Event Details
- Summit
- $2699 + GST
- 25 - 26 Jul 2022
- Summit - Vendor pricing
- $3599 + GST
- 25 - 26 Jul 2022
-
Agenda
We live in interesting times – including in the information security domain. This session will help to set the scene for our conversations over the course of the day – outlining the nature of the cyber security challenges New Zealand faces, and how we can work together to manage these challenges.
-
Examining the interplay between cyber security and the government’s digital strategy
-
Linking cyber resilience, digital safety, and inclusion – the pillars for digital trust
-
The international picture – why trust needs to be a critical discussion in all cyber security strategies
A safe, secure, and robust infrastructure of digital provision is a cornerstone for businesses in the digital age – customers are demanding a greater threshold for the use and storage of personal data and at the same time requiring greater ease of access to digital provision of services.
-
Implementing principles encouraging transparency and accountability
-
Setting boundaries in relation to ethical data storage
-
Utilising robust governance to foster public trust in emerging technologies
- What happening? Log4Shell, Ransomware, Pandemic, Russia/Ukraine, CISA Guidance
- What are some of the challenges with Modern Risk Management?
- Why is quantifying risk such a complex problem to solve?
- What are the metrics and measurements needed to quantify risk
- What are some of the steps organisations can take to address these challenges?
- Developing a security strategy for increased business agility and resilience
- Transforming security programmes to become business enablers rather than roadblocks
- Preparing for an ever-changing cyber landscape – how can you build agility and resilience into your programmes
· Progressing towards improving nationwide cyber resilience
· What is the impact of bad cyber strategy? Implementing the fundamental mindshift needed to address the business, human and social impacts of cyber crime
· Addressing human behaviour – why strong and savvy digital and cyber cultures are critical
· How can we address the skills shortage for the cyber workforce – alternative pathways and diversity to encourage new cyber talent
Hilary Walton, Security Culture expert
Mitchell Pham, Chair , Digital Council for Aotearoa
Delegates will be invited to choose their topics of choice at these facilitated discussions. Led by an industry expert, connect and network with your peers around the challenges and triumphs with your cybersecurity journey.
-
The hybrid workforce accelerator – why Zero Trust will be your best defence in hybrid environments
-
The importance of compliance agility and quick patching
-
Re-examining risk parameters – assuming breach to solidify organisations’ cyber incidence protection
The team will share some insights on the research and engagement activities of the programme.
- The Cultural License to Operate – Examining the ethical provision of data under a Te ao Māori lens
- Removing harmful bias in the treatment of indigenous data
- Ethical considerations for culturally appropriate cyber security responses
Iwi affiliations: Ngāi Tahu, Ngāti Rārua, Ngāti Kahungunu & Pākehā
-
Examining the 2022 playing field – what new threats are on the horizon
-
How are AI and automated technology changing the threat game?
-
Lessons from abroad – why a global outlook is critical for protecting NZ enterprises
-
CISOs and ISMs to patch up with what they are going to do
-
Embedding “secure-by-design” practices into your digital roadmaps
-
Lessons from cyber incidents – responding, reporting, and mitigating
- The full Zero Trust reference architecture and steps to get there
-
Why Identity is the foundational layer to build contextual access controls from
Today we are seeing new challenges when it comes to Managing Privilege Access Management within the enterprise environment. The acceleration of Digital Transformation, the Adoption of MuliCLOUD/SAAS, Remote Access and DevOps environments, is expanding the attack landscape. It’s beyond just IT Admins who need access, it also encompasses DevOps, Business Users, Remote Access, and Non Humans who need access to these new environments. Discover how to confidently adopt these new Hybrid Environments and meet the Privilege Access Management Challenge
Digital Acceleration has caused many organisations to move first, ask how best to secure and manage changes to their networks later, creating a perfect storm for attackers and threats looking to exploit silos, complexities and visibility gaps that arise from such complex and piecemeal environments. To overcome these challenges, a cybersecurity mesh platform is required.
Campbell McKenzie, Director – Forensic and Cyber, Incident Response Solutions Ltd
- Proactive approaches required to reinforce cyber defences
- Developing effective risk scenarios in a dynamic threat environment
- Embedding controls and checks into organisational frameworks
- CERT’s top 10 Critical Controls and why these need to be a key focus for organisations
- Notes from the ground floor – what have we learnt about the dynamic risk environment we are operating in and from the nearly 1500 incidents per quarter?
- Measuring cyber resilience – challenges and successes
- What works - Lessons learned from observing a range of organisations deal with cyber security incidents
- Transparency matters – examining accountability and lines of defence for NZ organisations
- The physical vs digital safety debate – making NZ’s cyber streets safe to walk down
- The impact on the digital economy – solid cyber strategy and the societal impact