VIRTUAL

Sydney CISO Virtual Executive Summit

26 November 2020 | 09:00 - 14:30 AEDT

26 November 2020 | 09:00 - 14:30 AEDT

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Sydney CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Embracing accelerated change and leading through disruption

Navigating the shifting future of the CIO & CISO

Creating a data-driven enterprise

Governing Body Co-Chairs

Ben Doyle

Thales Australia
CISO Asia Pacific

Leanne Fry

AUSTRAC
Chief Innovation Officer and Chief Information Officer

Roger Wahl

John Holland
CIO

Richard Webby

Scentre Group
Group CTO & CIO

Agenda


26 November 2020

11:00 - 11:45  AEDT Virtual Summit Keynote

Finding Success with Adopting a SASE Architecture

David Fairman headshot

David Fairman

Chief Security Officer, APAC

Netskope

Peter Robinson headshot

Peter Robinson

Head Of Security

Zip Co Limited

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. This evolved concept of cloud security architecture outlines a convergence of multiple security functions to offer identity-based secure access. How can your organization best position itself for the transition?

Join this session to hear about:

• Problems SASE can address in the modern enterprise

• Benefits of moving to a SASE architecture

• Insights from organizations adopting SASE today

11:45 - 12:15  AEDT Break

12:15 - 13:00  AEDT Virtual Summit Keynote

The Power of Digital Transformation to Drive Business Success

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Christopher Neal headshot

Christopher Neal

CISO

Ramsay Health Care Limited

Pieter Van Der Merwe headshot

Pieter Van Der Merwe

CISO

Woolworths

We all remember the time when IT matters stayed within IT. But with cloud, mobility, AI/machine learning, IoT/OT—all converging to make your organization smarter, more efficient, and more competitive—IT has become a boardroom issue. Today, IT innovators have the opportunity to take their place at the epicenter of the modern enterprise, delivering the agility, security, and user experience needed for digital transformation, thereby reducing business risk, increasing productivity, and cutting costs.

In this session, Zscaler CEO Jay Chaudhry joins to discuss:

  • “Owning the moment”: IT’s opportunity to accelerate secure digital transformation
  • Best practices for securing work-from-anywhere using Gartner’s secure access service edge (SASE) and zero trust network access (ZTNA) frameworks
  • What comes next: IT’s new role as strategic business enabler

13:00 - 14:00  AEDT Virtual Summit Boardroom

Online Application Protections - Leveraging AI and ML

James Tin headshot

James Tin

Senior Director, Solutions Engineering, Shape F5, Asia Pacific China and Japan

Shape Security

Eduardo Dowd headshot

Eduardo Dowd

Group CIO

WPP AUNZ

Hank Opdam headshot

Hank Opdam

Chief Information Security & Continuity Officer

The Star Entertainment Group

Your web applications are easily accessed by customers and attackers alike. Cyber criminals can use AI and ML to bypass traditional security controls but could you use those same tools to defend your applications? CISOs must be prepared with the most current and relevant safeguards.


Attend this interactive boardroom session to discuss with your peers:

  • How to increase visibility for your SOC team into unseen fraud
  • Leveraging AI and ML to mitigate new types of threats
  • How other CISO and CIOs are implementing new tech to shore up their defenses

13:00 - 14:00  AEDT Virtual Summit Boardroom

Data Governance as a Business Enabler

Neil Campbell headshot

Neil Campbell

VP APAC

Rapid7

Richard Burke headshot

Richard Burke

Global Information Security Manager

Graincorp Limited

Jason Anderson headshot

Jason Anderson

Head of Information Security

Qsuper

Data governance and security is an unquestionably crucial exercise for every organization, especially in an era when privacy regulation is only becoming more complex and severe. Yet even in the absence of any regulation at all, consumers are expecting to hold more control of their data and its use. Organisations that provide these services build trust and loyalty in the marketplace, and in the end, that means revenue.

Join this session to learn:

  • The role your peer CISOs are playing in their organisation’s data governance strategy
  • The way senior business leaders are evaluating data governance and security as a business asset
  • How privacy regulation is shaping business operations and consumer expectations

09:00 - 09:45  AEDT Virtual Summit Keynote

Defending Your Data in a Remote Working World

Ryan Kalember headshot

Ryan Kalember

EVP, Cybersecurity Strategy

Proofpoint

Rob Wiggan headshot

Rob Wiggan

Associate Director Information Security

Queensland University Of Technology

Jamie Norton headshot

Jamie Norton

CISO

Australian Taxation Office

Ben Doyle headshot

Ben Doyle

CISO Asia Pacific

Thales Australia

It’s one of the oldest maxims in cybersecurity – you can’t protect what you can’t see. And with organisations shifting to remote work and the traditional enterprise network going dark in more ways than one, new thinking is required to protect the data that matters to your organisation. After all, data doesn’t just leave on its own – a compromised account, malicious insider, or simply negligent user is almost always involved.

