MPOWER at a Glance
MPOWER Cybersecurity Summit will feature a comprehensive agenda packed with sessions covering security issues and their solutions for the business, technical sessions and McAfee product breakouts. Gain, tangible knowledge throughout the summit on main stage and in the afternoon breakout sessions. The main stage sessions and breakout topics will be focusing on six themes running through the summit : Data Protection, Privacy and Regulatory Compliance; Solving Complexity with Collaboration; Emerging and Innovative Trends; Human Factor in Cyber Resiliency; Shifts in the Cybercrime Landscape along with Business and Cyber Risk.
Data Protection, Privacy and Regulatory Compliance
Privacy in an outsourced world, data governance and collecting data are all issues facing enterprises today. Hear best practices and learnings from the experts and other enterprises.
|Alec Christie, Partner and Head of Digital Law for Asia Pacific EY – Privacy Law Developments Impacting Asia Pacific – What you need to know|
Data privacy and security issues affect every industry. Every business function requires careful attention placed on storing and protecting the privacy of personal information, while maintaining the integrity of company, customer or third party data. In this session Alec will cover some of the regional privacy laws, including the impending Australian changes in February 2018 along with the implications of the ‘GDPR’ European privacy law on the region. With rapidly evolving global and local laws crossing geographical and industry boundaries, Alec will share how to navigate the legal and the practical challenges businesses face, and provide some practical guidance to address these challenges.
Kate Monckton, Privacy Officer and Head of Security Influence and Privacy Engagement, NBN Co. – Three ways I learnt from collaboration; the benefits of partnerships at every level
|People often talk about the benefits of collaboration but what does that actually mean on a practical level? In her presentation, Kate Monckton, nbn’s Head of Security Influence and Privacy Engagement, will share some of the lessons she has learned about the positive and tangible impacts that trusted partnerships with people and groups within and outside of any company can have.
Session Type : Strategic
Solving Complexity with Collaboration
Security Innovation Alliance Program, security vendors working together, sharing threat intelligence, solution integration are all important to help achieve the ultimate goal in bringing the industry together to make the world a safer place. Hear what experts recommend and what customers and governments are doing to solve this issue.
|McAfee Tech Session|
|The power of DXL through a live Technology Partner Demonstration|
|Saeed Hagh, Security Engineer, McAfee – Effective Security Operations through automation and human-machine teaming|
Today’s digital enterprises are struggling to cope with limited visibility for timely security incident detection, and a shortage of security expertise for effective incident investigation and response.
Just-in-time security event analysis and incident and response procedures are disruptive, expensive and difficult for security operation centers to manage.
Learn about McAfee’s comprehensive approach to addressing these challenges. McAfee’s approach enables security analysts at all levels to be effective in their incident analysis, detection, investigation and response by teaming them with Advanced Analytic Technologies and in-built expertise.
Session Type : Technical
|Michael Darman, Security Engineer, McAfee – Tactical Threat Intelligence and Closed Loop Response|
With many sources of tactical threat intelligence available to organisations, it is critical that meaningful context can be derived to enable effective security decision making. And once a decision has been made, it is equally imperative that the intelligence is actionable – response actions can be invoked either automatically, or through as little manual intervention as possible.
This session will show how McAfee’s security platform is able to not only create locally relevant intelligence, but also consume and derive meaning from third party intelligence sources and enable automated response actions.
Session Type : Technical
|Tony Gigliotti, President, Autonomic Software – Don’t WannaCry? Patch Manager for McAfee ePolicy Orchestrator|
|Timely patching is the key to blocking successful cyber attacks. Learn why this is true and what respected IT voices have to say on the subject. Understand the importance of automating security updates and how doing so closes the loop on endpoint security. Finally, see how this can all be done inside of ePO.
