focusnetwork.co
Open in
urlscan Pro
116.90.49.218
Public Scan
URL:
https://focusnetwork.co/cisoleaders.com.au/homepage-melbourne-2022/
Submission: On November 18 via manual from AU — Scanned from DE
Submission: On November 18 via manual from AU — Scanned from DE
Form analysis
3 forms found in the DOMPOST /cisoleaders.com.au/homepage-melbourne-2022/#wpcf7-f6942-p15122-o1
<form action="/cisoleaders.com.au/homepage-melbourne-2022/#wpcf7-f6942-p15122-o1" method="post" class="wpcf7-form init" novalidate="novalidate">
<label class="ebd_input"><input type="hidden" name="ebd_downloads[]" value="7895|2019 CIO/CISO LEADERS SUMMIT SYDNEY AUSTRALIA"> </label><input type="hidden" class="ebd_setting" name="ebd_settings[]"
value="title|2019 CIO/CISO LEADERS SUMMIT SYDNEY AUSTRALIA"><input type="hidden" class="ebd_setting" name="ebd_settings[]" value="delivered_as|both"><input type="hidden" class="ebd_setting" name="ebd_settings[]" value="hide_form|no"><input
type="hidden" class="ebd_setting" name="ebd_settings[]" value="radio|no"><input type="hidden" class="ebd_setting" name="ebd_settings[]" value="link_format|_blank"><input type="hidden" class="ebd_setting" name="ebd_settings[]"
value="item_id|4"><input type="hidden" class="ebd_setting" name="ebd_settings[]" value="form_id|wpcf7-f6942-p15122-o1">
<div style="display: none;">
<input type="hidden" name="_wpcf7" value="6942">
<input type="hidden" name="_wpcf7_version" value="5.2.2">
<input type="hidden" name="_wpcf7_locale" value="en_US">
<input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f6942-p15122-o1">
<input type="hidden" name="_wpcf7_container_post" value="15122">
<input type="hidden" name="_wpcf7_posted_data_hash" value="">
<input type="hidden" name="_wpcf7_recaptcha_response"
value="03AGdBq25haxPDj79lgFK6bJWrRqFPgJ6esksnMjelG3a-58Bvoo6bLcEPnp9tniKihmNn07uBbuWTFgs7SOktxz8f59Jl1yTUv_QXNzjvz76qNMzgkDTUxsmbF9PzvWQENMiXCESD2h-6QXHK0pE3G-yYXxHxG25ViIiW2PzC5xnhabaqgLob5LnA0DaZcZ8BVasKZ1Y4yIDBZRNae8SmESqlQiGI5P-u3yTBMrl1SLtUGPcQIYPwdIrQTrHxdbLkGHuorg2ksyfRWqhykMRAC0Sxt6vIrVmMHSukPr_R_iNBIcQ5vUNkljxJ7GDSzr77rW6oW9vMlGmSsfUMNsss4ocRVNzc_OEBIzvh1g4QAn8Sa6uBb7P9sL6KcnDNav0iJrGdmbAU-algpEwY9JyTmmQ2XMVCurhFZzEQndnn0dZbXyvToehNVlOdYbPfFJCDWThR3gnNx3ukQNL27aqrrIoDPGuUwqvybw">
</div>
<div class="row">
<div class="col-sm-6">
<p><span class="wpcf7-form-control-wrap FirstName"><input type="text" name="FirstName" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"
placeholder="FirstName *"></span></p>
<p><span class="wpcf7-form-control-wrap Company"><input type="text" name="Company" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Company *"></span>
</p>
<p><span class="wpcf7-form-control-wrap Email"><input type="email" name="Email" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email" aria-required="true" aria-invalid="false"
placeholder="Email Address *"></span></p>
<p><br></p>
<p><span class="wpcf7-form-control-wrap capital-quiz"><label><span class="wpcf7-quiz-label">Which is bigger, 2 or 8?</span> <input type="text" name="capital-quiz" size="40" class="wpcf7-form-control wpcf7-quiz" autocomplete="off"
aria-required="true" aria-invalid="false"></label><input type="hidden" name="_wpcf7_quiz_answer_capital-quiz" value="331613392d44371ad6ad9b55d8d8280f"></span></p>
</div>
<div class="col-sm-6">
<p><span class="wpcf7-form-control-wrap LastName"><input type="text" name="LastName" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="LastName *"></span>
</p>
<p><span class="wpcf7-form-control-wrap JobTitle"><input type="text" name="JobTitle" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"
placeholder="Job Title *"></span></p>
<p><span class="wpcf7-form-control-wrap Phone"><input type="text" name="Phone" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Phone *"></span></p>
</div>
</div>
<div class="row text-center">
<p><input type="submit" value="Send" class="wpcf7-form-control wpcf7-submit button button-blue3"><span class="ajax-loader"></span></p>
</div>
<input type="hidden" class="wpcf7-pum" value="{"closepopup":false,"closedelay":0,"openpopup":false,"openpopup_id":0}">
<div class="wpcf7-response-output" role="alert" aria-hidden="true"></div>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7090044/c96949b9-3e7b-40e7-b665-b0e6a8a6e029
<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7090044/c96949b9-3e7b-40e7-b665-b0e6a8a6e029" enctype="multipart/form-data" id="hsForm_c96949b9-3e7b-40e7-b665-b0e6a8a6e029"
method="POST" class="hs-form stacked hs-form-private hsForm_c96949b9-3e7b-40e7-b665-b0e6a8a6e029 hs-form-c96949b9-3e7b-40e7-b665-b0e6a8a6e029 hs-form-c96949b9-3e7b-40e7-b665-b0e6a8a6e029_1633f8c1-bbab-44be-8dc5-3bb316b3a45d"
data-form-id="c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-portal-id="7090044" target="target_iframe_c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1">
<fieldset class="form-columns-2" data-reactid=".hbspt-forms-1.1:$0">
<div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$0.1:$firstname"><label id="label-firstname-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your "
for="firstname-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$0.1:$firstname.0"><span data-reactid=".hbspt-forms-1.1:$0.1:$firstname.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$0.1:$firstname.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$0.1:$firstname.$firstname"><input id="firstname-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" type="text" name="firstname" required="" value="" placeholder="First name*"
autocomplete="given-name" data-reactid=".hbspt-forms-1.1:$0.1:$firstname.$firstname.0" inputmode="text"></div>
</div>
<div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$0.1:$lastname"><label id="label-lastname-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your "
for="lastname-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$0.1:$lastname.0"><span data-reactid=".hbspt-forms-1.1:$0.1:$lastname.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$0.1:$lastname.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$0.1:$lastname.$lastname"><input id="lastname-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" type="text" name="lastname" required="" value="" placeholder="Last name*"
autocomplete="family-name" data-reactid=".hbspt-forms-1.1:$0.1:$lastname.$lastname.0" inputmode="text"></div>
</div>
</fieldset>
<fieldset class="form-columns-2" data-reactid=".hbspt-forms-1.1:$1">
<div class="hs_company hs-company hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$1.1:$company"><label id="label-company-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your "
for="company-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$1.1:$company.0"><span data-reactid=".hbspt-forms-1.1:$1.1:$company.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$1.1:$company.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$1.1:$company.$company"><input id="company-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" type="text" name="company" required="" value="" placeholder="Company name*"
autocomplete="organization" data-reactid=".hbspt-forms-1.1:$1.1:$company.$company.0" inputmode="text"></div>
</div>
<div class="hs_job_function hs-job_function hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$1.1:$job_function"><label id="label-job_function-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your "
