You are on page 1of 6

d IR d an s B an * TR al O Y w * 13 EXRL er No 300 ne 20 eder CIS EA gist e $ 7 Ju m F and e v ds ro s R Sa en es f CIO er ot nt ff O yn me ke n g er in ov ur G at te Fe Sta

5th Annual

CYBER SECURITY FOR GOVERNMENT 2013


n Main Conference & Workshops: 6 & 7 August 2013 n Networking Drinks: 6 August 2013 n Venue: LAqua, Cockle Bay Wharf, Darling Harbour, Sydney

Recognising cyber risks and building capabilities to preserve data confidentiality, integrity, and availability

KEY SPEAKERS INCLUDE:


Assistant Commissioner Tim Morris National Manager High Tech Crime Operations, AUSTRALIAN FEDERAL POLICE David Watts Commissioner for Law Enforcement Data Security, STATE GOVERNMENT VICTORIA Andrew Walduck CIO, AUSTRALIA POST Karl Maftoum CIO, AUSTRALIAN COMMUNICATIONS AND MEDIA AUTHORITY

Dr. Suresh Hungenahally CISO, DEPARTMENT OF BUSINESS AND INNOVATION Troy Braban CISO, AUSTRALIA POST

>> For the complete list of speakers, refer to page 2.

MAKE THE MOST OF YOUR TIME OUT OF OFFICE AND ATTEND OUR INTERACTIVE WORKSHOPS:
WORKSHOP A:

Effective Staff Training for a More Cyber Alert Workforce

WORKSHOP B:

Meeting BYOD Security Demands Designing a Mobile Data Protection Strategy and Guarding against Mobile Malware Threats

KEY TOPICS TO BE ADDRESSED INCLUDE:


n Securing BYOD and mobile n Mitigating internal IS threats n Defining the cyber security role for the Non-IT person n Implementation challenges of application whitelisting n Reducing information security risks of social media adoption n Moving towards an integrated, whole of government approach to data security n Guarding against mobile malware threats n Partnering IT and business leadership to build cyber capabilities n Improving cyber security through system design and governance

Event Partner:

Networking Partner:

Media partners:

REGISTER NOW!
T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:registration@iqpc.com.au n W:www.cybersecurity-conference.com.au

5th Annual

CYBER SECURITY FOR GOVERNMENT 2013


Dear ICT/ Security Professional, Id like to invite you to take a first look at the program for Government IQs 5th Annual Cyber Security for Government 2013 event. The conference is to be held in Sydney from 6th-8th August and will bring together ICT Security Directors, Managers, CIOs and CISOs representing Federal, State and local government departments and agencies. FOR 2013 OUR KEY AREAS OF FOCUS WILL BE: (A) Building capabilities in existing systems and processes (B) Data privacy and protection (C) Security concerns surrounding BYOD, social media and the cloud Government IQ understands the increasing importance for the Australian public sector to mitigate cyber risks from a whole-ofgovernment policy perspective, down to organisational strategies that will encompass people, processes and technical capabilities. Benchmark alongside like-minded professionals facing similar challenges, and participate in stimulating discussions to uncover new ideas that you can implement to strengthen your cyber security resilience. I look forward to seeing you at this event in August. Kind regards, Elizabeth Li Conference Director Cyber Security for Government Government IQ

EXPERT SPEAKER PANEL INCLUDE:


Assistant Commissioner Tim Morris National Manager High Tech Crime Operations, AUSTRALIAN FEDERAL POLICE David Watts Commissioner for Law Enforcement Data Security, STATE GOVERNMENT VICTORIA Andrew Walduck CIO, AUSTRALIA POST Karl Maftoum CIO, AUSTRALIAN COMMUNICATIONS AND MEDIA AUTHORITY Dr. Suresh Hungenahally CISO, DEPARTMENT OF BUSINESS AND INNOVATION Troy Braban CISO, AUSTRALIA POST Professor Craig Valli Director, ECU Security Research Institute Al Blake CIO, Department of Sustainability, Environment, Water, POPULATION AND COMMUNITIES Mike Holm Coordination Centre Manager, AUSCERT Dr Jodi Steel Director Security and Environment Business Team, NICTA Prof Gernot Heiser Research Group Leader, NICTA Troy Braban CISO, AUSTRALIA POST Angela Donohoe CIO, OFFICE OF STATE REVENUE, NSW GOVERNMENT David Simpson Managing Director, CQR CONSULTING

