Australia CISO Confluence 2020
Date/Time:
Tuesday, October 27, 2020 10:00 PM – Wednesday, October 28, 2020 1:30 AM MDT &
Wednesday, October 28, 2020 10:00 PM – Thursday, October 29, 2020 1:30 AM MDT
Tuesday, October 27, 2020 10:00 PM – Wednesday, October 28, 2020 1:30 AM MDT &
Wednesday, October 28, 2020 10:00 PM – Thursday, October 29, 2020 1:30 AM MDT
EC Council’s CISO MAG as an enabler of strategic community integration has planned a crisp half-day virtual engagement designed to create more awareness on the need for cybersecurity and its related implications in these testing times.
The Australia CISO Confluence will derive realistic insights from senior industry experts on how to redefine security frameworks, mitigate threats and encourage a new culture of cybersecurity to sustain continuity across the region’s business intensive digital ecosystems.
Key topics of Discussion:
There has been an evident surge in malware, phishing, and distributed denial of services since the onset of the pandemic across the Commonwealth of Australia. With the intent to take appropriate actions against these threat actors, the region along with its member states and international partners are to reinforce their collaboration on technical operations at judicial as well as diplomatic levels.
Organizations today, need to not only move beyond compliance and implement dynamic security integration through a multi layered approach, but also need to embrace an enterprise wide culture of cyber risk ownership. To achieve optimum cyber resilience and safeguard business continuity, a dynamic risk management framework is extremely essential for organizations.
The recent release of the Australian Cyber Security Strategy 2020 will give a much-needed incentive to the creation of a secure digital ecosystem to safeguard the nations citizens, business community and critical infrastructure functionality.
EC Council’s CISO MAG as an enabler of strategic community integration has planned a crisp half day virtual engagement designed to create more awareness on the need for cybersecurity and its related implications in these testing times.
The Australia CISO Confluence will derive realistic insights from senior industry experts on how to redefine security frameworks, mitigate threats and encourage a new culture of cybersecurity to sustain continuity across the region’s business intensive digital ecosystems.
Dates: October 26th-29th 2020 at 10 am – 1 a.m UTC
The worlds most advanced ethical hacking course with 20 of the most current security domains an ethical hacker will want to know when planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification!
Dates:October 26th-29th 2020 at 10 am – 1 a.m UTC
The CCISO program trains individuals who are looking to make the jump from middle management to the executive ranks by focusing on high-level management skills specifically needed for IS executives. From project to audit management, procurement and finance, to strategy and policy, students will be taught to steer complex security programs strategically and successfully. The CCISO program was created and is taught by sitting high-level information security executives from across industries, resulting in the most relevant, challenging, and applicable content on the market.
Domain 1: Governance (Policy, Legal and Compliance)
Domain 2: IS Management Controls and Auditing Management (Projects, Technology, and Operations)
Domain 3: Management – Projects and Operations
Domain 4: Information Security Core Competencies
Domain 5: Strategic Planning and Finance
Dates:October 28th October 2020
In this one-day course you will set up EC-Council’s Mobile Security Toolkit (STORM) OS to interface with your drone, then learn about drone hacking. This will include a wide arrange of topics from the basics of drones and the FCC rules, to the capture, examination, and exploitation of drone data.
Damien Manuel
Chairman, Australian Information Security Association
Rassoul Ghaznavi Zadeh,
Director of Information Security, ResMed
Helaine Leggat,
Managing Partner, ICT Legal Consulting
Daniel Pludek,
Chief Technology Officer, Kip McGarth Education Centres
Amit Chaubey,
Head of Cyber Security Risk, Governance & Compliance, Ausgrid
Ashwin Pal,
Director Cybersecurity, Unisys Asia Pacific
Nicki Doble
Group Chief Information Officer, Cover More Insurance
Kelly Henney,
Partner & National Leader Data Privacy Services, KPMG
Andrew Collins
Chief Information Officer & Chief Security Officer, Sport Integrity Australia
Jacqueline Kernot
Partner Cyber Security, EY
Wayne Burke,
VP & Co-Founder, Cyber2labs LLC
Ts. Dr. Aswami Ariffin,
SVP Cyber Security Responsiave Services Division,CyberSecurity Malaysia, President DFRS
Salvatore Trimboli
Chief Technology Officer, E.L & C. Baillieu Limited
Andrew Wan,
Chief Information Security Officer, The Smith Family
Neil Campbell,
Vice President and Head of Asia Pacific & Japan, Rapid7
Rafael Narezzi,
Chief Information Security Officer, WiseEnergy
Daminda Kumara,
Head of Cyber Security and Risk, Wesfarmers Industrial and Safety
Jyoti Punjabi
Deputy Business Head
Pooja Joshi
International Business Head – C|CISO
Dinesh Kulchandra
Associate Director – Marketing