for="job_function-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$1.1:$job_function.0"><span data-reactid=".hbspt-forms-1.1:$1.1:$job_function.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$1.1:$job_function.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$1.1:$job_function.$job_function"><input id="job_function-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" type="text" name="job_function" required="" value="" placeholder="Job Title*"
data-reactid=".hbspt-forms-1.1:$1.1:$job_function.$job_function.0" inputmode="text"></div>
</div>
</fieldset>
<fieldset class="form-columns-2" data-reactid=".hbspt-forms-1.1:$2">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$2.1:$email"><label id="label-email-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your "
for="email-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$2.1:$email.0"><span data-reactid=".hbspt-forms-1.1:$2.1:$email.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$2.1:$email.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$2.1:$email.$email"><input id="email-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" type="email" name="email" required="" placeholder="Email*" value="" autocomplete="email"
data-reactid=".hbspt-forms-1.1:$2.1:$email.$email.0" inputmode="email"></div>
</div>
<div class="hs_phone hs-phone hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$2.1:$phone"><label id="label-phone-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your "
for="phone-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$2.1:$phone.0"><span data-reactid=".hbspt-forms-1.1:$2.1:$phone.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$2.1:$phone.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$2.1:$phone.$phone"><input id="phone-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" type="tel" name="phone" required="" value="" placeholder="Mobile Phone*" autocomplete="tel"
data-reactid=".hbspt-forms-1.1:$2.1:$phone.$phone.0" inputmode="tel"></div>
</div>
</fieldset>
<fieldset class="form-columns-2" data-reactid=".hbspt-forms-1.1:$3">
<div class="hs_which_location_ hs-which_location_ hs-fieldtype-select field hs-form-field" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_"><label id="label-which_location_-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class=""
placeholder="Enter your Which location:" for="which_location_-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.0"><span data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.0.0">Which
location:</span><span class="hs-form-required" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.0.1">*</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.$which_location_"><select id="which_location_-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" required="" class="hs-input is-placeholder" name="which_location_"
data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.$which_location_.0">
<option value="" disabled="" selected="" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.$which_location_.0.0">Please Select</option>
<option value="Melbourne" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.$which_location_.0.1:$Melbourne">Melbourne</option>
<option value="Sydney" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.$which_location_.0.1:$Sydney">Sydney</option>
<option value="Both" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.$which_location_.0.1:$Both">Both</option>
</select></div>
</div>
<div class="hs_interested_in_checkbox hs-interested_in_checkbox hs-fieldtype-select field hs-form-field" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox"><label id="label-interested_in_checkbox-c96949b9-3e7b-40e7-b665-b0e6a8a6e029"
class="" placeholder="Enter your Interested in" for="interested_in_checkbox-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.0"><span
data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.0.0">Interested in</span><span class="hs-form-required" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.0.1">*</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox"><select id="interested_in_checkbox-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" required="" class="hs-input is-placeholder"
name="interested_in_checkbox" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox.0">
<option value="" disabled="" selected="" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox.0.0">Please Select</option>
<option value="Delegate" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox.0.1:$Delegate">Delegate</option>
<option value="Sponsor" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox.0.1:$Sponsor">Sponsor</option>
<option value="Speaker" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox.0.1:$Speaker">Speaker</option>
<option value="Partner" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox.0.1:$Partner">Partner</option>
</select></div>
</div>
</fieldset>
<fieldset class="form-columns-1" data-reactid=".hbspt-forms-1.1:$4">
<div class="hs_message hs-message hs-fieldtype-textarea field hs-form-field" data-reactid=".hbspt-forms-1.1:$4.1:$message"><label id="label-message-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your Message"
for="message-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$4.1:$message.0"><span data-reactid=".hbspt-forms-1.1:$4.1:$message.0.0">Message</span><span class="hs-form-required"
data-reactid=".hbspt-forms-1.1:$4.1:$message.0.1">*</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$4.1:$message.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$4.1:$message.$message"><textarea id="message-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" name="message" required="" placeholder=""
data-reactid=".hbspt-forms-1.1:$4.1:$message.$message.0"></textarea></div>
</div>
</fieldset><noscript data-reactid=".hbspt-forms-1.2"></noscript>
<div class="hs_recaptcha hs-recaptcha field hs-form-field" data-reactid=".hbspt-forms-1.3">
<div class="input" data-reactid=".hbspt-forms-1.3.0">
<div class="grecaptcha-badge" data-style="inline" style="width: 256px; height: 60px; box-shadow: gray 0px 0px 5px;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6Ld_ad8ZAAAAAAqr0ePo1dUfAi0m4KPkCMQYwPPm&co=aHR0cHM6Ly9mb2N1c25ldHdvcmsuY286NDQz&hl=de&v=_7Co1fh8iT2hcjvquYJ_3zSP&size=invisible&badge=inline&cb=ty638z413sq1"
width="256" height="60" role="presentation" name="a-h126b077txcz" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response-1" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div><input type="hidden" name="g-recaptcha-response" id="hs-recaptcha-response" value="" data-reactid=".hbspt-forms-1.3.1">
</div>
<div class="hs_submit hs-submit" data-reactid=".hbspt-forms-1.5">
<div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.5.0"></div>
<div class="actions" data-reactid=".hbspt-forms-1.5.1"><input type="submit" value="Submit" class="hs-button primary large" data-reactid=".hbspt-forms-1.5.1.0"></div>
</div><noscript data-reactid=".hbspt-forms-1.6"></noscript><input name="hs_context" type="hidden"