Join Ryan Kalember as he and a panel of CISOs discusses:

  • How to adapt your security architecture to give you visibility in a remote work and cloud-oriented landscape
  • The ways in which remote work and the move to the cloud has changed the nature of threats to data
  • Approaches to better detect and respond to risky user actions with sensitive data

09:45 - 10:00  AEDT Break

10:00 - 11:00  AEDT Virtual Summit Boardroom

Securing Cloud Transformation

Chris Chelliah headshot

Chris Chelliah

SVP Customer Strategy, Insight & Business Development

Oracle

Daniel Evans headshot

Daniel Evans

Chief Information Security Officer

Rio Tinto Australia

John Sheridan headshot

John Sheridan

Chief Information Officer and Chief Information Security Officer

Australian Department of Finance

Organisations continue a push for greater agility and efficiency, and almost all paths involve the cloud. CIOs and CISOs continue to play a crucial role in ensuring cloud assets operate smoothly and securely, and as the pace of transformation accelerates, security leaders must run even faster to keep up.

Join your peers in this virtual boardroom to discuss:

  • The latest trends in securing cloud environments
  • Communication strategies for ensuring security is at the forefront of cloud deployments
  • Balancing on-prem and cloud cyber security

10:00 - 11:00  AEDT Virtual Summit Boardroom

Identity, Access, and the Strategic Approach to Zero Trust

Sudip Banerjee headshot

Sudip Banerjee

Director, Transformation Strategy, Asia Pacific and Japan

Zscaler

Victor Akkari headshot

Victor Akkari

Chief Information Security Officer

Cochlear

Mark Smink headshot

Mark Smink

Chief Information Security Officer - Asia Pacific

JLL

Organisations are embracing Digital transformation and moving applications out of traditional network boundaries. Users are connecting from anywhere on any device. With rising cyber threats, it is vital for enterprises to identify, authenticate and provide access to applications and data on least privilege basis.

Join this session to learn:

  • What the latest zero trust strategies are and where do they make sense
  • How to evaluate a zero trust architecture and set a roadmap for implementation
  • What will success look like?

14:00 - 14:30  AEDT Networking

Community Discussion


An informal and interactive opportunity for you to network with peers in small groups. 


11:00 - 11:45  AEDT Virtual Summit Keynote

Finding Success with Adopting a SASE Architecture

David Fairman headshot

David Fairman

Chief Security Officer, APAC

Netskope

Peter Robinson headshot

Peter Robinson

Head Of Security

Zip Co Limited

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. This evolved concept of cloud security architecture outlines a convergence of multiple security functions to offer identity-based secure access. How can your organization best position itself for the transition?

Join this session to hear about:

• Problems SASE can address in the modern enterprise

• Benefits of moving to a SASE architecture

• Insights from organizations adopting SASE today

11:45 - 12:15  AEDT Break

12:15 - 13:00  AEDT Virtual Summit Keynote

The Power of Digital Transformation to Drive Business Success

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Christopher Neal headshot

Christopher Neal

CISO

Ramsay Health Care Limited

Pieter Van Der Merwe headshot

Pieter Van Der Merwe

CISO

Woolworths

We all remember the time when IT matters stayed within IT. But with cloud, mobility, AI/machine learning, IoT/OT—all converging to make your organization smarter, more efficient, and more competitive—IT has become a boardroom issue. Today, IT innovators have the opportunity to take their place at the epicenter of the modern enterprise, delivering the agility, security, and user experience needed for digital transformation, thereby reducing business risk, increasing productivity, and cutting costs.

