Cyber Security for Government 2013 Conference Brochure

Embed Size (px)

Citation preview

  • 7/27/2019 Cyber Security for Government 2013 Conference Brochure

    1/6T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:[email protected] n W:www.cybersecurity-conerence.com.au

    REGISTER NOW!

    Event

    Partner:

    Networking Partner: Media partners:

    Recognising cyber risks and building capabilities to preserve

    data condentiality, integrity, and availability

    EXTRA

    EARLYBIRD

    RegisterNow

    and

    Save$300**

    Oferends7June2013

    FeaturingkeynotesromFederala

    nd

    StateGovernm

    entCIOsandCI

    SOs

    nMain Conerence & Workshops: 6 & 7 August 2013

    nNetworking Drinks: 6 August 2013

    nVenue: LAqua, Cockle Bay Whar, Darling Harbour, Sydney

    5th Annual

    CYBER SECURITYFOR GOVERNMENT2013

    MAKE THE MOST OF YOUR TIME OUT OF OFFICEAND ATTEND OUR INTERACTIVE WORKSHOPS:

    KEY SPEAKERS INCLUDE:

    Assistant Commissioner

    Tim Morris

    National Manager HighTech Crime Operations,AUSTRALIAN FEDERAL

    POLICE

    Karl Maftoum

    CIO, AUSTRALIANCOMMUNICATIONS

    AND MEDIA AUTHORITY

    David Watts

    Commissioner or LawEnorcement Data Security,STATE GOVERNMENT

    VICTORIA

    Dr. Suresh Hungenahally

    CISO, DEPARTMENT OFBUSINESS AND

    INNOVATION

    Andrew Walduck

    CIO,AUSTRALIA POST

    KEY TOPICS TO BE ADDRESSED INCLUDE:

    nSecuring BYOD and mobilenMitigating internal IS threatsnDening the cyber security role or

    the Non-IT personnImplementation challenges o

    application whitelistingnReducing inormation security

    risks o social media adoption

    nMoving towards an integrated,whole o government approach todata security

    nGuarding against mobile malwarethreats

    nPartnering IT and business leadershipto build cyber capabilities

    nImproving cyber security throughsystem design and governance

    WORKSHOP A:

    Eective Sta Training or aMore Cyber Alert Workorce

    WORKSHOP B:

    Meeting BYOD SecurityDemands Designing a Mobile

    Data Protection Strategy andGuarding against Mobile MalwareThreats

    >> For the complete list of speakers, refer to page 2.

    Troy Braban

    CISO,AUSTRALIA POST

  • 7/27/2019 Cyber Security for Government 2013 Conference Brochure

    2/6

    5th Annual

    CYBER SECURITYFOR GOVERNMENT2013

    T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:[email protected] n W:www.cybersecurity-conerence.com.au

    REGISTER NOW!REGISTER NOW!

    Dear ICT/ Security Proessional,

    Id like to invite you to take a rst look at the program or

    Government IQs 5th Annual Cyber Security or Government 2013event.

    The conerence is to be held in Sydney rom 6th-8th August and willbring together ICT Security Directors, Managers, CIOs and CISOsrepresenting Federal, State and local government departments andagencies.

    FOR 2013 OUR KEY AREAS OF FOCUS WILL BE:

    (A) Building capabilities in existing systems and processes

    (B) Data privacy and protection

    (C) Security concerns surrounding BYOD, social media and

    the cloud

    Government IQ understands the increasing importance or theAustralian public sector to mitigate cyber risks rom a whole-o-government policy perspective, down to organisational strategiesthat will encompass people, processes and technical capabilities.

    Benchmark alongside like-minded proessionals acing similarchallenges, and participate in stimulating discussions to uncovernew ideas that you can implement to strengthen your cybersecurity resilience.

    I look orward to seeing you at this event in August.

    Kind regards,

    Elizabeth Li

    Conerence Director Cyber Security or GovernmentGovernment IQ

    EXPERT SPEAKER

    PANEL INCLUDE:

    Assistant Commissioner Tim Morris

    National Manager High Tech CrimeOperations,AUSTRALIAN FEDERAL POLICE

    David Watts

    Commissioner or LawEnorcement Data Security,STATE GOVERNMENT VICTORIA

    Andrew Walduck

    CIO,AUSTRALIA POST

    Karl Matoum

    CIO, AUSTRALIAN COMMUNICATIONSAND MEDIA AUTHORITY

    Dr. Suresh Hungenahally

    CISO, DEPARTMENT OFBUSINESS AND INNOVATION

    Troy Braban

    CISO,AUSTRALIA POST

    Proessor Craig Valli

    Director,ECU Security Research Institute

    Al Blake

    CIO, Department o Sustainability,Environment, Water,POPULATION AND COMMUNITIES

    Mike Holm

    Coordination Centre Manager,AUSCERT

    Dr Jodi Steel

    Director Security and Environment

    Business Team,NICTA

    Pro Gernot Heiser

    Research Group Leader,NICTA

    Troy Braban

    CISO,

    AUSTRALIA POST

    Angela Donohoe

    CIO, OFFICE OF STATE REVENUE,NSW GOVERNMENT

    David Simpson

    Managing Director,CQR CONSULTING

    DO YOU HAVE THE SECURITY SOLUTIONS WEARE LOOKING FOR? GET IN FRONT OF YOURTARGET AUDIENCE

    Benefts o Sponsoring & Exhibiting:

    1. Demonstrate what your solution can do to the Security specialistswho do it on a daily basis

    2. Gain direct access to your target market

    3. Increase your competitive selling advantage

    4. Achieve high prole association with key decision makers

    I you eel that you have a credible oering in this space that you wouldlike to showcase to Government, please contact Christina McLoughlin on+61 (0)2 9229 1044 or [email protected]

    WHO WILL YOU MEET AT CYBER SECURITYFOR GOVERNMENT 2013?

    n CIOs

    n Directors o ICT Securityn Inormation Security Managersn CISOsn Cyber Crime Experts

    n Technical Security Analysts

    n Network Security Ocersn Cyber Intelligence Specialistsn Security Architects

  • 7/27/2019 Cyber Security for Government 2013 Conference Brochure

    3/6

    5th Annual

    CYBER SECURITYFOR GOVERNMENT2013

    DAY ONE:Tuesday, 6 August 2013

    n Maintaining an access control list includingadministrators and users

    Facilitated by Conerence Chair

    12.20 Lunch

    13.20 Not Everything is What it SIEMs

    n Evaluation considerations or using SIEM

    n Some insights when implementing SIEM into a

    multi-platorm IT environment

    n Expectations, perceptions and reality

    Ross Spooner

    Independent IT Security Specialist

    14.00 Cyber Incidents: There isnt Much We Havent Seen!

    n How does AusCERT, Australias premier computeremergency response team, deal with the dailyinfux o cyber threats?

    n A case study o ransomware, and a crystal-ballgaze into where this threat might turn next

    n What keeps the online crime industry in business,

    and how can we stop it?

    Mike Holm

    Coordination Centre Manager, AUSCERT

    14.40 Aternoon tea

    15.10 RESEARCH EXCELLENCE IN ICT: BuildingTrustworthy Systems or E-government

    n Developing ormally proven architecture to

    protect critical systems

    n Designing highly-dependable systems that areresilient to emerging cyber threats

    Dr Jodi Steel

    Director Security and Environment Business Team,NICTA

    Pro Gernot Heiser

    Research Group Leader, NICTA

    16.10 Close o Conerence

    16.15 Networking Drinks (1 hour)

    17.15 WORKSHOP A:Efective Staf Training or a More Cyber Alert

    Workorce

    T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:[email protected] n W:www.cybersecurity-conerence.com.au

    REGISTER NOW!REGISTER NOW!

    08.30 Registration and Welcome Cofee

    09.00 Opening Remarks rom the Chairperson

    09.10 Evolving Cyber Threats Are we Equipped Enoughto Respond?

    n Exploring emerging trends in cyber attacks

    including ransomware n Developing capabilities in our internal control

    mechanisms

    n Building intelligence that highlights currentsecurity activities

    n The human actor - educating employees torecognise a potential raudulent attack

    Assistant Commissioner Tim Morris,National Manager High Tech Crime Operations,

    AUSTRALIAN FEDERAL POLICE

    09.50 Business and IT Leadership or strong Security n How Cyber Security and threats are changing the

    ways executives look at their business

    n How IT and Business leaders can work togetherto build security capability

    n Security conversations or executives: what isreally important

    n Prioritising security investments or businessoutcomes

    Andrew WalduckCIO, AUSTRALIA POST

    10.30 Morning tea

    11.00 Government Initiatives or Stronger InormationSecurity Governance

    n Techniques or stronger governance

    n Strategies at both Commonwealth and State levels

    n Implementation challenges aced at all levels

    n Aligning Commonwealth and State strategies

    David Simpson

    Managing Director, CQR CONSULTING

    11.40 Roundtable Discussion: Reducing InormationSecurity Risks o Social Media Adoption

    n Communicating and enorcing sound usagepolicies among users

    n Tracking your agency's ocial social media

    accounts n Adopting a risk-management approach to

    moderating social media use

    In 2012 the number o serious cyber incidents

    leapt 52 per cent in the frst nine months alone"