value="{"rumScriptExecuteTime":3061.699999809265,"rumServiceResponseTime":4885.300000190735,"rumFormRenderTime":1.1999998092651367,"rumTotalRenderTime":4917.39999961853,"rumTotalRequestTime":1822.6000003814697,"renderRawHtml":"true","lang":"en","clonedFromForm":"39e3f502-0c53-4d88-89eb-ba19c60f92e3","embedType":"REGULAR","embedAtTimestamp":"1637276520434","formDefinitionUpdatedAt":"1637205997202","pageUrl":"https://focusnetwork.co/cisoleaders.com.au/homepage-melbourne-2022/","pageTitle":"CISO Leaders Summit Australia 2021","source":"FormsNext-static-5.412","sourceName":"FormsNext","sourceVersion":"5.412","sourceVersionMajor":"5","sourceVersionMinor":"412","timestamp":1637276520434,"userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36","originalEmbedContext":{"region":"na1","portalId":"7090044","formId":"c96949b9-3e7b-40e7-b665-b0e6a8a6e029","target":".hsform_eventr1"},"renderedFieldsIds":["firstname","lastname","company","job_function","email","phone","which_location_","interested_in_checkbox","message"],"formTarget":".hsform_eventr1","correlationId":"2169cdf3-d2aa-4ad3-b0bc-3cdf678e3a32","contentType":"standard-page","hutk":"93e9e6e7d02c58eb5747500361f906b9","captchaStatus":"LOADED"}"
data-reactid=".hbspt-forms-1.7"><iframe name="target_iframe_c96949b9-3e7b-40e7-b665-b0e6a8a6e029" style="display:none;" data-reactid=".hbspt-forms-1.8"></iframe>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7090044/ecb8c1d5-2187-48e8-ab63-b29615f9375e
<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7090044/ecb8c1d5-2187-48e8-ab63-b29615f9375e" enctype="multipart/form-data" id="hsForm_ecb8c1d5-2187-48e8-ab63-b29615f9375e"
method="POST" class="hs-form stacked hs-form-private hsForm_ecb8c1d5-2187-48e8-ab63-b29615f9375e hs-form-ecb8c1d5-2187-48e8-ab63-b29615f9375e hs-form-ecb8c1d5-2187-48e8-ab63-b29615f9375e_63847cb2-4f48-4808-8514-b25aef91eeed"
data-form-id="ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-portal-id="7090044" target="target_iframe_ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0">
<fieldset class="form-columns-2" data-reactid=".hbspt-forms-0.1:$0">
<div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0.1:$firstname"><label id="label-firstname-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
for="firstname-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$0.1:$firstname.0"><span data-reactid=".hbspt-forms-0.1:$0.1:$firstname.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1:$firstname.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$0.1:$firstname.$firstname"><input id="firstname-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" type="text" name="firstname" required="" value="" placeholder="First name*"
autocomplete="given-name" data-reactid=".hbspt-forms-0.1:$0.1:$firstname.$firstname.0" inputmode="text"></div>
</div>
<div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0.1:$lastname"><label id="label-lastname-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
for="lastname-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$0.1:$lastname.0"><span data-reactid=".hbspt-forms-0.1:$0.1:$lastname.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1:$lastname.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$0.1:$lastname.$lastname"><input id="lastname-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" type="text" name="lastname" required="" value="" placeholder="Last name*"
autocomplete="family-name" data-reactid=".hbspt-forms-0.1:$0.1:$lastname.$lastname.0" inputmode="text"></div>
</div>
</fieldset>
<fieldset class="form-columns-2" data-reactid=".hbspt-forms-0.1:$1">
<div class="hs_company hs-company hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$1.1:$company"><label id="label-company-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
for="company-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$1.1:$company.0"><span data-reactid=".hbspt-forms-0.1:$1.1:$company.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$1.1:$company.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$1.1:$company.$company"><input id="company-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" type="text" name="company" required="" value="" placeholder="Company name*"
autocomplete="organization" data-reactid=".hbspt-forms-0.1:$1.1:$company.$company.0" inputmode="text"></div>
</div>
<div class="hs_job_function hs-job_function hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$1.1:$job_function"><label id="label-job_function-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
for="job_function-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$1.1:$job_function.0"><span data-reactid=".hbspt-forms-0.1:$1.1:$job_function.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$1.1:$job_function.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$1.1:$job_function.$job_function"><input id="job_function-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" type="text" name="job_function" required="" value="" placeholder="Job Title*"
data-reactid=".hbspt-forms-0.1:$1.1:$job_function.$job_function.0" inputmode="text"></div>
</div>
</fieldset>
<fieldset class="form-columns-2" data-reactid=".hbspt-forms-0.1:$2">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$2.1:$email"><label id="label-email-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
for="email-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$2.1:$email.0"><span data-reactid=".hbspt-forms-0.1:$2.1:$email.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$2.1:$email.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$2.1:$email.$email"><input id="email-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" type="email" name="email" required="" placeholder="Email*" value="" autocomplete="email"
data-reactid=".hbspt-forms-0.1:$2.1:$email.$email.0" inputmode="email"></div>
</div>
<div class="hs_phone hs-phone hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$2.1:$phone"><label id="label-phone-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
for="phone-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$2.1:$phone.0"><span data-reactid=".hbspt-forms-0.1:$2.1:$phone.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$2.1:$phone.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$2.1:$phone.$phone"><input id="phone-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" type="tel" name="phone" required="" value="" placeholder="Mobile Phone*" autocomplete="tel"
data-reactid=".hbspt-forms-0.1:$2.1:$phone.$phone.0" inputmode="tel"></div>
</div>
</fieldset>
<fieldset class="form-columns-2" data-reactid=".hbspt-forms-0.1:$3">
<div class="hs_message hs-message hs-fieldtype-textarea field hs-form-field" data-reactid=".hbspt-forms-0.1:$3.1:$message"><label id="label-message-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
for="message-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$3.1:$message.0"><span data-reactid=".hbspt-forms-0.1:$3.1:$message.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$3.1:$message.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$3.1:$message.$message"><textarea id="message-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" name="message" required="" placeholder="Message*"
data-reactid=".hbspt-forms-0.1:$3.1:$message.$message.0"></textarea></div>
</div>
<div class="hs_which_location_ hs-which_location_ hs-fieldtype-select field hs-form-field" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_"><label id="label-which_location_-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class=""
