2019 NZ Cyber Security Summit

Securing NZ businesses against the next generation of cyber attack

16 Oct 2019Te Papa Tongarewa, Wellington

Agenda

8.30
Registration and coffee
9.00
Welcome from the Chair
Hilary Walton, Manager Enterprise Business Systems & Organisational Psychologist, Airways New Zealand
9.10
Ministerial Address
Minister is under invitation
9.30
Opening Keynote: The State of Cyber Security in New Zealand

Paul Ash, Acting Director, National Security Policy Directorate, Department of the Prime Minister and Cabinet

Insights from the National Cyber Policy Office.

10.00
Threat Landscape 2019: Cyber Security insights from the inside

Mark Thomas, VP Cyber Security, NTT Global

Enterprises are continuously experiencing cyber attacks in today’s digital world. Challenges including compliance management, coin mining, web-based attacks, and credential theft have been seen over the past year. In this session, we will provide insights about top cyber attacks and shifting threat landscape. We will also discuss best practices and practical measures you can take to bolster your cyber security defences.

10.30
Morning break
11.00
Roundtables

Delegates will be invited to choose their topics of choice at these facilitated discussions. Lead by an industry expert, connect and network with your peers around the challenges and triumphs with your cyber security journey

  1. Secure your Cloud with confidence
  2. Real-time Cyber Security and visibility for industrial control networks
  3. The future of Smart Cities and IoT – balancing interconnectivity with security protocols
  4. Recovering from cyber incidents
  5. The future of cyber leadership – what traits and skills do we need for a modern CISO
  6. Privacy vs security in the data-driven economy – what do we need to keep in mind
  7. AI and security – friend or foe
  8. Trust and verification – curating a collaborative relationship with your security suppliers
  9. Security architecture – building frameworks and resilience from the ground floor
  10. Cyber strategies – best practice, adoption and deployment
12.20
Lunch
1.20
The Confidence Game: How attackers exploit people, and how to stop them

Crispin Kerr, Country Manager, Proofpoint ANZ

We’ve long known that phishing and social engineering are the ways most organisations get compromised. Attackers know it’s much easier to find someone who will click than to find a working exploit for a modern operating system or browser. However, most organisations have very little idea which of their people receive these threats. We call these targets VAPs (Very Attacked People), and they may not be who you would expect.  In this presentation you will learn:

  • How to identify who is being attacked in your organisation
  • How to use that data to better understand your adversaries
  • How to tailor a protection plan for your riskiest people
1.40
Identity based access in a changing threat landscape

Mark Smith, Senior Sales Engineer, Okta

We now live in a world where new threats emerge on almost a daily basis and where the perimeter can no longer be counted on as the primary form of defence. By leveraging identity as the foundation on which to build access it is possible to ensure that the right people are given the right access for the shortest amount of time possible.

2.00
Survival of the Fastest

Aris Koios, Sales Engineering Manager – ANZ, CrowdStrike

Today’s cyber-landscape is survival of the fastest. This session will provide insights into some of CrowdStrike’s most eye-opening breach investigations of the past year, and their implications for organisations of all sizes, regardless of their industry or country of origin. We will address emerging best practices and priorities related to planning, readiness and response.  

2.20
Leveraging Integrated Threat Intelligence To Drive Improved Security Decisions

Garrett O’Hara, Principal Technical Consultant, Mimecast

The race to keep up with emerging threats has driven a proliferation of security solutions, which has left often under-resourced security teams struggling with a growing array of point products and independent static security controls - with no orchestration between them.

In this session, Garrett dives into:

  • Why orchestration is essential to scaling security team capabilities
  • Methods for integrating your security tools and processes
  • How to automate routine tasks, work smarter and respond faster, strengthening your cyber resilience
2.40
Afternoon break
3.20
Rethinking our approach to Cyber Security

David Eaton, Associate Director, Cyber Security NZ, Datacom

.

3.50
Panel Discussion: Human factors in cyber security - engaging staff, improving organisational resilience and proactive security architecture
  • Developing strong security risk frameworks
  • Building a security aware culture – training, awareness and threat identification
  • Mitigating the effects of human errors – improving security architecture to deflect and protect
Hilary Walton, Manager Enterprise Business Systems & Organisational Psychologist, Airways New Zealand
Jenny Botton, Information Security Manager, Auckland Council
Christian Probst, Head of School of Computing and Information Technology, Director High-Tech Transdisciplinary Research & Research Lead Cyber Security & Unitec Institute of Technology

4.20
Closing Keynote

Theo Nassiokas, Director - APAC Cyber & Information Security, Barclays (Singapore)

Theo will share his experiences around Cyber strategies and the foreign policy impact. 

4.50
Summary remarks from the Chair & Networking Drinks
Share
  • MAJOR SPONSORS







Copyright © 2019 Conferenz Ltd.