat actors bypassing malware injections to gain access to networks
  • Case studies of recent, high-profile attacks

Liam Garman
Liam Garman
Managing Editor
Defence & Aerospace, Momentum Media
Ashwin Ram
Ashwin Ram
Cyber Security Evangelist
Office of the Chief Technology Officer, Check Point Software Technologies
Corien Vermaak
Corien Vermaak
Director of Cybersecurity
Cisco Australia & New Zealand
Thom Taylor
Thom Taylor
Senior Threat Intelligence Analyst
Unit 42, Palo Alto Networks

1:20pm - 2:20pm

Stream close - Lunch & networking break


2:20pm - 2:50pm

Panel: Protecting Australia's critical infrastructure

The convergence of IT and the Internet of Things (IoT) has revolutionised critical infrastructure, making it more connected and efficient than ever. However, this increased connectivity has created avenues for threat actors to exploit hardware vulnerabilities and target critical infrastructure including energy, transportation, water, healthcare, resources and communications systems.

This session will provide an in-depth examination of how businesses can understand the current and emerging threats to operational technology (OT), and build frameworks to future-proof their IT and OT systems.

Join our panellists as they explore the challenges and opportunities this evolving landscape presents, including:

  • Understanding how threat actors are targeting OT systems
  • Gaining insights into building tailor-made cyber security strategies for OT and IT systems
  • Implementing risk mitigation techniques to protect valuable hardware
  • Ensuring your business can continue operating in the event of an OT attack

Liam Garman
Liam Garman
Managing Editor
Defence & Aerospace, Momentum Media
Chirag Joshi
Chirag Joshi
Founder and CISO
7 Rules Cyber
Maryam Bechtel
Maryam Bechtel
Chief Information Security Officer
AGL Energy
Alex Nehmy
Alex Nehmy
Field Chief Security Officer, Critical Industries
Japan & Asia Pacific, Palo Alto Networks
2:55pm - 3:30pm

Keynote: A year in review: What Australian businesses need to know about the changing cyber security landscape

  • Who are the major threat actors? What are the methods of attack most commonly employed by threat actors to target Australian businesses?
  • Where are Australian businesses most vulnerable? How must they fix them?
  • Are there any tools that have emerged over the last 12 months that IT professionals, cyber security professionals and businesses must be aware of?
  • Have any cyber frameworks proven vulnerable and not strong enough? Are there any frameworks that have overperformed?

Abbas Kudrati
Abbas Kudrati
APAC Chief Cybersecurity Advisor
Microsoft
3:30pm - 3:35pm

MC close

3:35pm - 4:15pm

Networking drinks

4:15pm

Event concludes