placeholder="Enter your Which location:" for="which_location_-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.0"><span data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.0.0">Which
location:</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.$which_location_"><select id="which_location_-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input is-placeholder" name="which_location_"
data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.$which_location_.0">
<option value="" disabled="" selected="" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.$which_location_.0.0">Please Select</option>
<option value="Melbourne" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.$which_location_.0.1:$Melbourne">Melbourne</option>
<option value="Sydney" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.$which_location_.0.1:$Sydney">Sydney</option>
<option value="Both" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.$which_location_.0.1:$Both">Both</option>
</select></div>
</div>
</fieldset><noscript data-reactid=".hbspt-forms-0.2"></noscript>
<div class="hs_recaptcha hs-recaptcha field hs-form-field" data-reactid=".hbspt-forms-0.3">
<div class="input" data-reactid=".hbspt-forms-0.3.0">
<div class="grecaptcha-badge" data-style="inline" style="width: 256px; height: 60px; box-shadow: gray 0px 0px 5px;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6Ld_ad8ZAAAAAAqr0ePo1dUfAi0m4KPkCMQYwPPm&co=aHR0cHM6Ly9mb2N1c25ldHdvcmsuY286NDQz&hl=de&v=_7Co1fh8iT2hcjvquYJ_3zSP&size=invisible&badge=inline&cb=w20pagnh6wyd"
width="256" height="60" role="presentation" name="a-axk2q9s83uiv" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div>
</div><input type="hidden" name="g-recaptcha-response" id="hs-recaptcha-response" value="" data-reactid=".hbspt-forms-0.3.1">
</div>
<div class="hs_submit hs-submit" data-reactid=".hbspt-forms-0.5">
<div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.5.0"></div>
<div class="actions" data-reactid=".hbspt-forms-0.5.1"><input type="submit" value="Submit" class="hs-button primary large" data-reactid=".hbspt-forms-0.5.1.0"></div>
</div><noscript data-reactid=".hbspt-forms-0.6"></noscript><input name="hs_context" type="hidden"
value="{"rumScriptExecuteTime":3068.699999809265,"rumServiceResponseTime":4884.699999809265,"rumFormRenderTime":1.6999998092651367,"rumTotalRenderTime":4888,"rumTotalRequestTime":1809.3999996185303,"renderRawHtml":"true","lang":"en","clonedFromForm":"59fcc030-db55-4c97-970f-e3750d254c57","embedType":"REGULAR","embedAtTimestamp":"1637276520429","formDefinitionUpdatedAt":"1637198976708","pageUrl":"https://focusnetwork.co/cisoleaders.com.au/homepage-melbourne-2022/","pageTitle":"CISO Leaders Summit Australia 2021","source":"FormsNext-static-5.412","sourceName":"FormsNext","sourceVersion":"5.412","sourceVersionMajor":"5","sourceVersionMinor":"412","timestamp":1637276520429,"userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36","originalEmbedContext":{"region":"na1","portalId":"7090044","formId":"ecb8c1d5-2187-48e8-ab63-b29615f9375e","target":".hsform_eventr"},"renderedFieldsIds":["firstname","lastname","company","job_function","email","phone","message","which_location_"],"formTarget":".hsform_eventr","correlationId":"3a661145-481a-4ae6-87a0-5a91bc7e4ee4","contentType":"standard-page","hutk":"93e9e6e7d02c58eb5747500361f906b9","captchaStatus":"LOADED"}"
data-reactid=".hbspt-forms-0.7"><iframe name="target_iframe_ecb8c1d5-2187-48e8-ab63-b29615f9375e" style="display:none;" data-reactid=".hbspt-forms-0.8"></iframe>
</form>
Text Content
Toggle navigation * About Us * Who We Are * Our Mission * Focus Careers * Our Clients * Testimonials * Our Reach * Insights Hub * Executive Insights Series * Expert Insights * Post Event Reports * News * Latest Updates * Digital Services * Private Events * Summits * IT * IT Security * Health & Safety * Upcoming Events * Contact Toggle navigation * Speakers * Why Attend * Program * Sponsors * Venue * Register Now Join us at the 8th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able to engage with the country's leading IT Security professionals on the 1st March 2022, Crown Conference Centre, Melbourne Join us at the 8th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able to engage with the country's leading IT Security professionals on the 1st March 2022, Crown Conference Centre, Melbourne Join us at the 8th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able to engage with the country's leading IT Security professionals on the 1st March 2022, Crown Conference Centre, Melbourne Join us at the 8th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able to engage with the country's leading IT Security professionals on the 1st March 2022, Crown Conference Centre, Melbourne JOIN US AT THE 8TH CISO LEADERS AUSTRALIA SUMMIT BE PART OF THIS YEAR’S UPCOMING GATHERING WHERE YOU WILL BE ABLE TO ENGAGE WITH THE COUNTRY’S LEADING IT SECURITY PROFESSIONALS ON THE 1ST MARCH 2022, CROWN CONFERENCE CENTRE, MELBOURNE JOIN THE GATHERING GET YOUR VIP TICKET HERE 102 DAYS 0 HOURS 57 MINUTES 53 SECONDS ABOUT THE EVENT THE 8TH CISO LEADERS AUSTRALIA SUMMIT WILL TAKE PLACE ON THE 1ST OF MARCH 2022 AT THE CROWN CONFERENCE CENTRE IN MELBOURNE. THE SUMMIT WILL ONCE AGAIN BECOME THE MEETING PLACE FOR MORE THAN 150 OF THE COUNTRY'S LEADING CISOS, HEADS OF IT SECURITY, CYBER SECURITY AND CIOS. THIS YEAR'S SUMMIT THEME WILL BE FOCUSSED ON 'RE-EVALUATING SECURITY POSTURE TO BUILD A CYBER SECURITY ENTERPRISE' AND THIS MESSAGE WILL BE DELIVERED VIA A NUMBER OF KEYNOTES, WORKSHOPS AND TARGETED ROUNDTABLES DISCUSSIONS TAKING PLACE THROUGHOUT DAY. ATTENDEES WILL HAVE THE OPPORTUNITY TO PERSONALISE THEIR OWN AGENDA AND MAXIMISE THEIR TIME OUT OF THE OFFICE BY ENGAGING IN ONLY THE MOST RELEVANT SESSIONS FOR THEIR BUSINESS. OUR NETWORKING DRINKS FUNCTION WILL PROVIDE THE CHANCE TO INTERACT FACE TO FACE WITH PEERS IN A VERY RELAXED SETTING. WHILST WE ARE ALL ADJUSTING TO THE 'NEW NORM’ AND ADAPTING TO THE CHALLENGES AND OPPORTUNITIES THAT COVID-19 BROUGHT FOR US ALL, WE ARE COMMITTED TO DELIVER A GREAT EVENT IN A WELL-MANAGED AND SAFE ENVIRONMENT. WE HAVE INTRODUCED NEW EVENT PROTOCOLS TO SAFEGUARD THE HEALTH AND WELLBEING OF ALL OUR SPONSORS, ATTENDEES AND STAFF WHILST CONTINUING TO DELIVER STRONG OPPORTUNITIES AND ENGAGEMENTS. YOU CAN DOWNLOAD OUR SAFE EVENT GUIDELINES HERE SPEAKERS CHRIS BEZUIDENHOUT Managing Director, CIB CIO APAC & Emerging Markets, Deutsche Bank AG TIM WATTS MP Shadow Assistant Minister for Communications & Cybersecurity and Federal Member for Gellibrand, Parliament of Australia JONATHAN MILTON Head, Cyber Security, Bupa LUKE STELLER Head, Global Cyber Security Operations & Threat Intelligence, ANZ MITRA MINAI Chief Information Security Officer, Healthscope Operations TRACEY EVANS CIO, SEEK VINAY MANIKKAM Principal, Enterprise Security Architect, IAG JENNIFER REBEIRO CIO, City West Water VIJAY NARAYAN Chief Information Security Officer, Environment Protection Authority DR. MALCOLM THATCHER Chief Technology Officer, Australian Digital Health Agency VENKATA VALLURI Global IT Director, Treasury Wine Estates IAN PADGHAM CIO, Vicinity Centres Trust MARC AIRO-FARULLA Regional Sales Director Oceania (AU, NZ & Pacific Islands), Entrust DRAGAN VLADICIC Senior Manager, Solutions Engineer, Asia Pacific, Okta REINHART HANSEN Director of Technology, Office of the CTO, Imperva JAY HIRA Security and Compliance Advisor, Salesforce AMR IBRAHIM Lead Platform Specialist, Salesforce MATTHEW BURNS Director, BigFix, Asia Pacific & Japan, HCL Software CLYDE FERNANDEZ RVP, Platform, Salesforce RANDEEP CHHABRA General Manager, AppScan, Asia Pacific & Japan, HCL Software BYRON COLLINS Executive Director Business Services & Chief Technology Officer, University of Melbourne LUKE HANNAN Professional Master of Ceremonies, Live Event Host, lukehannan.com.au GET YOUR VIP TICKET CLICK HERE PROGRAM The summit program is a draft and is subject to change. * Melbourne 2022 * Sydney 2022 08:00 ARRIVAL & REGISTRATION ARRIVAL & REGISTRATION 40min 08:40 WELCOME & INTRODUCTION WELCOME & INTRODUCTION TYRON MCGURGAN, CEO, FOCUS NETWORK 5min 08:45 MASTER OF CEREMONIES, CIO TRACK MAIN PLENARY MASTER OF CEREMONIES, CIO TRACK MAIN PLENARY LUKE HANNAN, MASTER OF CEREMONIES, LUKEHANNAN.COM.AU 5min LUKE HANNAN Luke founded his Professional Master of Ceremonies business www.lukehannan.com.au on 3 key principles; Service, Preparation & Delivery. Based [...] 08:50 OPENING KEYNOTE PRESENTATION – ENABLING NEW APPROACHES TO ORGANISATIONAL DIGITAL INNOVATION IN THE POST-PANDEMIC ERA OPENING KEYNOTE PRESENTATION – ENABLING NEW APPROACHES TO ORGANISATIONAL DIGITAL INNOVATION IN THE POST-PANDEMIC ERA CHRIS BEZUIDENHOUT, MANAGING DIRECTOR, CIB CIO APAC & EMERGING MARKETS, DEUTSCHE BANK AG As innovation becomes synonymous with disruption, IT leaders are distinctively set to evolve into innovation leaders. The need to building required competencies, skills to envision technology-driven business change and deliver on their commitments are essential. 30min CHRIS BEZUIDENHOUT Chris is an experienced CIO with a wealth of expertise in technology management, risk, finance and large-scale transformation for employers, [...] 09:20 KEYNOTE PRESENTATION – ARE YOU ENCRYPTING YOUR DATA AND USING A HARDWARE SECURITY MODULE TO STORE YOUR KEYS? KEYNOTE PRESENTATION – ARE YOU ENCRYPTING YOUR DATA AND USING A HARDWARE SECURITY MODULE TO STORE YOUR KEYS? MARC AIRO-FARULLA, REGIONAL SALES DIRECTOR OCEANIA (AU, NZ & PACIFIC ISLANDS), ENTRUST The Annual Global Encryption Trends study and the country report of Australia will help you understand why this question is so important! As Information Security leaders, protecting customer and organisational data from internal and external threats is the core pillar to Security. General security solutions and digital applications are standard practice, but what about Encryption and Key Management strategies, are you, as the leading authority in your organisation implementing these solutions and if so, are they in the most secure way with an HSM? Let's talk about the Annual GETS (Global Encryption Trends Study) and the Australia country report, where thousands of like-minded professionals have their say! 30min MARC AIRO-FARULLA Over 20 years experience and knowledge in the field of Security & Digital Technological implementations, mastered the art of enterprise [...] 09:55 ROUNDTABLE DISCUSSION – CISO TRACK – CREATING A CYBER-RISK CULTURE IN THE BOARDROOM AND BEYOND ROUNDTABLE DISCUSSION – CISO TRACK – CREATING A CYBER-RISK CULTURE IN THE BOARDROOM AND BEYOND * Breaking the cyber security knowledge gap * Structuring a cyber security risk profile aligned to enterprise risk * Develop an effective security metrics and dashboard 40min 09:55 ROUNDTABLE DISCUSSION – CIO TRACK – CX COLLABORATION – CIO AS ENABLER OF BUSINESS SUCCESS ROUNDTABLE DISCUSSION – CIO TRACK – CX COLLABORATION – CIO AS ENABLER OF BUSINESS SUCCESS TRACEY EVANS, CHIEF INFORMATION OFFICER, SEEK * Importance of being insight-driven and operationally efficient while continuously invoking innovation * Identifying new opportunities to design and deliver a better CX thru in sync with other departments * Creating the right culture of service and accountability measures in a Post-COVID-19 world 40min TRACEY EVANS Tracey is a passionate technologist with extensive experience leading change and enterprise transformation across the Asia Pacific region. She [...] 09:55 ROUNDTABLE DISCUSSION – CIO TRACK – BUILDING A MORE RESILIENT AND ADAPTABLE ENTERPRISE THROUGH TECHNOLOGY ROUNDTABLE DISCUSSION – CIO TRACK – BUILDING A MORE RESILIENT AND ADAPTABLE ENTERPRISE THROUGH TECHNOLOGY IAN PADGHAM, GENERAL MANAGER, ENTERPRISE TECHNOLOGY & CIO, VICINITY CENTRES TRUST * Driving the principles of agile delivery to create a more flexible organisation that’s adaptable to constant change & volatility * Rethinking tech funding and governance * Empowering both human and technology-centred solutions 40min IAN PADGHAM Ian Padgham joined Vicinity Centres in June 2015 as part of the Merger of Federation Centres and Novion Property Group (Novion) and has more than [...] 09:55 ROUNDTABLE DISCUSSION – CISO TRACK – UNDERSTANDING YOUR THREAT LANDSCAPE TO BUILD A CYBER RESILIENT ENTERPRISE ROUNDTABLE DISCUSSION – CISO TRACK – UNDERSTANDING YOUR THREAT LANDSCAPE TO BUILD A CYBER RESILIENT ENTERPRISE JONATHAN MILTON, HEAD OF CYBERSECURITY, BUPA * Driving a threat-led security posture * Train like you fight, being ready for game day * Being ransomware ready, throughout your enterprise 40min JONATHAN MILTON Jonathan is currently the head of cyber security at Bupa. With over 15 years leading complex programs of investment across cyber security, [...] 10:35 NETWORKING BREAK NETWORKING BREAK 15min 10:55 WORKSHOP 1 – CISO TRACK – KEEPING PACE WITH EVOLVING REGULATORY AND CYBER LANDSCAPES WORKSHOP 1 – CISO TRACK – KEEPING PACE WITH EVOLVING REGULATORY AND CYBER LANDSCAPES JAY HIRA, SECURITY AND COMPLIANCE ADVISOR, SALESFORCE AMR IBRAHIM, LEAD PLATFORM SPECIALIST, SALESFORCE As we grapple with the rapidly changing threat and regulatory environments, it is important for organisations to take a step back to reflect on their business strategy and adapt their security and compliance stance accordingly. This is doubly so for cloud providers like Salesforce. In this session, we will cover these evolving landscapes as we see them, how we measure our success, how we embed TRUST into everything we do, and what we have learnt - not only from within, but also from our customers. 30min JAY HIRA Jay is an innovative and adept information security practitioner with 14+ years of experience, having successfully delivered information security [...] AMR IBRAHIM Amr is an experienced technical architect with 12+ years of experience in the IT industry. He holds a degree in software engineering. He has [...] 10:55 WORKSHOP 1 – CIO TRACK – SECURING ENDPOINTS AND ENSURING COMPLIANCE WORKSHOP 1 – CIO TRACK – SECURING ENDPOINTS AND ENSURING COMPLIANCE MATTHEW BURNS, DIRECTOR, BIGFIX, ASIA PACIFIC & JAPAN, HCL SOFTWARE Enterprises are under increasing pressure to protect data from breaches in an aggressive attack environment. Security professionals must re-evaluate their security software to adjust for new threats and risk with an eye on reducing complexity. In this session, you will hear; * How are enterprises dealing with compliance challenges around distributed workforces? * What are the key trends around data breaches, and how can organizations defend against those risks? * How can organizations consolidate security toolkits and software? 