MPOWER at a Glance
MPOWER Cybersecurity Summit will feature a comprehensive agenda packed with targeted, highly informative breakouts. Gain, tangible knowledge throughout the summit on main stage and in breakout sessions – topics will cover:
Data Protection, Privacy and Regulatory Compliance
Privacy in an outsourced world, data governance and collecting data are all issues facing enterprises today. Hear best practices and learnings from the experts and other enterprises.
|Alec Christie, Partner and Head of Digital Law for Asia Pacific EY – Privacy Law Developments Impacting Asia Pacific – What you need to know|
Data privacy and security issues affect every industry. Every business function requires careful attention placed on storing and protecting the privacy of personal information, while maintaining the integrity of company, customer or third party data. In this session Alec will cover some of the regional privacy laws, including the impending Australian changes in February 2018 along with the implications of the ‘GDPR’ European privacy law on the region. With rapidly evolving global and local laws crossing geographical and industry boundaries, Alec will share how to navigate the legal and the practical challenges businesses face, and provide some practical guidance to address these challenges.
|McAfee Tech Session – Privacy and Compliance By Design|
|Protecting data and any vector in which data traverses has become a central point of focus for just about every organisation concerned about becoming the next headline due to a breach and malicious exfiltration of confidential or PII data. Security teams must be enabled to stop data breaches, safeguard intellectual property and assets, and demonstrate regulatory compliance all from a single solution that protects data at rest, in use, and in motion across endpoints, networks, and cloud-based services.
Solutions Demonstrated : DLP, Endpoint and Web Gateway
Session Type : Technical
|McAfee Tech Session – Better Securing your Remote Workforce|
|An increasing mobile workforce – particularly senior-level executives having unrestricted access to sensitive data – presents some of the highest risks and security challenges to organisations today. When your employees roam outside the office walls, they quickly become prime targets for hackers via unsecured free wi-fi hotspots or man-in-the-middle attacks. Providing a pervasive secure connection between the cloud and endpoints ensuring web traffic is secure, eliminates the gap of off-network protection, and ensures every user and device is secure wherever they travel.
Solutions Demonstrated : McAfee DLP, McAfee Cloud Access Security Broker, Web Gateway and Data Encryption
Session Type : Technical
Solving Complexity with Collaboration
Security Innovation Alliance Program, security vendors working together, sharing threat intelligence, solution integration are all important to help achieve the ultimate goal in bringing the industry together to make the world a safer place. Hear what experts recommend and what customers and governments are doing to solve this issue.
|McAfee Tech Session|
|DXL Technology Partner Demonstration|
|McAfee Tech Session – Automated Security Operations is a Reality|
|Research shows that 3 out of 5 organizations see manual processes as holding them back from better organisational effectiveness when it comes to security analytics and operations. You need smarter prioritization and contextualization to support the detection, hunting, and understanding of new threat tactics that are increasingly more complex, subtle, and multi-vector. The business and security outcomes from human-machine teaming can be dramatic, with vastly increased case capacity, reduced training overhead of staff, and ultimately reduced exposure to threat actors with diminished breach dwell times.
Solutions Demonstrated: Enterprise Security Manager (SIEM), Endpoint, McAfee Active Response (EDR), McAfee Threat intelligence Exchange
Session Type : Technical
Emerging and Innovative Trends
Focusing on the latest and greatest security innovations, this theme will cover securing the Internet of Things, artificial intelligence and data science.
|Hank Opdam, CISO The Star Entertainment Group – How embracing new technology has given The Star a winning hand|
|In 2011, the Casinos business of Tabcorp was demerged to create a new organisation – Echo Entertainment Group, now known as The Star Entertainment Group. This new company had new opportunities to make the most of new technology via a cloud and mobile-first strategy. Now the Group is connected to its staff, customers and the world through myriad channels – apps, social media, even new hi-tech hotel rooms and IoT. Throughout the journey there were risks, security challenges and learnings but, most importantly, significant advancement for the organisation. In this presentation, Hank Opdam recounts the last 5 years as head of information security at a company prepared to embrace and invest in new technology.|
|McAfee Tech Session – Safeguarding Cloud Workloads|
|Protecting data as it traverses the cloud-edge expanse plays a significant role in an overall security strategy. It’s just as important to defend the backbone of modern cloud and virtual workloads – the hybrid infrastructure that carries, stores and utilizes that data along its journey. A consolidated approach is critical to securing cloud and data center transformation with centralized visibility and control that reaches all corners of the cloud-edge expanse spanning VMware, AWS, and Azure workloads with a single management experience.
