NZ Cyber Security Summit

Securing NZ businesses against the next generation of cyber attack

Agenda

8.30
Registration and coffee
9.00
Welcome from the Chair
9.10
The government has a role to play in cyber security – but not on its own
Heather Ward, Principal Advisor, National Cyber Policy Office
  • The government is committed to ensuring New Zealand is secure and confident in a digital world
  • What are the challenges in ensuring NZ is secure in a digital world?
  • How can we leverage the opportunities presented?
9.50
Living in a multi-Cloud world - Connect, secure, automate
Neville Burdan, Director for Cyber Security, Dimension Data Asia Pacific
  • Keeping up with the demands and agility of your enterprise’s digital business
  • Ensuring the right security paradigms to counteract multi-Cloud risks
  • Selecting the right deployment model, platform or provider, end-to-end visibility and managed services options to best suit your enterprise
10.30
Morning break
11.00
ROUNDTABLES
ROUND 1:
  1. Data Security Intelligence, do you understand your data? – Dimension Data
  2. How do you secure an Agile project team operating at a million miles an hour? – Dimension Data
  3. What’s all the fuss about securing operational technology - how vulnerable is our critical national infrastructure really? – Dimension Data
  4. Beyond traditional data security approaches - Illumio
  5. The next gen cyber security talent – getting the talent mix right - Cylance
  6. Responding to and recovering from cyber incidents - Trustwave
  7. It’s in the Cloud – we’re safe, aren’t we? – Cyber Security Foundry
  8. What will set cyber leaders apart from the pack? - Cylance
  9. Achieving Digital Transformation with an Encrypt Everything Strategy - Thales
  10. Learning from High Profile Breaches and Stopping the Next - Crowdstrike
11.45
ROUND 2:
  1. Data Security Intelligence, do you understand your data? – Dimension Data
  2. How do you secure an Agile project team operating at a million miles an hour? – Dimension Data
  3. What’s all the fuss about securing operational technology - how vulnerable is our critical national infrastructure really? – Dimension Data
  4. Beyond traditional data security approaches - Illumio
  5. The next gen cyber security talent – getting the talent mix right - Cylance
  6. Responding to and recovering from cyber incidents - Trustwave
  7. It’s in the Cloud – we’re safe, aren’t we? – Cyber Security Foundry
  8. What will set cyber leaders apart from the pack? - Cylance
  9. Achieving Digital Transformation with an Encrypt Everything Strategy - Thales
  10. Learning from High Profile Breaches and Stopping the Next - Crowdstrike
12.30
Lunch break
1.20
Creating the Agile SOC: Lessons learned and what does good look like?
BRADLEY ANSTIS, Director of Product and Strategy, TRUSTWAVE AUSTRALIA AND NEW ZEALAND
1.40
Controlling your security in the Cloud
IAN CHRISTOFIS, Managing Principal Consultant, THALES SECURITY
2.00
Introduction to Artificial Intelligence for CyberSecurity Applications
ROB COLLINS, Director of Sales Engineering - APAC, Cylance
2.20
Closed loop security for the industrial internet age
BENG YEOW ONG, Head of Asia Pacific Centre of Excellence for Security, Nokia
2.40
Privacy vs Security in human terms humans can understand
Jon Duffy, Assistant Commissioner , Office of the Privacy Commissioner
  • The interdependencies of privacy and security and where the concepts differ
  • Good hygiene vs social license: Are there risks if agencies and individuals are approaching these concepts from a pure cyber security or a pure privacy lens?
  • The differences in perception between agencies and individuals with respect to data breaches and how could the introduction of mandatory data breach notification impact this?
3.10
Afternoon break
3.40
Guiding information security into the future
Tony Krzyzewski, Director, SAM for Compliance, Global Cyber Alliance
  • Where cyber security is heading and how we can overcome the biggest challenges facing the industry currently
  • The Global Cyber Alliance and its work – DMARC, Quad 9 and how its helping organisations improve risk profiles
  • The future of Smart Cities and IoT – balancing interconnectivity with security protocols
4.10
Lessons from the front line of cyberwarfare
Jeremy Jones, Head of Cyber Security, Theta

Building an effective nation state offensive cyber capability takes more than just fancy keyboard skills. Hear how nations select their targets and why cyber attacks are often synchronised with other operations for maximum effect.

  • The legal considerations of cyberwarfare are complex and not always obvious, so how is the law applied in reality?
  • What lessons can be drawn from this and what could we do to ensure New Zealand is safe and a considered a safe place to do business?
4.50
Closing remarks
Dr Shane Reti, MP for Whangarei
5.00
Closing remarks from the Chair
5.10
New Zealand Cyber Security Networking Function

Network with key industry players over drinks and canapes

Share
  • MAJOR SPONSORS





Copyright © 2018 Conferenz Ltd.