DO YOU HAVE THE SECURITY SOLUTIONS WE ARE LOOKING FOR? GET IN FRONT OF YOUR TARGET AUDIENCE
Benefits of Sponsoring & Exhibiting: 1. 2. 3. 4. Demonstrate what your solution can do to the Security specialists who do it on a daily basis Gain direct access to your target market Increase your competitive selling advantage Achieve high profile association with key decision makers

If you feel that you have a credible offering in this space that you would like to showcase to Government, please contact Christina McLoughlin on +61(0)2 92291044 or Christina.McLoughlin@iqpc.com.au

WHO WILL YOU MEET AT CYBER SECURITY FOR GOVERNMENT 2013?


n CIOs n Directors of ICT Security n Information Security Managers n CISOs n Cyber Crime Experts n n n n Technical Security Analysts Network Security Officers Cyber Intelligence Specialists Security Architects

REGISTER NOW! REGISTER NOW!


T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:registration@iqpc.com.au n W:www.cybersecurity-conference.com.au

5th Annual

DAY ONE:
08.30 09.00

Tuesday, 6 August 2013

CYBER SECURITY FOR GOVERNMENT 2013


n Maintaining an access control list including administrators and users Facilitated by Conference Chair

Registration and Welcome Coffee Opening Remarks from the Chairperson

09.10 Evolving Cyber Threats Are we Equipped Enough to Respond? n Exploring emerging trends in cyber attacks including ransomware n Developing capabilities in our internal control mechanisms n Building intelligence that highlights current security activities n The human factor - educating employees to recognise a potential fraudulent attack Assistant Commissioner Tim Morris, National Manager High Tech Crime Operations, AUSTRALIAN FEDERAL POLICE

12.20 Lunch 13.20 Not Everything is What it SIEMs n Evaluation considerations for using SIEM n Some insights when implementing SIEM into a multi-platform IT environment n Expectations, perceptions and reality Ross Spooner Independent IT Security Specialist

09.50 Business and IT Leadership for strong Security n How Cyber Security and threats are changing the ways executives look at their business n How IT and Business leaders can work together to build security capability n Security conversations for executives: what is really important n Prioritising security investments for business outcomes 10.30 11.00 Andrew Walduck CIO, AUSTRALIA POST Morning tea Government Initiatives for Stronger Information Security Governance n Techniques for stronger governance n Strategies at both Commonwealth and State levels n Implementation challenges faced at all levels n Aligning Commonwealth and State strategies David Simpson Managing Director, CQR CONSULTING

14.00 Cyber Incidents: There isnt Much We Havent Seen! n How does AusCERT, Australias premier computer emergency response team, deal with the daily influx of cyber threats? n A case study of ransomware, and a crystal-ball gaze into where this threat might turn next n What keeps the online crime industry in business, and how can we stop it? 14.40 Mike Holm Coordination Centre Manager, AUSCERT Afternoon tea

15.10 RESEARCH EXCELLENCE IN ICT: Building Trustworthy Systems for E-government n Developing formally proven architecture to protect critical systems n Designing highly-dependable systems that are resilient to emerging cyber threats 16.10 16.15 17.15 Dr Jodi Steel Director Security and Environment Business Team, NICTA Prof Gernot Heiser Research Group Leader, NICTA Close of Conference Networking Drinks (1 hour) WORKSHOP A: Effective Staff Training for a More Cyber Alert Workforce

11.40 Roundtable Discussion: Reducing Information Security Risks of Social Media Adoption n Communicating and enforcing sound usage policies among users n Tracking your agency's official social media accounts n Adopting a risk-management approach to moderating social media use

In 2012 the number of serious cyber incidents leapt 52 per cent in the first nine months alone"
Defence Minister Stephen Smith

REGISTER NOW! REGISTER NOW!


