Australia Confluence Header Banner with partners - AUSTRALIA CISO Confluence | October 2020

Australia CISO Confluence 2020

Registration Download Agenda

Date/Time:

Tuesday, October 27, 2020 10:00 PM – Wednesday, October 28, 2020 1:30 AM MDT &
Wednesday, October 28, 2020 10:00 PM – Thursday, October 29, 2020 1:30 AM MDT

EC Council’s CISO MAG as an enabler of strategic community integration has planned a crisp half-day virtual engagement designed to create more awareness on the need for cybersecurity and its related implications in these testing times.

The Australia CISO Confluence will derive realistic insights from senior industry experts on how to redefine security frameworks, mitigate threats and encourage a new culture of cybersecurity to sustain continuity across the region’s business intensive digital ecosystems.

Key topics of Discussion:

  • 1.Cyber Security Strategy 2020: Public-Private Partnerships to overhaul the cyber resilience of critical infrastructure networks and systems
  • 2.Fortify enterprise-wide security through cyber forensics and threat hunting capabilities
  • 3.Deploying a zero-trust architecture to protect critical functions and services while securing business continuity
  • 4.Leveraging cloud and AI to derive a proactive and rapid incident response mechanism

Why Attend?

  • Global connectivity and wider expert reach
  • Dynamic mix of strategic and real time insights
  • Emphasis on implication of ongoing pandemic (COVID – 19)
  • Comprehensive to enable Any-time and any-where access

Attendee Profile:

  • CEO, CIO, CTO, CISO, CDO
  • SVP, VP, Directors
  • IT Directors / HoDs
  • IT Security Advisor/ Heads/ Specialists/ Lead
  • Head of Planning, Government, Risk
  • Information Security Manager
  • IT Consultants

There has been an evident surge in malware, phishing, and distributed denial of services since the onset of the pandemic across the Commonwealth of Australia. With the intent to take appropriate actions against these threat actors, the region along with its member states and international partners are to reinforce their collaboration on technical operations at judicial as well as diplomatic levels.

Organizations today, need to not only move beyond compliance and implement dynamic security integration through a multi layered approach, but also need to embrace an enterprise wide culture of cyber risk ownership. To achieve optimum cyber resilience and safeguard business continuity, a dynamic risk management framework is extremely essential for organizations.

The recent release of the Australian Cyber Security Strategy 2020 will give a much-needed incentive to the creation of a secure digital ecosystem to safeguard the nations citizens, business community and critical infrastructure functionality.

EC Council’s CISO MAG as an enabler of strategic community integration has planned a crisp half day virtual engagement designed to create more awareness on the need for cybersecurity and its related implications in these testing times.

The Australia CISO Confluence will derive realistic insights from senior industry experts on how to redefine security frameworks, mitigate threats and encourage a new culture of cybersecurity to sustain continuity across the region’s business intensive digital ecosystems.

Dates: October 26th-29th 2020 at 10 am – 1 a.m UTC

The worlds most advanced ethical hacking course with 20 of the most current security domains an ethical hacker will want to know when planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification!

Course Outline

  • 1. Introduction to Ethical Hacking
  • 2. Footprinting and Reconnaissance
  • 3. Scanning Networks
  • 4. Enumeration
  • 5. Vulnerability Analysis
  • 6. System Hacking
  • 7. Malware Threats
  • 8. Sniffing
  • 9. Social Engineering
  • 10. Denial-of-Service
  • 11. Session Hijacking
  • 12. Evading IDS, Firewalls, and Honeypots
  • 13. Hacking Web Servers
  • 14. Hacking Web Applications
  • 15. SQL Injection
  • 16. Hacking Wireless Networks
  • 17. Hacking Mobile Platforms
  • 18. IoT Hacking
  • 19. Cloud Computing
  • 20. Cryptography

Dates:October 26th-29th 2020 at 10 am – 1 a.m UTC

The CCISO program trains individuals who are looking to make the jump from middle management to the executive ranks by focusing on high-level management skills specifically needed for IS executives. From project to audit management, procurement and finance, to strategy and policy, students will be taught to steer complex security programs strategically and successfully. The CCISO program was created and is taught by sitting high-level information security executives from across industries, resulting in the most relevant, challenging, and applicable content on the market.

