Sessions 2017-10-23T03:25:34+00:00

MPOWER at a Glance

MPOWER Cybersecurity Summit will feature a comprehensive agenda packed with sessions covering security issues and their solutions for the business, technical sessions and McAfee product breakouts. Gain, tangible knowledge throughout the summit on main stage and in the afternoon breakout sessions. The main stage sessions and breakout topics will be focusing on six themes running through the summit : Data Protection, Privacy and Regulatory Compliance; Solving Complexity with Collaboration; Emerging and Innovative Trends; Human Factor in Cyber Resiliency; Shifts in the Cybercrime Landscape along with Business and Cyber Risk.

Data Protection, Privacy and Regulatory Compliance

Privacy in an outsourced world, data governance and collecting data are all issues facing enterprises today. Hear best practices and learnings from the experts and other enterprises.

Alec Christie, Partner and Head of Digital Law for Asia Pacific EY – Privacy Law Developments Impacting Asia Pacific – What you need to know

Data privacy and security issues affect every industry. Every business function requires careful attention placed on storing and protecting the privacy of personal information, while maintaining the integrity of company, customer or third party data. In this session Alec will cover some of the regional privacy laws, including the impending Australian changes in February 2018 along with the implications of the ‘GDPR’ European privacy law on the region. With rapidly evolving global and local laws crossing geographical and industry boundaries, Alec will share how to navigate the legal and the practical challenges businesses face, and provide some practical guidance to address these challenges.

Alec ChristieLink to Agenda >

McAfee Tech Session – Privacy and Compliance By Design
Protecting data and any vector in which data traverses has become a central point of focus for just about every organisation concerned about becoming the next headline due to a breach and malicious exfiltration of confidential or PII data. Security teams must be enabled to stop data breaches, safeguard intellectual property and assets, and demonstrate regulatory compliance all from a single solution that protects data at rest, in use, and in motion across endpoints, networks, and cloud-based services.

Solutions Demonstrated : DLP, Endpoint (ENS) and Web Gateway

Session Type : Technical

Link to Agenda >

McAfee Tech Session – Better Securing your Remote Workforce
An increasing mobile workforce – particularly senior-level executives having unrestricted access to sensitive data – presents some of the highest risks and security challenges to organisations today. When your employees roam outside the office walls, they quickly become prime targets for hackers via unsecured free wi-fi hotspots or man-in-the-middle attacks. Providing a pervasive secure connection between the cloud and endpoints ensuring web traffic is secure, eliminates the gap of off-network protection, and ensures every user and device is secure wherever they travel.

Solutions Demonstrated : DLP, Web Gateway and Data Encryption

Session Type : Technical

Link to Agenda >

Solving Complexity with Collaboration

Security Innovation Alliance Program, security vendors working together, sharing threat intelligence, solution integration are all important to help achieve the ultimate goal in bringing the industry together to make the world a safer place. Hear what experts recommend and what customers and governments are doing to solve this issue.

McAfee Tech Session
The power of DXL through a live Technology Partner Demonstration

Link to Agenda >

McAfee Tech Session – Automated Security Operations is a Reality
Research shows that 3 out of 5 organizations see manual processes as holding them back from better organisational effectiveness when it comes to security analytics and operations. You need smarter prioritization and contextualization to support the detection, hunting, and understanding of new threat tactics that are increasingly more complex, subtle, and multi-vector. The business and security outcomes from human-machine teaming can be dramatic, with vastly increased case capacity, reduced training overhead of staff, and ultimately reduced exposure to threat actors with diminished breach dwell times.

Solutions Demonstrated: Enterprise Security Manager (SIEM), Endpoint (ENS), Active Response (EDR), Threat intelligence Exchange (TIE)

Session Type : Technical

Link to Agenda >

Tony Gigliotti, President, Autonomic Software – Patch Management. The Foundation of a Secure Infrastructure.

Patching operating systems and applications are foundational and a critical process within any security management operation. However doing it well presents many operational challenges and complexities. Hear from Autonomic, a McAfee SIA and DXL technology partner, who will talk about their McAfee ePO integrated solution, their best practice approach to effective patch management and a real success story for a large McAfee/Autonomic customer.

Tony Gigliotti | Link to Agenda >

Human Factors in Cyber Resiliency

This important theme will cover advice around awareness, training and education required within organisations.  It will address the ongoing skills shortage, cultural changes required and diversity issues. Hear best practices and examples from the experts around how they are dealing with these issues.