T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:registration@iqpc.com.au n W:www.cybersecurity-conference.com.au

5th Annual

DAY TWO:
08.30

Wednesday, 7 August 2013

CYBER SECURITY FOR GOVERNMENT 2013


12.20 Lunch 13.20 Developing Collaborative Effort between Industry and Government to combat Cyber Threats n Exploring cooperative opportunities between the private and public sector in tackling Australia's cyber security challenges n Promoting information sharing for cyber security predictions n Maintaining awareness of emerging technologies and when to adopt n Examining tomorrows standards for cyber security in Australia Professor Craig Valli Director, ECU SECURITY RESEARCH INSTITUTE

09.00

Registration and Welcome Coffee Opening Remarks from the Chairperson

09.10 Education and Reinforcement Defining the Cyber Security Role for The Non-IT Person n Building an adequate understanding of cyber threats and how it manifests n Instilling responsibility in each employee towards data protection n Customising training efforts for varied levels of user cyber awareness n Embedding better cyber security practices across the organization Dr. Suresh Hungenahally CISO, DEPARTMENT OF BUSINESS AND INNOVATION

09.50 Managing Data Security Risks of BYOD n Applying centralised management and user authentication n Educating users on proper security precautions to minimise data breaches or leakage n Setting network access controls at application and device levels n How far a company can or should go in controlling devices? 10.30 Karl Maftoum CIO, AUSTRALIAN COMMUNICATIONS AND MEDIA AUTHORITY Morning tea

14.00 Improving IT Security Governance n Devising an IT Security Framework that is aligned with your organisations needs n Establishing an enterprise wide security governance to assist decision making n Obtaining senior management engagement at the highest possible level n Ensuring compliance through a consistent governance program 14.40 Troy Braban CISO, AUSTRALIA POST Afternoon tea

11.00 Data Security and Information Privacy Victorias new regulatory approach n Moving towards an integrated, whole of government approach to data security n Responding to emerging challenges affecting information privacy and data protection n Strengthening the protection of personal information in the Victorian public sector n Outlining the new Victorian Protective Security Policy Framework (VPSPF) David Watts Commissioner for Law Enforcement Data Security, STATE GOVERNMENT VICTORIA

15.10 PANEL DISCUSSION: Cyber Technology Investments Business vs Security n Justifying the business value for cyber security investments n Prioritising security investments across different layers of management n Balancing the need for application security and agility of the business 16.00 17.15 Panellists: Troy Braban CISO, AUSTRALIA POST Angela Donohoe CIO, OFFICE OF STATE REVENUE Karl Maftoum CIO, AUSTRALIAN COMMUNICATIONS AND MEDIA AUTHORITY Close of Conference WORKSHOP B: Meeting BYOD Security Demands Designing a Mobile Data Protection Strategy and Guarding against Mobile Malware

11.40 Roundtable Discussion: Overcoming the Implementation Challenge of Application Whitelisting n Understanding how whitelisting fits within your unique IT environment n Maximising security while maintaining business application flexibility n Evaluating the effectiveness of whitelisting vs other anti-malware technology n Articulating the business value of application whitelisting vs administrative costs Facilitator: Al Blake CIO, Department of Sustainability, Environment, Water, POPULATION AND COMMUNITIES

REGISTER NOW! REGISTER NOW!


T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:registration@iqpc.com.au n W:www.cybersecurity-conference.com.au

5th Annual

INTERACTIVE WORKSHOPS & ABOUT OUR SPONSOR:


WORKSHOP A: Tuesday, 6 August 2013

CYBER SECURITY FOR GOVERNMENT 2013


ABOUT OUR SPONSOR:
CQR is one of Australias leading information security companies. It offers a portfolio of business and technical services to assist organisations to effectively manage the risk associated with their information assets. CQR does not have affiliations with vendors security products and so can offer truly independent information security services. CQR has offices across Australia and in the U.K. Its client list includes over two hundred government and commercial organisations. Services include ISMS, PCI, BCP and Penetration Testing. SAI Global, Australias largest, most established audit and certification provider of business management and improvement systems in Australia, provides training and certification services for ISO 27001 Information Security Standards and ISO 20000.1 IT Service Standards, alongside Environmental Compliance, OHS, Greenhouse Gases and Quality Management. For more information visitwww. saiglobal.com/assurance, email assurance@ saiglobal.com or call 1300 360 314.