Emerging and Innovative Trends
Focusing on the latest and greatest security innovations, this theme will cover securing the Internet of Things, artificial intelligence and data science.
|Hank Opdam, CISO The Star Entertainment Group – How embracing new technology has given The Star a winning hand|
|In 2011, the Casinos business of Tabcorp was demerged to create a new organisation – Echo Entertainment Group, now known as The Star Entertainment Group. This new company had new opportunities to make the most of new technology via a cloud and mobile-first strategy. Now the Group is connected to its staff, customers and the world through myriad channels – apps, social media, even new hi-tech hotel rooms and IoT. Throughout the journey there were risks, security challenges and learnings but, most importantly, significant advancement for the organisation. In this presentation, Hank Opdam recounts the last 5 years as head of information security at a company prepared to embrace and invest in new technology.|
JP Dunning, Principal Consultant Foundstone Practice, McAfee – Risks at the Core of the Internet of Things
|The IoT allows you the convenience of remotely unlocking your front door for a visiting family member, control a building smart grid while on vacation, and manage a corporation wide camera network from home. So what happens if an attacker takes control of these devices?
The IoT relies on a wide variety of technologies, each posing their own a security risk. This session will demonstrate the specific threats against technologies fundamental to the IoT. From cloud based management systems and wireless communication channels, to the chips which contain sensitive security keys, and everything in between. You will learn about known avenues, hackers can use to breach an IoT deployment. Find out if these threats already exist in your environment today and what best practices you can use to mitigate these risks.
|Louis Cheung, Security Engineer, McAfee – A new Approach to Container Security|
As workloads move from physical servers to VMs to containers, it has created new blind spots for security operations. This session will cover best practices and McAfee vNSP for securing microservices and containers.
Consistent security policy for physical server, VM and container workloads.
Session Type : Technical
|Steven Hunter, ForeScout Technologies, Director, Systems Engineering, JAPAC – Securing IoT : Visibility as the Foundation|
|Join ForeScout to explore common but incorrect assumptions that organisations make when thinking about securing IoT and the capabilities that the industry is recognising as necessary to build an effective IoT security strategy.|
Human Factors in Cyber Resiliency
This important theme will cover advice around awareness, training and education required within organisations. It will address the ongoing skills shortage, cultural changes required and diversity issues. Hear best practices and examples from the experts around how they are dealing with these issues.
|Panel – Women in Security with Michelle Price the COO at Australian Cyber Security Growth Network, Jill Slay, Director Cyber Resilience Initiatives, Australian Computer Society, Sharmila Packiaraja, ICT Cyber Security Manager, Kinetic IT and Host: Chatelle Lynch the Chief Human Resource Officer at McAfee|
|Speaker Profiles | Link to Agenda >|
|Nathan Morelli, Manager, ICT Assurance Department for Education and Child Development|
|In this session, Nathan will cover how the ICT Assurance team has moved Information Security away from being an ‘IT thing’. During the session, you will hear about practical changes that were made across the agency that have resulted in increases in the maturity of information security and have inbuilt information security into every day agency processes.|
|Michelle Mosey, Senior Advisor Cyber Security, National Security College, ANU – The future of the cybersecurity profession: How to find and train the next generation of cyber experts|
|By 2020 Australia will need to fill 11 000 cyber professional roles. Where do we find the individuals to shift into these roles? And how do we address the gaps within the current cyber workforce? A discussion on three key areas that can be adopted to: identify the attributes of cyber workforce, increase the pool of applicants and better prepare new entrants into cyber roles. Including a case study on how these approaches have been successfully implemented in DHS.|
|Craig Davies, CEO, Australian Cyber Security Growth Network Ltd – The Evolution of the Australian Cyber Security Network|
|We’re coming up to the end of the first year for AustCyber. In this session, Craig will cover what they have learnt along the way along some wins and war stories. We have a lot more to do but AustCyber continues to work across all segments to grow our industry. More importantly, hear how AustCyber has identified key Australian talent and how your company can take advantage of the solutions available here, along with “what’s next”.