Solution Demonstrated : Cloud Workload Discovery, Management for Optimized Virtual Environments, Virtual McAfee Network Security Platform (IPS)
Session Type : Technical
|McAfee Tech Session – Defending the Cloud-edge Expanse|
|The volume of data being sent to the cloud – via approved methods, or shadow IT – is expected to reach 8.6 zettabytes per year by 2019. Organizations often lack visibility and control around the flow of sensitive data – identifying where their data is, how it is being used and controlling shadow IT activities is a daunting task for many. Cloud applications shouldn’t be a black hole for your data, and they don’t have to be. IT professionals now have the ability to discover, classify, and protect their organisation’s information in popular cloud applications, regardless of how the data entered the app.
Solutions Demonstrated : McAfee DLP, Web Gateway, Cloud Access Security Broker and Data Encryption
Human Factors in Cyber Resiliency
This important theme will cover advice around awareness, training and education required within organisations. It will address the ongoing skills shortage, cultural changes required and diversity issues. Hear best practices and examples from the experts around how they are dealing with these issues.
|Panel – Women in Security: Kristin Lyons, CISO Australia Post, Michelle Price, COO Australian Cyber Security Growth Network, Sandra Ragg, Head of the Office of the Cyber Security Special Adviser|
|Speaker profiles | Link to Agenda >|
Shifts in the Cybercrime Landscape
This theme will deep dive into the biggest threats in recent time. Phishing, whaling, ransomware, threat actors, fraud, geopolitical are all massive issues that will be discussed.
|Dave Marcus, Director Advanced Programs Group’s Intelligence Team – Evolving Adversaries: Behind the veil of the most sophisticated cyber-attacks and how today’s attackers continue to evolve their tactics, techniques and procedures|
|Join Dave Marcus of the Advanced Programs Group’s Intelligence Team for an in-depth session on how two of today’s advanced adversaries, namely APT10 and Shamoon, are continuing to evolve their tactics, techniques and procedures to improve how they orchestrate attacks. True actionable, insightful intelligence is needed now more than ever before. This session will also provide guidance on how you can defend and respond in today’s complex cyber threat landscape and prepare you to better anticipate and address tomorrow’s attacks.|
|McAfee Tech Session – Mastering Endpoint Security|
|It’s well known that endpoints present a vulnerable target for bad guys, often serving as an initial foothold in damaging attacks. There’s no lack of debate about how to best solve the issue, with many arguments centering around what new technology or which model works best – pure intelligence from the cloud or robust agent horsepower; conventional protection or next-gen. We believe you shouldn’t be faced with an “or” decision when it comes to defending endpoints – you need the full spectrum of collaborative capabilities from conventional to next-gen across the threat defense lifecycle through a consolidated agent footprint and single management experience.
Solutions Demonstrated : Endpoint, Threat Intelligence Exchange, McAfee Active Response (EDR)
Mastering Cyber and Business Risk
From case studies to customer insights and experiences, this theme will explore cybersecurity strategy, cyber insurance, measurement, metrics and third party management.
|Ian Yip, Chief Technology Officer, Asia Pacific McAfee How to process, focus and prioritise your efforts by taking a risk-based approach|
|The cyber threat landscape is evolving rapidly and cybercriminals are becoming more sophisticated. While organisations would ideally like a large cybersecurity team and budget to protect themselves, most cannot afford to implement all the measures they would like. There needs to be actionable visibility of the threats in play at any point in time, and a logical approach tied to measurable outcomes that drive cybersecurity investment. This session covers the evolution of the threat landscape including the current state of play and where it is headed, the intelligence available to organisations, how to deal with the complexities and skills challenges that most organisations are facing, and the key strategies to help focus on the things that matter most to maximise cyber risk reduction.|