30min MATTHEW BURNS Matthew Burns is responsible for customer satisfaction and solution responsibility for the BigFix business in the Asia Pacific and Japan. He has [...] 11:30 WORKSHOP 2 – CIO TRACK – ADOPTING AI TO ENHANCE YOUR DATA AND ANALYTICS CAPABILITY WORKSHOP 2 – CIO TRACK – ADOPTING AI TO ENHANCE YOUR DATA AND ANALYTICS CAPABILITY VENKATA VALLURI, GLOBAL IT DIRECTOR, TREASURY WINE ESTATES * Importance in leveraging AI and advanced analytics in driving value creation * Dealing with the data deluge across multiple systems * Implementing data governance to break data silos for effective data centralisation 30min VENKATA VALLURI Venkata is currently the Global IT Director Analytics and Insights for Treasury Wine Estates. He is a skilled data management and analytics [...] 11:30 WORKSHOP 2 – CISO TRACK – CISOS & BOARD – ARE YOU SPEAKING THE SAME LANGUAGE?! HOW TO TRANSLATE YOUR TECHNICAL CYBER LANGUAGE AND HAVE AN EFFECTIVE RISK-BASED DISCUSSION WITH THE BOARD WORKSHOP 2 – CISO TRACK – CISOS & BOARD – ARE YOU SPEAKING THE SAME LANGUAGE?! HOW TO TRANSLATE YOUR TECHNICAL CYBER LANGUAGE AND HAVE AN EFFECTIVE RISK-BASED DISCUSSION WITH THE BOARD MITRA MINAI, CHIEF INFORMATION SECURITY OFFICER, HEALTHSCOPE OPERATIONS Take-aways from this session: * Translate the technical language of Cyber Risk and align with business strategy and objectives * Techniques in presenting the Cybersecurity Strategy and Roadmap to the Board * Demonstrating the business value of cybersecurity * Cybersecurity Metrics and Dashboard reporting * Moving the organization from Cyber Defense to Cyber Resilience 30min MITRA MINAI Mitra is a senior Technology and Security Transformation executive with over 20 years’ experience working in the Health, Financial and [...] 12:05 ROUNDTABLE DISCUSSION – CIO TRACK – INNOVATE FROM ANYWHERE: SUCCEEDING IN THE NEXT NORMAL ROUNDTABLE DISCUSSION – CIO TRACK – INNOVATE FROM ANYWHERE: SUCCEEDING IN THE NEXT NORMAL CLYDE FERNANDEZ, RVP, PLATFORM, SALESFORCE BYRON COLLINS, EXECUTIVE DIRECTOR BUSINESS SERVICES & CHIEF TECHNOLOGY OFFICER, UNIVERSITY OF MELBOURNE If the past year has taught us anything, it's that digital transformation is an urgent priority for Australian businesses. But as we accelerate the shift from information to innovation, we need to be acutely aware of changes in our customer and employee expectations. Join us for an interactive discussion with some Trailblazers who will provide insights on some of the key contributors to your success, including: * Enabling work from anywhere * Why culture matters now more than ever, and * Growing your innovation talent pool 40min CLYDE FERNANDEZ Clyde is a career technologist who has spent time working in many sectors in Australia, Asia & the UK. He now works for Salesforce, leading a [...] BYRON COLLINS Provides a full range of class leading information technology and facilities management services to all operating entities of the University, and [...] 12:05 ROUNDTABLE DISCUSSION – CISO TRACK – APP, DATA AND EDGE SECURITY – WORKING IN UNISON ROUNDTABLE DISCUSSION – CISO TRACK – APP, DATA AND EDGE SECURITY – WORKING IN UNISON REINHART HANSEN, DIRECTOR OF TECHNOLOGY, OFFICE OF THE CTO, IMPERVA Almost every organisation is juggling a skilfully stacked mix of security vendors and solutions. Add a threat you didn’t know existed; mix in some new cloud apps; cover all of that with the new Privacy Act and data regulations. In this roundtable, we’ll discuss: * How you can avoid complexity in your security stack * Strategies for taking the high-ground from hackers and cybercriminals * Integrating app, data and edge security for the best defence * Responding to evolving legislative and industry regulations 40min REINHART HANSEN Experienced Cyber Security & IT professional with a demonstrated history of working in technology advisory, architecture, solution design and [...] 12:05 ROUNDTABLE DISCUSSION – CISO TRACK – EMERGING APPSEC TRENDS IN 2022 AND BEYOND ROUNDTABLE DISCUSSION – CISO TRACK – EMERGING APPSEC TRENDS IN 2022 AND BEYOND RANDEEP CHHABRA, GENERAL MANAGER, APPSCAN, ASIA PACIFIC & JAPAN, HCL SOFTWARE Today Enterprise Applications are one of the most valuable IT asset for organizations, as these applications run critical business processes, conduct transactions and deliver offerings. These applications are being built at the speed of DevOps to address aggressive Time to Market and Agility requirements. Prioritizing speed without security in app development can lead to an uptick in critical vulnerabilities with disastrous results. To avoid this, organizations must address security earlier in the software development life cycle. While the security technologies across networking and operations are more commonly implemented to high standards, we see unique challenges and trends faced by clients in implementing effective application security programs. Join the HCL Software roundtable session for a robust discussion on the following: * How are CISOs improving processes to integrate security into DevOps, and what challenges do they face? * What are the practices, techniques and strategies that can be used to achieve better application security? * What are the key trends for 2022 and beyond? 40min RANDEEP CHHABRA Randeep Chhabra leads the HCL AppScan business across Asia Pacific and Japan at HCL Software. Randeep has been actively working for more than a [...] 12:05 ROUNDTABLE DISCUSSION – CIO TRACK – DRIVING YOUR COMPETITIVE ADVANTAGE WITH CLOUD-FIRST IDENTITY AND ACCESS MANAGEMENT ROUNDTABLE DISCUSSION – CIO TRACK – DRIVING YOUR COMPETITIVE ADVANTAGE WITH CLOUD-FIRST IDENTITY AND ACCESS MANAGEMENT DRAGAN VLADICIC, SENIOR MANAGER, SOLUTIONS ENGINEER, ASIA PACIFIC, OKTA These days, many organizations are operating their IT environment in a hybrid state. While the cloud has allowed organizations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future. And while the efficiencies of a cloud-first approach are well established, organizations and their employees find it difficult to move back-and-forth between their SaaS apps on one side of the hybrid state, and those legacy applications that need to remain within the on-premises data center. Identity technologies help ease the pain of moving between these two worlds, and organizations relying on legacy solutions can create friction within their business, with disjointed architectures that create duplicate capabilities. This inconsistent and slow integration experience can create issues for employees who rely on SaaS for their daily work but might need to access on-premises apps for critical projects. How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organizations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)? What are the best ways for organizations to leverage newer technologies to help scale their infrastructure to meet customer needs? 40min DRAGAN VLADICIC Bio coming [...] 