    Deence Minister Stephen Smith

  • 7/27/2019 Cyber Security for Government 2013 Conference Brochure

    4/6

    5th Annual

    CYBER SECURITYFOR GOVERNMENT2013

    08.30 Registration and Welcome Cofee

    09.00 Opening Remarks rom the Chairperson

    09.10 Education and Reinorcement Dening the CyberSecurity Role or The Non-IT Person

    n Building an adequate understanding o cyber

    threats and how it maniests

    n Instilling responsibility in each employee towardsdata protection

    n Customising training eorts or varied levels ouser cyber awareness

    n Embedding better cyber security practicesacross the organization

    Dr. Suresh HungenahallyCISO, DEPARTMENT OF BUSINESS AND INNOVATION

    09.50 Managing Data Security Risks o BYOD

    n Applying centralised management and userauthentication

    n Educating users on proper security precautionsto minimise data breaches or leakage

    n Setting network access controls at applicationand device levels

    n How ar a company can or should go incontrolling devices?

    Karl MatoumCIO, AUSTRALIAN COMMUNICATIONS AND MEDIAAUTHORITY

    10.30 Morning tea

    11.00 Data Security and Inormation Privacy Victoriasnew regulatory approach

    n Moving towards an integrated, whole ogovernment approach to data security

    n Responding to emerging challenges aectinginormation privacy and data protection

    n Strengthening the protection o personalinormation in the Victorian public sector

    n Outlining the new Victorian Protective SecurityPolicy Framework (VPSPF)

    David Watts

    Commissioner or Law Enorcement Data Security,STATE GOVERNMENT VICTORIA

    11.40 Roundtable Discussion: Overcoming theImplementation Challenge o Application

    Whitelisting

    n Understanding how whitelisting ts within yourunique IT environment

    n Maximising security while maintaining businessapplication fexibility

    n Evaluating the eectiveness o whitelisting vsother anti-malware technology

    n Articulating the business value o application

    whitelisting vs administrative costs

    Facilitator:

    Al Blake

    CIO, Department o Sustainability, Environment,

    Water, POPULATION AND COMMUNITIES

    DAY TWO:Wednesday, 7 August 2013

    12.20 Lunch

    13.20 Developing Collaborative Efort between Industry

    and Government to combat Cyber Threats

    n Exploring cooperative opportunities between theprivate and public sector in tackling Australia'scyber security challenges

    n Promoting inormation sharing or cyber securitypredictions

    n Maintaining awareness o emerging technologies

    and when to adopt n Examining tomorrows standards or cyber

    security in Australia

    Proessor Craig ValliDirector, ECU SECURITY RESEARCH INSTITUTE

    14.00 Improving IT Security Governance

    n Devising an IT Security Framework that is aligned

    with your organisations needs n Establishing an enterprise wide security

    governance to assist decision making

    n Obtaining senior management engagement atthe highest possible level

    n Ensuring compliance through a consistent

    governance program

    Troy Braban

    CISO, AUSTRALIA POST

    14.40 Aternoon tea

    15.10 PANEL DISCUSSION: Cyber Technology

    Investments Business vs Security n Justiying the business value or cyber security

    investments

    n Prioritising security investments across dierentlayers o management

    n Balancing the need or application security and

    agility o the business

    Panellists:Troy Braban

    CISO,AUSTRALIA POST

    Angela Donohoe

    CIO, OFFICE OF STATE REVENUE

    Karl Matoum CIO, AUSTRALIAN COMMUNICATIONS AND MEDIA

    AUTHORITY

    16.00 Close o Conerence

    17.15 WORKSHOP B:Meeting BYOD Security Demands Designing a

    Mobile Data Protection Strategy and Guarding

    against Mobile Malware

    T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:[email protected] n W:www.cybersecurity-conerence.com.au

    REGISTER NOW!REGISTER NOW!

  • 7/27/2019 Cyber Security for Government 2013 Conference Brochure

    5/6T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:[email protected] n W:www.cybersecurity-conerence.com.au

    REGISTER NOW!REGISTER NOW!