Effective Staff Training for a More Cyber Alert Workforce


Beyond IT safeguards, government personnel play a vital role in ensuring critical data is kept within the organisation. Educating staff about cyber threats and their various manifestations will not only help them to recognise possible risks and vulnerabilities but also help organisations identify new threats from the feedback they receive. This workshop will equip you with the necessary training tools to effectively disseminate these strategies to users and enable them to understand the role they play in mitigating cyber threats. Attendees will take away implementation tools for: n Conducting task-specific training according to the specifics of each role n Complementing procedural documents with scenario training to cover essential points of action in the event of a security breach n Incorporating assessment tools to ensure cyber policies are adhered to n Sharing assessment results to empower staff to play an active role in cyber awareness n Gauging staff opinion about security habits to determine effectiveness of measures and procedures Facilitator: Dr. Suresh Hungenahally CISO, DEPARTMENT OF BUSINESS AND INNOVATION WORKSHOP B: Wednesday, 7 August 2013

Meeting BYOD Security Demands Designing a Mobile Data Protection Strategy and Guarding against Mobile Malware
With the increasing use of BYOD in government agencies, a cyber security strategy has to evolve to account for the growing crop of wireless devices in use. Instead of locking down the device itself, CIOs and security professionals need to take an information-centric approach to secure the files and applications on devices, wherever it moves. This workshop is a practical platform designed to aid security professionals in devising a mobile data protection strategy, covering the following areas: n Reviewing current mobile malware threats n Differentiating between corporate and personal data on employee-owned devices that are accessing the network n Restricting access to sensitive files and applications through access control and identity management n Integrating mobile strategies into your current security framework n Securing the applications that are critical to your agency Facilitator: Professor Craig Valli Director, ECU Security Research Institute Peter Hannay School of Computer and Security Science, ECU

Electronic intelligence gathering is being used against Australia on a massive scale to extract confidential information from governments."
David Irvine, Director-General of ASIO

REGISTER NOW! REGISTER NOW!


T: +61 2 9229 1000 n F: +61 2 9223 2622 n E:registration@iqpc.com.au n W:www.cybersecurity-conference.com.au

Register Early & Save!


To speed registration, please provide the priority code located on the mailing label or in the box below.

WHERE

LAqua, Rooftop Level, Cockle Bay Wharf/ Wheat Rd, Sydney CBD New South Wales 2000, Australia 1300 117 118 www.laqua.com.au

WHEN?

6 & 7 August 2013

TEAM DISCOUNTS
IQPC recognises the value of learning in teams. Take advantage of one of these special rates: Register a team of 3 to the conference at the same time from the same company and receive $500 discount Register a team of 4 to the conference at the same time from the same company and receive a free pass for a 5th delegate Ask about multi-event discounts. Call + 61 2 9229 1000 for more details Please note: Only one discount applies

ACCOMMODATION
The Oaks Goldsborough Hotel is the official accommodation partner for the 5th Annual Cyber Security for Government 2013 event. Attendees of the 5th Annual Cyber Security for Government 2013 event are entitled to take advantage of the negotiated rates available at the hotel. To check availability or book these rates, go to www.cybersecurityconference.com.au and click on the Venue & Accommodation page.