In this session, Zscaler CEO Jay Chaudhry joins to discuss:

  • “Owning the moment”: IT’s opportunity to accelerate secure digital transformation
  • Best practices for securing work-from-anywhere using Gartner’s secure access service edge (SASE) and zero trust network access (ZTNA) frameworks
  • What comes next: IT’s new role as strategic business enabler

13:00 - 14:00  AEDT Virtual Summit Boardroom

Data Governance as a Business Enabler

Neil Campbell headshot

Neil Campbell

VP APAC

Rapid7

Richard Burke headshot

Richard Burke

Global Information Security Manager

Graincorp Limited

Jason Anderson headshot

Jason Anderson

Head of Information Security

Qsuper

Data governance and security is an unquestionably crucial exercise for every organization, especially in an era when privacy regulation is only becoming more complex and severe. Yet even in the absence of any regulation at all, consumers are expecting to hold more control of their data and its use. Organisations that provide these services build trust and loyalty in the marketplace, and in the end, that means revenue.

Join this session to learn:

  • The role your peer CISOs are playing in their organisation’s data governance strategy
  • The way senior business leaders are evaluating data governance and security as a business asset
  • How privacy regulation is shaping business operations and consumer expectations

13:00 - 14:00  AEDT Virtual Summit Boardroom

Propel the Business Forward with Data at the Core

Colin Mapp headshot

Colin Mapp

Chief Information Officer

Toyota Financial Services

Doug Jenkins headshot

Doug Jenkins

CIO

Australian Prudential Regulation Authority

Kshira Saagar headshot

Kshira Saagar

Chief Data Officer

Latitude Financial Services

Today’s enterprise has access to endless amounts of data and CIOs must continually find true meaning and value in the data. This peer-to-peer discussion will consider ways to mature your data and analytics program to provide accurate, real-time data.

Come ready to discuss how to:

  • Implement data strategies that align with desired business outcomes
  • Leverage data to gain greater insights and drive value
  • Define clear data ownership and standardization

09:00 - 09:45  AEDT Virtual Summit Keynote

Defending Your Data in a Remote Working World

Ryan Kalember headshot

Ryan Kalember

EVP, Cybersecurity Strategy

Proofpoint

Rob Wiggan headshot

Rob Wiggan

Associate Director Information Security

Queensland University Of Technology

Jamie Norton headshot

Jamie Norton

CISO

Australian Taxation Office

Ben Doyle headshot

Ben Doyle

CISO Asia Pacific

Thales Australia

It’s one of the oldest maxims in cybersecurity – you can’t protect what you can’t see. And with organisations shifting to remote work and the traditional enterprise network going dark in more ways than one, new thinking is required to protect the data that matters to your organisation. After all, data doesn’t just leave on its own – a compromised account, malicious insider, or simply negligent user is almost always involved.

Join Ryan Kalember as he and a panel of CISOs discusses:

  • How to adapt your security architecture to give you visibility in a remote work and cloud-oriented landscape
  • The ways in which remote work and the move to the cloud has changed the nature of threats to data
  • Approaches to better detect and respond to risky user actions with sensitive data

09:45 - 10:00  AEDT Break

10:00 - 11:00  AEDT Virtual Summit Boardroom

Identity, Access, and the Strategic Approach to Zero Trust

Sudip Banerjee headshot

Sudip Banerjee

Director, Transformation Strategy, Asia Pacific and Japan

Zscaler

Victor Akkari headshot

Victor Akkari

Chief Information Security Officer

Cochlear

Mark Smink headshot

Mark Smink

Chief Information Security Officer - Asia Pacific

JLL

Organisations are embracing Digital transformation and moving applications out of traditional network boundaries. Users are connecting from anywhere on any device. With rising cyber threats, it is vital for enterprises to identify, authenticate and provide access to applications and data on least privilege basis.

Join this session to learn:

  • What the latest zero trust strategies are and where do they make sense
  • How to evaluate a zero trust architecture and set a roadmap for implementation
  • What will success look like?

10:00 - 11:00  AEDT Virtual Summit Boardroom

The Convergence of IT and OT

Matt Mueller headshot

Matt Mueller

Chief Information Officer

Iluka Resources Limited

The Internet of Things and automation advancements have enabled manufacturing and other industries to modernize factories, reduce operational costs and raise efficiency. Due to these advancements, IT and OT need to be more aligned than ever. 

In this discussion you’ll cover:

  • Best practices to cultivate the relationship between IT and OT to drive execution
  • The inherent hurdles innovative projects create, such as change management and reskilling staff and security
  • What Industry 4.0 success looks like, and advice for those starting the journey

14:00 - 14:30  AEDT Networking

Community Discussion


An informal and interactive opportunity for you to network with peers in small groups. 


26 November 2020

Your Community Partners


CIO Thought Leader
Key Partners
Program Partner

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Olga Demura

Program Manager

(02) 9094 4986

olga.demura@gartner.com