    5th Annual

    CYBER SECURITYFOR GOVERNMENT2013

    INTERACTIVE WORKSHOPS& ABOUT OUR SPONSOR:

    Electronic intelligence

    gathering is beingused against Australiaon a massive scale to

    extract condentialinormation rom

    governments."David Irvine, Director-General o ASIO

    WORKSHOP A: Tuesday, 6 August 2013

    Eective Sta Training ora More Cyber Alert Workorce

    Beyond IT saeguards, government personnel play a vital role inensuring critical data is kept within the organisation. Educating staabout cyber threats and their various maniestations will not only

    help them to recognise possible risks and vulnerabilities but also helporganisations identiy new threats rom the eedback they receive.This workshop will equip you with the necessary training tools to

    eectively disseminate these strategies to users and enable them tounderstand the role they play in mitigating cyber threats.

    Attendees will take away implementation tools or:

    n Conducting task-specic training according to thespecics o each role

    n Complementing procedural documents with scenario training tocover essential points o action in the event o a security breach

    n Incorporating assessment tools to ensure cyber policies areadhered to

    n Sharing assessment results to empower sta to play an active role

    in cyber awareness

    n Gauging sta opinion about security habits to determineeectiveness o measures and procedures

    Facilitator:

    Dr. Suresh Hungenahally

    CISO, DEPARTMENT OF BUSINESS AND INNOVATION

    WORKSHOP B: Wednesday, 7 August 2013

    Meeting BYOD Security Demands Designing a Mobile Data ProtectionStrategy and Guarding against MobileMalware

    With the increasing use o BYOD in government agencies, a cybersecurity strategy has to evolve to account or the growing crop owireless devices in use. Instead o locking down the device itsel,CIOs and security proessionals need to take an inormation-centricapproach to secure the les and applications on devices, wherever it

    moves. This workshop is a practical platorm designed to aid securityproessionals in devising a mobile data protection strategy, coveringthe ollowing areas:

    n Reviewing current mobile malware threats

    n Dierentiating between corporate and personal data onemployee-owned devices that are accessing the network

    n Restricting access to sensitive les and applications throughaccess control and identity management

    n Integrating mobile strategies into your current security ramework

    n Securing the applications that are critical to your agency

    Facilitator:Proessor Craig Valli

    Director, ECU Security Research Institute

    Peter Hannay

    School o Computer and Security Science, ECU

    ABOUT OUR SPONSOR:

    CQR is one o Australias leadinginormation security companies.It oers a portolio o businessand technical services to assistorganisations to eectively

    manage the risk associated with their inormationassets. CQR does not have afliations withvendors security products and so can oer trulyindependent inormation security services.

    CQR has ofces across Australia and in the U.K. Itsclient list includes over two hundred governmentand commercial organisations. Services includeISMS, PCI, BCP and Penetration Testing.

    SAI Global, Australiaslargest, most

    established audit andcertication provider o business managementand improvement systems in Australia, providestraining and certication services or ISO 27001Inormation Security Standards and ISO 20000.1IT Service Standards, alongside EnvironmentalCompliance, OHS, Greenhouse Gases and QualityManagement. For more inormation visitwww.saiglobal.com/assurance, email [email protected] or call 1300 360 314.

  • 7/27/2019 Cyber Security for Government 2013 Conference Brochure

    6/6

    Register Early & Save!To speed registration, please provide the priority code located on the mailing label or in the box below.

    oREGISTER MEor5th Annual CyberSecurity for Government 2013 PLUS:

    oWorkshops: oA oB

    (PHOTOCOPY

    THIS

    FORMFO

    R

    ADDITIONALDELEGATES)

    DELEGATE 1 [FIRST NAME] [SURNAME]

    POSITION

    EMAIL

    DELEGATE 2 [FIRST NAME] [SURNAME]

    EMAIL

    POSITION

    POSITION

    DELEGATE 3 [FIRST NAME] [SURNAME]

    EMAIL

    EMAIL

    ORGANISATION

    ADDRESS

    POSTCODE

    TELEPHONE FAX

    APPROVING MANAGER [FIRST NAME] [SURNAME]

    CHEQUE ENCLOSED FOR $ _____ (Please make cheques payable to: IQPC)

    PLEASE CHARGE American Express Visa MasterCard Diners Club

    CREDIT CARD NUMBER

    AMEX 4 DIGIT C ODE EXPIRY DATE

    NAME OF CARD HOLDER [PLEASE PRINT]

    POSITION

    OTE: PAYMENT IS DUE WITHIN 7 DAYS FROM REGISTRATION TO SECURE YOUR PLACE. Registrations received without payment

    a Government PO will incur a processing ee o $99+GST = $108.90 per registration. Payment prior to the conerence is mandatory

    r attendance. Payment includes lunches, rereshments, a copy o conerence presentations via FTP website or workbook and all

    eeting materials. I payment has not been received two weeks beore the conerence, a credit card hold will be taken and processed.

    his card will be reunded once alternate payment has been received.

