TABLE #1
John Paitaridis
Managing Director, Optus
Topic: Cyber Workforce Development in Australia – Academia, Industry, & Government Must Come Together
TABLE #2
Richard Rushing
Chief Information Security Officer, Motorola Mobility
Topic: TBA
TABLE #3
Alex van Someren
Managing Partner, Amadeus Capital Ventures
Topic: Cybersecurity and AI: Is This Really a Smart Idea?
TABLE #4
Andrew C. Dell
Chief Information Security Officer & GM Security, National Australia Bank Ltd.
Topic: CyberSkills – What’s Your Workforce?
TABLE #5
Alastair MacGibbon
Special Adviser to the Prime Minister on Cyber Security, Department of the Prime Minister & Cabinet
Topic: TBA
TABLE #6
Yuval Illuz
Chief Information Security & Trust Officer, Commonwealth Bank
Topic: Hack Back and Offensive Protection
TABLE #7
Rick Geritz
Chief Executive Officer, LifeJourney
Topic: Cyber Education and Skills In Australia: Where We Are Today vs The Five Eye Nations
TABLE #8
Chris Mohan
General Manager, Threat Research and Intelligence & Security Controls, Telstra
Topic: When Governments Ban the Use of Certain Vendor’s Products, Do You Have to Factor the Risk of Continuing to Use That Vendor and Product in Your Organisation?
TABLE #9
Chris Brookes
Assistant Secretary, IT Security, Department of Defence
Topic: Security Awareness – Necessary Evil, Waste of Time or Valuable Investment?
TABLE #10
Nigel Dobson
GM, Wholesale Digital Transformation, ANZ
Topic: Is a Robust National Digital ID Service Viable and Valuable?
TABLE #11
Dave Askey
Chief Technology Officer, Post Quantum
Topic: Tokenised Identity: The Real Business Use for Blockchain
TABLE #12
Irv Lachow
Portfolio Manager, International Cybersecurity, MITRE Corporation
Topic: Cyber Threat Sharing Best Practices and Lessons Learned
TABLE #13
Darren Kane
Chief Security Officer, NBNCo
Topic: The Growing Trend Towards Converged Security and Single Accountability for Security Risk in a Modern Organisation
TABLE #14
Nick Scott
Head of Security Governance, National Australia Bank
Topic: New Tools, Better Security Awareness or Working the Security Basics. Are You Focused on the Right Things?
TABLE #15
Kim Green
Chief Information Security Officer, Zephyr Health
Topic: Secure Coding and Threat Modeling — The Alarming Absence of Pillar Components in Secure Software Development
TABLE #16
Lynwen Connick
Chief Information Security Officer, ANZ Bank
Topic: How Can We Work Together to Share Information and Respond to Cyber Security Threats?