12:45 NETWORKING LUNCH NETWORKING LUNCH 40min 13:30 WORKSHOP 3 – CIO TRACK – DIGITAL CHALLENGES AND OPPORTUNITIES OF A GLOBAL HEALTH CRISIS WORKSHOP 3 – CIO TRACK – DIGITAL CHALLENGES AND OPPORTUNITIES OF A GLOBAL HEALTH CRISIS DR. MALCOLM THATCHER, CHIEF TECHNOLOGY OFFICER, AUSTRALIAN DIGITAL HEALTH AGENCY The COVID-19 pandemic has disrupted typical work streams and services across all sectors around the world. It is imperative to redefine priorities, reallocating resources, and identifying new opportunities to have impact to create space for rapid innovation and scale-up of existing digital tools. 30min DR. MALCOLM THATCHER Dr Malcolm Thatcher is the Chief Technology Officer at the Australian Digital Health Agency, a role he commenced in February 2021. Dr Thatcher [...] 13:30 WORKSHOP 3 – CISO TRACK WORKSHOP 3 – CISO TRACK SPEAKER & SYNOPSIS COMING SOON 30min 14:05 WORKSHOP 4 – CIO TRACK WORKSHOP 4 – CIO TRACK SPEAKER & SYNOPSIS COMING SOON 30min 14:05 WORKSHOP 4 – CISO TRACK WORKSHOP 4 – CISO TRACK VINAY MANIKKAM, PRINCIPAL, ENTERPRISE SECURITY ARCHITECT, IAG Synopsis coming soon 30min VINAY MANIKKAM Bio to be [...] 14:40 WORKSHOP 5 – CISO TRACK – PRIORITISING INTEGRATION OF GOVERNANCE, RISK AND COMPLIANCE IN CYBERSECURITY IN THE NEW NORMAL WORKSHOP 5 – CISO TRACK – PRIORITISING INTEGRATION OF GOVERNANCE, RISK AND COMPLIANCE IN CYBERSECURITY IN THE NEW NORMAL VIJAY NARAYAN, CHIEF INFORMATION SECURITY OFFICER, ENVIRONMENT PROTECTION AUTHORITY * Re-emphasized the importance of data protection through a multitude of mandates * Implementation of security controls on cloud components * Providing leadership with timely, comprehensive risk and compliance-related reporting 30min VIJAY NARAYAN Vijay is currently the Chief Information Security Officer at Environment Protection Authority. He is a subject matter expert in Information [...] 14:40 WORKSHOP 5 – CIO TRACK – ADDRESSING DIVERSITY AND DIGITAL SKILLS DEFICIENCY IN A RAPIDLY CHANGING FUTURE WORKSHOP 5 – CIO TRACK – ADDRESSING DIVERSITY AND DIGITAL SKILLS DEFICIENCY IN A RAPIDLY CHANGING FUTURE JENNIFER REBEIRO, CHIEF INFORMATION OFFICER, CITY WEST WATER * The importance of reskilling and upskilling as new roles emerge and skills requirements change. * Leverage the experts you already have on staff and creating an extensive career path. * Adopting more inclusive hiring practices outside of traditional talent pools. 30min JENNIFER REBEIRO Jennifer is the Chief Information Officer at City West Water. She has led teams across a wide range of industries and functions, challenging and [...] 15:15 ROUNDTABLE DISCUSSION – CIO TRACK- SPEAKER AND SYNOPSIS COMING SOON ROUNDTABLE DISCUSSION – CIO TRACK- SPEAKER AND SYNOPSIS COMING SOON 30min 15:15 ROUNDTABLE DISCUSSION – CISO TRACK – DELIVERING AN AGILE SECURITY OPERATIONS CENTRE ROUNDTABLE DISCUSSION – CISO TRACK – DELIVERING AN AGILE SECURITY OPERATIONS CENTRE LUKE STELLER, HEAD, GLOBAL CYBER SECURITY OPERATIONS & THREAT INTELLIGENCE, ANZ In this workshop, Luke will cover: * Automating security operations to keep up with growing threats across continuous controls testing; * SIEM alerting and risk scoring, incident case management, incident response, actionable threat intelligence, security devops, autonomous workforce and cloud; * Aligning security to organisational strategy and mapping to key threat frameworks. 30min LUKE STELLER Luke heads the Security Operations Centre and Threat Intelligence in one of the largest financial institutions in Australia which operates in [...] 15:15 ROUNDTABLE DISCUSSION – CIO TRACK- SPEAKER AND SYNOPSIS COMING SOON ROUNDTABLE DISCUSSION – CIO TRACK- SPEAKER AND SYNOPSIS COMING SOON 30min 15:15 ROUNDTABLE DISCUSSION – CISO TRACK- SPEAKER AND SYNOPSIS COMING SOON ROUNDTABLE DISCUSSION – CISO TRACK- SPEAKER AND SYNOPSIS COMING SOON 30min 15:50 CLOSING KEYNOTE PRESENTATION – TIME FOR A NATIONAL RANSOMWARE STRATEGY CLOSING KEYNOTE PRESENTATION – TIME FOR A NATIONAL RANSOMWARE STRATEGY TIM WATTS MP, SHADOW ASSISTANT MINISTER FOR COMMUNICATIONS AND CYBER SECURITY, FEDERAL MEMBER FOR GELLIBRAND, PARLIAMENT OF AUSTRALIA Ransomware is the highest threat facing Australian businesses and government in the cyber domain. The federal government must play a leading role in making enterprises a less attractive target for these ransomware groups by creating potential policies, including increased law enforcement, targeted international sanctions, offensive cyber actions and regulating the payment of ransoms. 30min TIM WATTS MP Tim has been the Federal Member for Gellibrand in Melbourne’s west since 2013. Since being elected, Tim has been an active advocate on issues [...] 16:25 NETWORKING DRINKS NETWORKING DRINKS 40min 08:00 ARRIVAL & REGISTRATION ARRIVAL & REGISTRATION 40min 08:40 WELCOME & INTRODUCTION WELCOME & INTRODUCTION TYRON MCGURGAN, CEO, FOCUS NETWORK 5min 08:45 MASTER OF CEREMONIES, CIO TRACK MASTER OF CEREMONIES, CIO TRACK 5min 08:50 OPENING KEYNOTE PRESENTATION – HARNESSING DIGITAL TRANSFORMATION AND EMERGING TECHNOLOGIES IN THE POST COVID-19 ERA OPENING KEYNOTE PRESENTATION – HARNESSING DIGITAL TRANSFORMATION AND EMERGING TECHNOLOGIES IN THE POST COVID-19 ERA CHRIS BEZUIDENHOUT, MANAGING DIRECTOR, CIB CIO APAC & EMERGING MARKETS, DEUTSCHE BANK AG * Evaluating the strengths and weaknesses of digital performance during the pandemic. * Combining digital, technology, mindset and culture to create a smooth digital experience. * Embedding or reassessing security and regulatory compliance in the cloud. 30min CHRIS BEZUIDENHOUT Chris is an experienced CIO with a wealth of expertise in technology management, risk, finance and large-scale transformation for employers, [...] 09:20 KEYNOTE PRESENTATION – SAFEGUARDING YOUR ORGANISATION AGAINST RANSOMWARE ATTACKS WITH A DEFENCE-IN-DEPTH APPROACH KEYNOTE PRESENTATION – SAFEGUARDING YOUR ORGANISATION AGAINST RANSOMWARE ATTACKS WITH A DEFENCE-IN-DEPTH APPROACH * Preventing an attack before it occurs with easy implementation of security best practices. * Keeping an eye out for unusual or anomalous behaviour and taking the right steps to warn. * Executing a business continuity and disaster recovery plan for continued business operations. 30min 09:55 ROUNDTABLE DISCUSSION – CIO TRACK – CREATING AN AGILE, RESILIENT AND SUSTAINABLE ORGANISATION THROUGH DIGITALISATION ROUNDTABLE DISCUSSION – CIO TRACK – CREATING AN AGILE, RESILIENT AND SUSTAINABLE ORGANISATION THROUGH DIGITALISATION CHRISTOPHER JOHNSON, HEAD OF GROUP TECHNOLOGY, CHARTER HALL * Drawing up a digital-first operation model and technology-led capabilities strategy. * Setting up a digital knowledge hub to showcase the impact of digital in transforming business. * Leveraging on new age technologies and collaborative ways of working to accelerate innovations. 40min CHRISTOPHER JOHNSON Christopher Johnson has been working in the IT industry for more than 25 years, across marketing, telecommunications, publishing, professional [...] 09:55 ROUNDTABLE DISCUSSION – CIO TRACK – CIO AS AN AGENT OF CHANGE: SPEARHEADING A DIGITAL CULTURE AT EVERY LEVEL OF THE BUSINESS ROUNDTABLE DISCUSSION – CIO TRACK – CIO AS AN AGENT OF CHANGE: SPEARHEADING A DIGITAL CULTURE AT EVERY LEVEL OF THE BUSINESS BEN WATERHOUSE, CHIEF INFORMATION OFFICER, COATES HIRE * Reaching out to all frontline employees in the mission areas directly and continuously. * Conducting robust trainings and e-learnings on the different technologies and practices. * Improving leadership and management skills for effective top and down communication. 