Managing Director, Optus
Topic: Cyber Workforce Development in Australia – Academia, Industry, & Government Must Come Together
Chief Information Security Officer, Motorola Mobility
Alex van Someren
Managing Partner, Amadeus Capital Ventures
Topic: Cybersecurity and AI: Is This Really a Smart Idea?
Andrew C. Dell
Chief Information Security Officer & GM Security, National Australia Bank Ltd.
Topic: CyberSkills – What’s Your Workforce?
Special Adviser to the Prime Minister on Cyber Security, Department of the Prime Minister & Cabinet
Chief Information Security & Trust Officer, Commonwealth Bank
Topic: Hack Back and Offensive Protection
Chief Executive Officer, LifeJourney
Topic: Cyber Education and Skills In Australia: Where We Are Today vs The Five Eye Nations
General Manager, Threat Research and Intelligence & Security Controls, Telstra
Topic: When Governments Ban the Use of Certain Vendor’s Products, Do You Have to Factor the Risk of Continuing to Use That Vendor and Product in Your Organisation?
Assistant Secretary, IT Security, Department of Defence
Topic: Security Awareness – Necessary Evil, Waste of Time or Valuable Investment?
GM, Wholesale Digital Transformation, ANZ
Topic: Is a Robust National Digital ID Service Viable and Valuable?
Chief Technology Officer, Post Quantum
Topic: Tokenised Identity: The Real Business Use for Blockchain
Portfolio Manager, International Cybersecurity, MITRE Corporation
Topic: Cyber Threat Sharing Best Practices and Lessons Learned
Chief Security Officer, NBNCo
Topic: The Growing Trend Towards Converged Security and Single Accountability for Security Risk in a Modern Organisation
Head of Security Governance, National Australia Bank
Topic: New Tools, Better Security Awareness or Working the Security Basics. Are You Focused on the Right Things?
Chief Information Security Officer, Zephyr Health
Topic: Secure Coding and Threat Modeling — The Alarming Absence of Pillar Components in Secure Software Development
Chief Information Security Officer, ANZ Bank
Topic: How Can We Work Together to Share Information and Respond to Cyber Security Threats?