QUICK and EASY WAYS to REGISTER


18017.005
TELEPHONE +61 2 9229 1000 FAX +61 2 9223 2622 EMAIL registration@iqpc.com.au

5th Annual

n Main Conference & Workshops: 6 & 7 August 2013 n Networking Drinks: 6 August 2013 n Venue: LAqua, Cockle Bay Wharf, Darling Harbour, Sydney

POSITION

EMAIL

DELEGATE 2

[FIRST NAME]

[SURNAME]

SAVE $300

POSITION

STANDARD PACKAGES
Conference + 2 Workshops Conference + 1 Workshop Conference Only

*Register & pay before 7th June 2013 SAVE AUD $300 $4997 + GST = $5496.70 SAVE AUD $300 $4198 + GST = $4617.80 SAVE AUD $300 $3299 + GST = $3628.90

EARLY BIRD

STANDARD PRICE

EMAIL

DELEGATE 3

[FIRST NAME]

[SURNAME]

$5297 + GST = $5826.70


POSITION

$4498 + GST = $4947.80


EMAIL

$3599 + GST = $3958.90

ORGANISATION

VENDOR PACKAGE
Conference Only
* Payment must be received by IQPC prior to 5pm AEST on the cut-off date.
# Registrations

VENDOR PRICE
$3999 + GST = $4398.90

ADDRESS

POSTCODE

received without payment or a Government PO will incur a processing fee of $99 + GST = $108.90 per registration.

2 WAYS TO SAVE!
Book early for HUGE EARLY BIRD savings. Book as a TEAM, save & benefit as a team.

TELEPHONE

FAX

APPROVING MANAGER
[FIRST NAME]

[SURNAME]

Please send me _______ set(s) of AUDIO COMPACT DISCS and PRESENTATIONS CD at $878.90 ($799 plus GST) or $603.90 ($549 plus GST) Presentations CD only Please keep me informed via email about this and other related events

POSITION

EMAIL

NOTE: PAYMENT IS DUE WITHIN 7 DAYS FROM REGISTRATION TO SECURE YOUR PLACE. Registrations received without payment or a Government PO will incur a processing fee of $99+GST = $108.90 per registration. Payment prior to the conference is mandatory for attendance. Payment includes lunches, refreshments, a copy of conference presentations via FTP website or workbook and all meeting materials. If payment has not been received two weeks before the conference, a credit card hold will be taken and processed. This card will be refunded once alternate payment has been received.

CHEQUE ENCLOSED FOR $ _____ (Please make cheques payable to: IQPC) PLEASE CHARGE
American Express Visa MasterCard Diners Club

PRIVACY - YOUR CHOICE


Any information provided by you in registering for this conference is being collected by IQPC and will be held in the strictest confidence. It will be added to our database and will be used primarily to provide you with further information about IQPC events and services. By supplying your email address and mobile telephone number you are agreeing to IQPC contacting you by these means to provide you further information about IQPC products and services. From time to time IQPC may share information from our database with other professional organisations (including our event sponsors) to promote similar products and services. Please tick the box below if you do NOT want us to pass on your details. To amend your current details, advise of duplicates or to opt out of further mailings, please contact our Database Integrity Maintenance Department, Level 6, 25 Bligh Street, SYDNEY NSW 2000. Alternatively, email database@iqpc.com.au, call 02 9229 1028 or fax 02 9223 2622. I do not wish to have my details made available to other organisations

CREDIT CARD NUMBER

AMEX 4 DIGIT CODE NAME OF CARD HOLDER [PLEASE PRINT]

EXPIRY DATE

IQPC CANCELLATION AND POSTPONEMENT POLICY: FOR DETAILS OF IQPCS CANCELLATION AND POSTPONEMENT POLICY PLEASE VISIT: www.iqpc.com.au
2013 IQPC ABN 92 071 142 446 All RIGHTS RESERVED. The format, design, content and arrangement of this brochure constitute a copyright of IQPC. Unauthorised reproduction will be actionable by law.

CLICK HERE SUBMIT THIS FORM

(PHOTOCOPY THIS FORM FOR ADDITIONAL DELEGATES)

CYBER SECURITY FOR GOVERNMENT 2013

WEBSITE www.cybersecurity-conference.com.au MAIL IQPC, Level 6, 25 Bligh Street, SYDNEY NSW 2000

o REGISTER ME for 5th Annual Cyber Security for Government 2013 PLUS: o Workshops: o A o B
DELEGATE 1
[FIRST NAME] [SURNAME]

You might also like