The enterprises across Australia and New Zealand are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and support the digital economy.
Can they align their strategy with the business priorities and rise to the expectations? What does digital innovation mean to security, and where is the disconnect? What needs to change both tactically and strategically to build a cyber-resilient organization?
The keynote sets the tone for the board room agenda, how to get the ‘buy-in’ from the CEO and the board to invest in the resources you require, what should the board expect to understand about cybersecurity, and what can it do to eliminate obstacles that prevent organizations from developing a culture of proactive security?
Zero trust revolutionizes network security architecture: it is data-centric and designed to stop data breaches. The ‘zero trust’ concept also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st-century networks have been adopted by government entities and large enterprises worldwide.
In this plenary session, John will discuss:
Some organizations have a 24x7 security operations center (SOC) with teams of dedicated analysts monitoring for threats around the clock, while some organizations are deep in the trenches of building out their security program. Whether you have a formal SOC, are in the weeds of building or optimizing your security program, the desired outcome to detect and respond to threats fast remains.
The session will discuss:
New strains of ransomware are leaving organizations vulnerable, and security teams often cannot respond proportionately to an attack, leading to cyber disruption across the organization.
Join Tony Jarvis, Darktrace’s Director of Enterprise Security (APJ), as he unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
This presentation will discuss:
Ransomware attacks are becoming all-pervasive across organizations not limited to any region. The security teams need to be conscious of the five stages of its attack pattern—be it initial exploitation, installation, backup destruction, encryption, and extortion. What are some of the tactics attackers use to accomplish the goals, and what are some effective defense techniques security teams need to adopt in fighting ransomware intrusions?
The session will discuss:
Security leaders say that an effective cyber crisis management is primarily a proactive approach to building enterprise resiliency. The strategy to make the resiliency align with the security, data protection, and tools with business priorities and enterprise risks. Do you agree that security teams need to build better resonance with regulations, frameworks, standards, controls, and threats for effective cyber crisis management? How do you build an empathy, alignment, trust, and collaborative environment and integrate with people, process, and technology to prepare for the crisis?
The session will discuss:
Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and part of technology innovation? Is the CTO function aligned with security in driving innovation? Meeting the Expectations. Where is the Disconnect?
The session discusses how to get a CTO and the CISO on a common goal to facilitate the continued success of their organization. Where is the disconnect?
As CISOs, we play key bridging roles between corporate leadership at the very senior levels, and the security organisation. We need to be able to see the bigger picture and link that to the everyday realities of security and other IS professionals that are the engine room of the enterprise. It is a very delicate balancing act. How then, do we maintain this balance and ensure we do not get lost in the details and yet be able to maintain the integrity of the profession? This calls for a paradigm shift in how we manage technology related business risk. We need to evolve a strategic value risk model that provides business value and enables optimization of risk profile, maximization of risk posture, improves agility and maximisation of the efficiencies of key controls across the enterprise.
The session will discuss:
When striking a deal in person or with a third-party, we often ask for a documented agreement that can assist in maintaining confidentiality, integrity, and availability of the systems and infrastructure. The biggest challenge for CISOs today is to establish security when the machines are talking to each other and also in a siloed environment, especially because of the relentless surge in cyberattacks against the systems and networks.
The session will discuss how to establish and maintain security when communication is happening over the network and:
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. However, it can also be an attack on one of your service providers which can lead to an easy compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response .
The session will discuss:
The need for enhanced business agility and secure remote access to support digital transformation has led to adopting the secure access service edge, or SASE, model among enterprises, the phrase coined by Gartner in 2019.
Some say CISOs now don't have to procure individual discrete security solutions and tie them into the network security layer; instead, they can source from one logical place using the SASE security model. What kind of changes do you need to bring in the operational procedures to take advantage of the centralized control that SASE drives?
The session will discuss:
For many security teams, it's been all hands-on deck since the Apache Log4j zero-day vulnerability recently came to light. The vulnerability, CVE-2021-44228, is part of the open-source Log4j 2 software library. Its component, used for logging events, is part of tens of thousands of deployed applications and cloud-based services affecting organizations across geographies.
Experts say that the security threat posed by the bug is "about as serious as it gets," and organizations are now racing to try and identify their risks and exposure levels.
The session will discuss:
Defending against ransomware attacks has been a massive challenge for CISOs. With enterprise backups becoming targets for cybercriminals, it has further intensified.
In ransomware attacks, cybercriminals attack through the backups because they know that security practitioners rely on backups to save themselves after a ransomware attack. Question have been raised around the recovery and response process capabilities. What needs to change as CISOs experience increasing hacking burnout in preventing such malware intrusions? Can they operationalize technology in their prevention and incidence response mechanism to address ransomware issues?
The panel will discuss:
The enterprises across Australia and New Zealand are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and support the digital economy.