Domain 1: Governance (Policy, Legal and Compliance)

  • 1. Definitions
  • 2. Information Security Management Program
  • 3. Information Security Laws, Regulations, & Guidelines
  • 4. Privacy Laws

Domain 2: IS Management Controls and Auditing Management (Projects, Technology, and Operations)

  • 1. Design, Deploy, and Manage Security Controls in Alignment with Business Goals, Risk Tolerance, and Policies and Standards
  • 2. Information Security Risk Assessment
  • 3. Risk Treatment
  • 4. Residual Risk
  • 5. Risk Acceptance
  • 6. Risk Management Feedback Loops
  • 7. Business Goals
  • 8. Risk Tolerance
  • 9. Policies and Standards
  • 10. Understanding Security Controls Types and Objectives
  • 11. Implementing Control Assurance Frameworks
  • 12. COBIT (Control Objectives for Information and Related Technology)
  • 13. BAI06 Manage Changes
  • 14. COBIT 4.1 vs. COBIT 5
  • 15. ISO 27001/27002
  • 16. Automate Controls
  • 17. Understanding the Audit Management Process

Domain 3: Management – Projects and Operations

  • 1. The Role of the CISO
  • 2. Information Security Projects
  • 3. Security Operations Management

Domain 4: Information Security Core Competencies 

  • 1. Access Controls
  • 2. Physical Security
  • 3. Disaster Recovery
  • 4. Network Security
  • 5. Threat and Vulnerability Management
  • 6. Application Security
  • 7. Systems Security
  • 8. Encryption
  • 9. Computer Forensics and Incident Response

Domain 5: Strategic Planning and Finance

  • 1. Security Strategic Planning
  • 2. Alignment with Business Goals and Risk Tolerance
  • 3. Relationship between Security, Compliance, & Privacy
  • 4. Leadership
  • 5. Enterprise Information Security Architecture (EISA) Models, Frameworks, and Standards
  • 6. Security Emerging Trends
  • 7. It’s all about the Data
  • 8. Key Performance Indicators (KPI)
  • 9. Systems Certification and Accreditation Process
  • 10. Resource Planning
  • 11. Financial Planning
  • 12. Procurement
  • 13. Vendor Management
  • 14. Request for Proposal (RFP) Process
  • 15. Integrate Security Requirements into the Contractual Agreement and Procurement Process
  • 16. Statement of Work
  • 17. Service Level Agreements

Dates:October 28th October 2020

In this one-day course you will set up EC-Council’s Mobile Security Toolkit (STORM) OS to interface with your drone, then learn about drone hacking. This will include a wide arrange of topics from the basics of drones and the FCC rules, to the capture, examination, and exploitation of drone data.

Course Outline:

  • Module 01: Technical Introduction Drone Hacking
  • Module 02: Drone Ethics
  • Module 03: Part 1 Robotics as an ecosystem
  • Module 04: Part 2 Ground Stations: Servers / Cloud
  • Module 05: Drone Hacking

Agenda

Speakers @ The Australia CISO Confluence

Damien Manuel - AUSTRALIA CISO Confluence | October 2020

Damien Manuel
Chairman, Australian Information Security Association

Nicki Doble - AUSTRALIA CISO Confluence | October 2020

Nicki Doble
Group Chief Information Officer, Cover More Insurance

Jacqueline - AUSTRALIA CISO Confluence | October 2020

Jacqueline Kernot
Partner Cyber Security, EY

Rafael Narezzi - AUSTRALIA CISO Confluence | October 2020

Rafael Narezzi
Chief Information Security Officer, WiseEnergy

Salvatore Trimboli - AUSTRALIA CISO Confluence | October 2020

Salvatore Trimboli
Chief Technology Officer, E.L & C. Baillieu Limited

Andrew Wan - AUSTRALIA CISO Confluence | October 2020

Andrew Wan
Chief Information Security Officer, The Smith Family

Daniel Pludek - AUSTRALIA CISO Confluence | October 2020

Daniel Pludek
Chief Technology Officer, Kip McGarth Education Centres

Andrew 150x150 - AUSTRALIA CISO Confluence | October 2020

Andrew Collins
Chief Information Officer & Chief Security Officer, Sport Integrity Australia

Rassoul Ghaznavi Zadeh - AUSTRALIA CISO Confluence | October 2020

Rassoul Ghaznavi Zadeh
Director of Information Security, ResMed

Helaine Leggat - AUSTRALIA CISO Confluence | October 2020

Helaine Leggat
Managing Partner, ICT Legal Consulting

Ts. Dr. Aswami Ariffin - AUSTRALIA CISO Confluence | October 2020

Ts. Dr. Aswami Ariffin
SVP Cyber Security Responsive Services Division, CyberSecurity Malaysia, President DFRS

Bradley 150x150 - AUSTRALIA CISO Confluence | October 2020

Bradley Busch,
Chief Information Security Officer, Tyro Payments & Chairman of the Board, itSMF Australia

What we can offer to Sponsors?

  • Social media promotion on CISO MAG and EC-Council pages
  • Branding on post event video
  • Press release uploaded on CISO MAG website and on all social media channels
  • Conduct a poll for event audience
  • Share product highlights with industry experts
  • Get Exclusive coverage in our Monthly Magazine
  • Get your training needs resolved by our exclusive enterprise packages

Contact Us

For Sponsorship & Business Opportunity

Jyoti Punjabi

Deputy Business Head

[email protected]

+91 99636 54422

For Speaking Opportunity

Pooja Joshi

International Business Head – C|CISO

[email protected]

+91 91 9892797876

For Marketing Inquiries & Media Tie-ups:

Dinesh Kulchandra

Associate Director – Marketing

[email protected]

+91 7208064695