Session Type : Strategic
Shifts in the Cybercrime Landscape
This theme will deep dive into the biggest threats in recent time. Phishing, whaling, ransomware, threat actors, fraud, geopolitical are all massive issues that will be discussed.
|Dave Marcus, Director Advanced Programs Group’s Intelligence Team – Evolving Adversaries: Behind the veil of the most sophisticated cyber-attacks and how today’s attackers continue to evolve their tactics, techniques and procedures|
|Join Dave Marcus of the Advanced Programs Group’s Intelligence Team for an in-depth session on how two of today’s advanced adversaries, namely APT10 and Shamoon, are continuing to evolve their tactics, techniques and procedures to improve how they orchestrate attacks. True actionable, insightful intelligence is needed now more than ever before. This session will also provide guidance on how you can defend and respond in today’s complex cyber threat landscape and prepare you to better anticipate and address tomorrow’s attacks.|
|Alain Le Moeligou, Security Engineer, McAfee -Next-Gen Endpoint Defense|
Endpoint Security is your last line of defense – not only does it need to continuously protect against ever evolving attacks, it needs to detect when defenses are breached and enable rapid recovery and adaptation.
This session will cover how the powerful layers of McAfee ENS 10.5 can protect organizations against today’s threats. We will show examples of how each module plays a role in protecting against different types of attacks. In addition, we will walk through use cases on how ENS version 10.5 can make security analysts proactive hunters.
· Leverage the power of Real Protect and Dynamic Application Containment
· Use Active Response to become a hunter and find undiscovered threats
· How to use Exploit prevention, Firewall, and Web Control effectively
The evolving threat landscape requires enterprise-class Web security that is both agile and provides a comprehensive defense for all users, regardless of location. Come and learn about McAfee’s hybrid web security solution that combines the performance benefits of on-premise and private cloud based appliances with the global coverage of a public cloud web protection service to achieve pervasive protection.
Session Type : Technical
|Kamran Shakil, Security Engineer, McAfee – Defend yourself against Fileless Malware|
While Fileless malware attacks are nothing new, its use is on the rise. It takes advantage of gaps in traditional protection and our trust in what should be trustworthy administration and productivity tools.
This session will provide an overview of the Fileless malware threat, take a deeper look at weaponised Powershell attacks, and arm you with best practices to protect yourself.
|Mark Beaumont, Country Manager, Darktrace – The New Era of Cyber-Threats: Self-Learning Defence and Autonomous Response|
|With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defence, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
In this session, learn about:
Session Type : Technical
|Andy Hood, APAC Enterprise Technology Specialist, McAfee – Pervasive Web Protection|
|The evolving web treat landscape requires enterprise-class web security that is both agile and provides comprehensive for all users, regardless of location. Come and learn about McAfee’s hybrid web solution that combines the performance benefits of on-premise and private cloud based appliances with the global coverage of a public cloud web protection service to achieve pervasive protection.
Mastering Cyber and Business Risk
From case studies to customer insights and experiences, this theme will explore cybersecurity strategy, cyber insurance, measurement, metrics and third party management.
|Paul Hawkins, Security Solutions Architect – APAC, Amazon Web Services – Best Practices for Security at Scale in the Cloud|
|This session showcases the “best of the best” practices for operating securely at scale on AWS, taken from real customer examples. It introduces the AWS Security Best Practices whitepaper and covers a range of security recommendations for Identity and Access Management, Logging and Monitoring, Infrastructure Security, and Data Protection.
Attendees will also learn practical examples found in the Center for Internet Security’s CIS AWS Foundation and CIS AWS Three-Tier Web Architecture benchmarks.
|Ian Yip, Chief Technology Officer, Asia Pacific McAfee How to process, focus and prioritise your efforts by taking a risk-based approach|
|The cyber threat landscape is evolving rapidly and cybercriminals are becoming more sophisticated. While organisations would ideally like a large cybersecurity team and budget to protect themselves, most cannot afford to implement all the measures they would like. There needs to be actionable visibility of the threats in play at any point in time, and a logical approach tied to measurable outcomes that drive cybersecurity investment. This session covers the evolution of the threat landscape including the current state of play and where it is headed, the intelligence available to organisations, how to deal with the complexities and skills challenges that most organisations are facing, and the key strategies to help focus on the things that matter most to maximise cyber risk reduction.|