Can they align their strategy with the business priorities and rise to the expectations? What does digital innovation mean to security, and where is the disconnect? What needs to change both tactically and strategically to build a cyber-resilient organization?
The keynote sets the tone for the board room agenda, how to get the ‘buy-in’ from the CEO and the board to invest in the resources you require, what should the board expect to understand about cybersecurity, and what can it do to eliminate obstacles that prevent organizations from developing a culture of proactive security?
Zero trust revolutionizes network security architecture: it is data-centric and designed to stop data breaches. The ‘zero trust’ concept also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st-century networks have been adopted by government entities and large enterprises worldwide.
In this plenary session, John will discuss:
Some organizations have a 24x7 security operations center (SOC) with teams of dedicated analysts monitoring for threats around the clock, while some organizations are deep in the trenches of building out their security program. Whether you have a formal SOC, are in the weeds of building or optimizing your security program, the desired outcome to detect and respond to threats fast remains.
The session will discuss:
New strains of ransomware are leaving organizations vulnerable, and security teams often cannot respond proportionately to an attack, leading to cyber disruption across the organization.
Join Tony Jarvis, Darktrace’s Director of Enterprise Security (APJ), as he unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
This presentation will discuss:
Ransomware attacks are becoming all-pervasive across organizations not limited to any region. The security teams need to be conscious of the five stages of its attack pattern—be it initial exploitation, installation, backup destruction, encryption, and extortion. What are some of the tactics attackers use to accomplish the goals, and what are some effective defense techniques security teams need to adopt in fighting ransomware intrusions?
The session will discuss:
Security leaders say that an effective cyber crisis management is primarily a proactive approach to building enterprise resiliency. The strategy to make the resiliency align with the security, data protection, and tools with business priorities and enterprise risks. Do you agree that security teams need to build better resonance with regulations, frameworks, standards, controls, and threats for effective cyber crisis management? How do you build an empathy, alignment, trust, and collaborative environment and integrate with people, process, and technology to prepare for the crisis?
The session will discuss:
Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and part of technology innovation? Is the CTO function aligned with security in driving innovation? Meeting the Expectations. Where is the Disconnect?
The session discusses how to get a CTO and the CISO on a common goal to facilitate the continued success of their organization. Where is the disconnect?
As CISOs, we play key bridging roles between corporate leadership at the very senior levels, and the security organisation. We need to be able to see the bigger picture and link that to the everyday realities of security and other IS professionals that are the engine room of the enterprise. It is a very delicate balancing act. How then, do we maintain this balance and ensure we do not get lost in the details and yet be able to maintain the integrity of the profession? This calls for a paradigm shift in how we manage technology related business risk. We need to evolve a strategic value risk model that provides business value and enables optimization of risk profile, maximization of risk posture, improves agility and maximisation of the efficiencies of key controls across the enterprise.
The session will discuss:
When striking a deal in person or with a third-party, we often ask for a documented agreement that can assist in maintaining confidentiality, integrity, and availability of the systems and infrastructure. The biggest challenge for CISOs today is to establish security when the machines are talking to each other and also in a siloed environment, especially because of the relentless surge in cyberattacks against the systems and networks.
The session will discuss how to establish and maintain security when communication is happening over the network and:
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. However, it can also be an attack on one of your service providers which can lead to an easy compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response .
The session will discuss:
The need for enhanced business agility and secure remote access to support digital transformation has led to adopting the secure access service edge, or SASE, model among enterprises, the phrase coined by Gartner in 2019.
Some say CISOs now don't have to procure individual discrete security solutions and tie them into the network security layer; instead, they can source from one logical place using the SASE security model. What kind of changes do you need to bring in the operational procedures to take advantage of the centralized control that SASE drives?
The session will discuss:
For many security teams, it's been all hands-on deck since the Apache Log4j zero-day vulnerability recently came to light. The vulnerability, CVE-2021-44228, is part of the open-source Log4j 2 software library. Its component, used for logging events, is part of tens of thousands of deployed applications and cloud-based services affecting organizations across geographies.
Experts say that the security threat posed by the bug is "about as serious as it gets," and organizations are now racing to try and identify their risks and exposure levels.
The session will discuss:
Defending against ransomware attacks has been a massive challenge for CISOs. With enterprise backups becoming targets for cybercriminals, it has further intensified.
In ransomware attacks, cybercriminals attack through the backups because they know that security practitioners rely on backups to save themselves after a ransomware attack. Question have been raised around the recovery and response process capabilities. What needs to change as CISOs experience increasing hacking burnout in preventing such malware intrusions? Can they operationalize technology in their prevention and incidence response mechanism to address ransomware issues?
The panel will discuss:
February 16 - 17, 2022
ANZ Summit