Panel – Women in Security with Michelle Price the COO at Australian Cyber Security Growth Network, Jill Slay, Director Cyber Resilience Initiatives, Australian Computer Society, Sharmila Packiaraja, ICT Cyber Security Manager, Kinetic IT and Host: Chatelle Lynch the Chief Human Resource Officer at McAfee
Speaker Profiles | Link to Agenda >
Nathan Morelli, Manager, ICT Assurance Department for Education and Child Development
Nathan Morelli | Link to Agenda >
Michelle Mosey, Senior Advisor Cyber Security, National Security College, ANU – The future of the cybersecurity profession: How to find and train the next generation of cyber experts
Michelle Mosey | Link to Agenda >
Craig Davies, CEO, Australian Cyber Security Growth Network Ltd – The Evolution of the Australian Cyber Security Network
Craig Davies| Link to Agenda >

Shifts in the Cybercrime Landscape

This theme will deep dive into the biggest threats in recent time. Phishing, whaling, ransomware, threat actors, fraud, geopolitical are all massive issues that will be discussed.

Dave Marcus, Director Advanced Programs Group’s Intelligence Team – Evolving Adversaries: Behind the veil of the most sophisticated cyber-attacks and how today’s attackers continue to evolve their tactics, techniques and procedures
Join Dave Marcus of the Advanced Programs Group’s Intelligence Team for an in-depth session on how two of today’s advanced adversaries, namely APT10 and Shamoon, are continuing to evolve their tactics, techniques and procedures to improve how they orchestrate attacks. True actionable, insightful intelligence is needed now more than ever before. This session will also provide guidance on how you can defend and respond in today’s complex cyber threat landscape and prepare you to better anticipate and address tomorrow’s attacks.

Dave Marcus | Link to Agenda >

McAfee Tech Session – The Invisible Threat – Using Dynamic Endpoint to Defeat Fileless Malware
It’s well known that endpoints present a vulnerable target for bad guys, often serving as a foothold in damaging attacks such as fileless and script-based malware attacks. There’s no lack of debate about how to best solve the issue, with many arguments centering around what new technology or which model works best – pure intelligence from the cloud or robust agent horsepower; conventional protection or next-gen. We believe you shouldn’t be faced with an “or” decision when it comes to defending endpoints – you need the full spectrum of collaborative capabilities from conventional to next-gen across the threat defense lifecycle through a consolidated agent footprint and single management experience.

Solutions Demonstrated : Endpoint (ENS), Threat Intelligence Exchange (TIE), Active Response (EDR)

Session Type : Technical

Link to Agenda >

Mark Beaumont, Country Manager, Darktrace – The New Era of Cyber-Threats: Self-Learning Defence and Autonomous Response
With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.

This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.

Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defence, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.

In this session, learn about:

  • The new age of silent, stealthy attacks that lie low in networks for weeks and months
  • Why legacy approaches, like rules and signatures, are proving inadequate on their own
  • How new ‘immune system’ technologies based on advanced mathematics and machine learning are being deployed today
  • Real-world examples of subtle, unknown threats that routinely bypass traditional controls

Session Type : Technical

Mark Beaumont Link to Agenda >

Mastering Cyber and Business Risk

From case studies to customer insights and experiences, this theme will explore cybersecurity strategy, cyber insurance, measurement, metrics and third party management.

Paul Hawkins, Security Solutions Architect – APAC, Amazon Web Services – Best Practices for Security at Scale in the Cloud
This session showcases the “best of the best” practices for operating securely at scale on AWS, taken from real customer examples.  It introduces the AWS Security Best Practices whitepaper and covers a range of security recommendations for Identity and Access Management, Logging and Monitoring, Infrastructure Security, and Data Protection.

Attendees will also learn practical examples found in the Center for Internet Security’s CIS AWS Foundation and CIS AWS Three-Tier Web Architecture benchmarks.

Paul Hawkins | Link to Agenda >

Ian Yip, Chief Technology Officer, Asia Pacific McAfee How to process, focus and prioritise your efforts by taking a risk-based approach
The cyber threat landscape is evolving rapidly and cybercriminals are becoming more sophisticated. While organisations would ideally like a large cybersecurity team and budget to protect themselves, most cannot afford to implement all the measures they would like. There needs to be actionable visibility of the threats in play at any point in time, and a logical approach tied to measurable outcomes that drive cybersecurity investment. This session covers the evolution of the threat landscape including the current state of play and where it is headed, the intelligence available to organisations, how to deal with the complexities and skills challenges that most organisations are facing, and the key strategies to help focus on the things that matter most to maximise cyber risk reduction.

Ian Yip | Link to Agenda >