    VACY - YOUR CHOICEinormation provided by you in registering or this conerence is being collected by IQPC and will be held in the strictest confdence. It will

    added to our database and will be used primarily to provide you with urther inormation about IQPC events and services. By supplying your

    ail address and mobile telephone number you are agreeing to IQPC contacting you by these means to provide you urther inormation aboutC products and services. From time to time IQPC may share inormation rom our database with other proessional organisations (including

    event sponsors) to promote similar products and services. Please tick the box below i you do NOT want us to pass on your details.

    amend your current details, advise o duplicates or to opt out o urther mailings, please contact our Database Integrity Maintenance Department,el 6, 25 Bligh Street, SYDNEY NSW 2000. Alternatively, email [email protected], call 02 9229 1028 or ax 02 9223 2622.

    I do not wish to have my details made available to other organisations

    IQPC CANCELLATION AND POSTPONEMENT POLICY: FOR DETAILS OF IQPCSCANCELLATION AND POSTPONEMENT POLICY PLEASE VISIT: www.iqpc.com.au 2013 IQPC ABN 92 071 142 446 All RIGHTS RESERVED. The ormat, design, content and arrangemento this brochure constitute a copyright o IQPC. Unauthorised reproduction will be actionable by law.

    yment must be received by IQPC prior to 5pm AEST on the cut-off date.

    gistrations received without payment or a Government PO will incur a processing fee of $99 + GST = $108.90

    registration.

    Please send me _______ set(s) o AUDIO COMPACT DISCS and PRESENTATIONS CD at $878.90

    ($799 plus GST) or $603.90 ($549 plus GST) Presentations CD only

    Please keep me inormed via email about this and other related events

    2 WAYS TO SAVE!

    Book early or HUGEEARLY BIRD savings.

    Book as a TEAM,save & beneft as a team.

    18017.005

    TEAM DISCOUNTS

    WHERE LAqua, Rooftop Level, Cockle Bay Wharf/Wheat Rd, Sydney CBD New South Wales

    2000, Australia

    1300 117 118 www.laqua.com.au

    WHEN? 6 & 7 August 2013

    IQPC recognises the value o learning in teams.Take advantage o one o these special rates: Register a team o 3 to the conerence at the same time rom the same

    company and receive $500 discount Register a team o 4 to the conerence at the same time rom the same

    company and receive a ree pass or a 5th delegate Ask about multi-event discounts. Call + 61 2 9229 1000 or more details

    Please note: Only one discount applies

    ACCOMMODATION

    The Oaks Goldsborough Hotel is the ofcial accommodation partner orthe 5th Annual Cyber Security or Government 2013 event.

    Attendees o the 5th Annual Cyber Security or Government 2013 event areentitled to take advantage o the negotiated rates available at the hotel.

    To check availability or book these rates, go to www.cybersecurity-conerence.com.au and click on the Venue & Accommodation page.

    QUICK and EASY WAYS to REGISTER

    TELEPHONE +61 2 9229 1000

    FAX +61 2 9223 2622

    EMAIL [email protected]

    WEBSITE www.cybersecurity-conference.com.au

    MAIL IQPC, Level 6, 25 Bligh Street, SYDNEY NSW 2000

    STANDARD

    PACKAGESEARLY BIRD

    *Register & pay beore7th June 2013

    STANDARD PRICE

    Conference + 2 WorkshopsSAVE AUD $300

    $4997 + GST = $5496.70$5297 + GST = $5826.70

    Conference + 1 WorkshopSAVE AUD $300

    $4198 + GST = $4617.80$4498 + GST = $4947.80

    Conference OnlySAVE AUD $300

    $3299 + GST = $3628.90$3599 + GST = $3958.90

    VENDOR PACKAGE VENDOR PRICE

    Conference Only $3999 + GST = $4398.90

    SAVE $300

    - -

    nMain Conerence & Workshops: 6 & 7 August 2013

    nNetworking Drinks: 6 August 2013

    nVenue: LAqua, Cockle Bay Whar, Darling Harbour, Sydney

    5th Annual

    CYBER SECURITYFOR GOVERNMENT2013

    CLICK HERE SUBMIT THIS FORM