40min BEN WATERHOUSE I specialise in embedding a digital transformation culture and setting up technology teams to excel in delivering continuous business value [...] 09:55 ROUNDTABLE DISCUSSION – CISO TRACK – BEST PRACTICES OF MIGRATING TO THE CLOUD SECURELY AND SEAMLESSLY ROUNDTABLE DISCUSSION – CISO TRACK – BEST PRACTICES OF MIGRATING TO THE CLOUD SECURELY AND SEAMLESSLY * Exploring the pre-migration, migration, post-migration and mass migration stages. * Following the right principles to uphold security and compliance requirements. * Clearing up the roadblocks and dealing with the hurdles faced during cloud migration. 40min 09:55 ROUNDTABLE DISCUSSION – CISO TRACK – GETTING THE BOARD’S BUY-IN ON CYBER SECURITY INITIATIVES WITH PROVEN TACTICS ROUNDTABLE DISCUSSION – CISO TRACK – GETTING THE BOARD’S BUY-IN ON CYBER SECURITY INITIATIVES WITH PROVEN TACTICS * Learning to speak in business terms to improve budgetary and investment win rate. * Quantifying enterprise cyber-risk with business objectives for an informed decision. * Demonstrating a tactical cyber security strategy to help the board understand the ROI. 40min 10:35 NETWORKING BREAK NETWORKING BREAK 15min 10:55 WORKSHOP 1 – CIO TRACK – DIGITISING WORKFLOW AND BUSINESS PROCESSES WITH ROBOTIC PROCESS AUTOMATION WORKSHOP 1 – CIO TRACK – DIGITISING WORKFLOW AND BUSINESS PROCESSES WITH ROBOTIC PROCESS AUTOMATION 30min 10:55 WORKSHOP 1 – CISO TRACK – SECURING CLOUD INFRASTRUCTURE WITH CLOUD SECURITY POSTURE MANAGEMENT WORKSHOP 1 – CISO TRACK – SECURING CLOUD INFRASTRUCTURE WITH CLOUD SECURITY POSTURE MANAGEMENT 30min 11:30 WORKSHOP 2 – CIO TRACK – BUILDING AND MAINTAINING A DATA-DRIVEN ORGANISATION TO REMAIN COMPETITIVE WORKSHOP 2 – CIO TRACK – BUILDING AND MAINTAINING A DATA-DRIVEN ORGANISATION TO REMAIN COMPETITIVE * Incorporating data and analytics into the business strategy, systems and processes. * Detecting business and technical obstacles in preventing the organisation from being data-driven. * Implementing critical steps and pragmatic recommendations to resolve these barriers. 30min 11:30 WORKSHOP 2 – CISO TRACK – THE ANYWHERE WORKFORCE: SECURING THE HYBRID WORKFORCE IN THE NEW NORMAL WORKSHOP 2 – CISO TRACK – THE ANYWHERE WORKFORCE: SECURING THE HYBRID WORKFORCE IN THE NEW NORMAL RASSOUL GHAZNAVI ZADEH, DIRECTOR OF INFORMATION SECURITY, RESMED * Examining identity protection tools existing internally and using it to protect from attacks. * Adopting Zero Trust methodologies to prevent, detect and respond to cyber security incidents. * Taking advantage of more robust security in the cloud and having a strong cloud posture. 30min RASSOUL GHAZNAVI ZADEH Rassoul is an Information Security expert, leader, author of a few cyber security books, online and university instructor, and active member of [...] 12:05 ROUNDTABLE DISCUSSION – CIO TRACK – HYBRID CLOUD VS. MULTI-CLOUD: CHOOSING THE BEST FIT FOR YOUR ORGANISATION ROUNDTABLE DISCUSSION – CIO TRACK – HYBRID CLOUD VS. MULTI-CLOUD: CHOOSING THE BEST FIT FOR YOUR ORGANISATION 40min 12:05 ROUNDTABLE DISCUSSION – CISO TRACK – PROTECTING AND SECURING THE ENDPOINTS FROM EVOLVING CYBER SECURITY THREATS ROUNDTABLE DISCUSSION – CISO TRACK – PROTECTING AND SECURING THE ENDPOINTS FROM EVOLVING CYBER SECURITY THREATS 40min 12:05 ROUNDTABLE DISCUSSION – CIO TRACK – TURNING TO EDGE COMPUTING TO TRANSFORM DATA AND ENHANCE CLOUD INFRASTRUCTURE ROUNDTABLE DISCUSSION – CIO TRACK – TURNING TO EDGE COMPUTING TO TRANSFORM DATA AND ENHANCE CLOUD INFRASTRUCTURE 40min 12:05 ROUNDTABLE DISCUSSION – CISO TRACK – ENCRYPTION AND KEY MANAGEMENT: WHY IS IT NECESSARY AND HOW TO DEPLOY ROUNDTABLE DISCUSSION – CISO TRACK – ENCRYPTION AND KEY MANAGEMENT: WHY IS IT NECESSARY AND HOW TO DEPLOY 40min 12:45 NETWORKING LUNCH NETWORKING LUNCH 40min 13:30 WORKSHOP 3 – CIO TRACK – THE EVERYWHERE WORKPLACE: PLANNING AND PREPARING FOR A HYBRID WORKPLACE WORKSHOP 3 – CIO TRACK – THE EVERYWHERE WORKPLACE: PLANNING AND PREPARING FOR A HYBRID WORKPLACE DR. ASHISH BHARADWAJ, CIO, TORRENS GLOBAL EDUCATION SERVICES Rethinking communication, training and development, knowledge exchange and psychological needs. * Reimagining the office space while knowing the specific requirements needed for the home workplace. * Reinforcing integrity, security, privacy and liabilities policies while putting in place a contingency plan. 30min DR. ASHISH BHARADWAJ Dr. Ashish Bharadwaj is an executive, technologist and educator with over 20 years of rich experience in delivering impactful technology and [...] 13:30 WORKSHOP 3 – CISO TRACK WORKSHOP 3 – CISO TRACK SPEAKER & SYNOPSIS COMING SOON 30min ANDREW WAN Andrew is an innovative industry veteran in security and has worked across government, critical infrastructure, telecommunications, health, [...] 14:05 WORKSHOP 4 – CIO TRACK – THE NEW MANAGEMENT APPROACH: FOCUSING ON PRODUCTIVITY MEASURES VS. TIME MEASURES WORKSHOP 4 – CIO TRACK – THE NEW MANAGEMENT APPROACH: FOCUSING ON PRODUCTIVITY MEASURES VS. TIME MEASURES * Understanding the importance of measuring productivity instead of time in the new normal. * Addressing the biggest productivity challenges in the modern workplace and ways of overcoming. * Discussing strategies that emphasises on results while ensuring employees wellbeing. 30min 14:05 WORKSHOP 4 – CISO TRACK – MAKING DATA PRIVACY A STRATEGIC PRIORITY TO STAY ON TOP OF DATA BREACH AND RISKS WORKSHOP 4 – CISO TRACK – MAKING DATA PRIVACY A STRATEGIC PRIORITY TO STAY ON TOP OF DATA BREACH AND RISKS SPEAKER TBC * Analysing data privacy risks to know every vulnerability, threat source and joint impact. * Developing a comprehensive data privacy, security and IT compliance program. * Overcoming the 3 most common challenges faced when implementing a privacy program. 30min 14:40 WORKSHOP 5 – CIO TRACK – PROVIDING A SAFE, SECURE AND SUSTAINABLE CUSTOMER EXPERIENCE WITH A STRATEGIC ROADMAP WORKSHOP 5 – CIO TRACK – PROVIDING A SAFE, SECURE AND SUSTAINABLE CUSTOMER EXPERIENCE WITH A STRATEGIC ROADMAP * Innovating the customer journey across departments to attract, serve and retains customers. * Designing the right data plan to harvest, leverage and secure customer data across CX platform. * Deploying cutting-edge methods and embracing innovations to measure and enhance CX. 30min 14:40 WORKSHOP 5 – CISO TRACK – PREPARING FOR NEW CRITICAL INFRASTRUCTURE REGULATIONS: WHAT CAN BE DONE TODAY? WORKSHOP 5 – CISO TRACK – PREPARING FOR NEW CRITICAL INFRASTRUCTURE REGULATIONS: WHAT CAN BE DONE TODAY? * Gaining visibility on the available assets, how they communicate with each other and over what protocols. * Mitigating known vulnerabilities and defending defenceless asserts with pervasive controls. * Finding efficiencies to manage additional responsibility and report incidents at a faster pace. 30min 15:15 WORKSHOP 6 – CIO TRACK – USING CORE COMPETENCIES TO IMPROVE OPERATIONAL EFFECTIVENESS AND EFFICIENCY WORKSHOP 6 – CIO TRACK – USING CORE COMPETENCIES TO IMPROVE OPERATIONAL EFFECTIVENESS AND EFFICIENCY * Refining processes by automating organisational processes, workflows and systems. * Supporting employees with time management, resource management and setting KPIs. * Carrying out a fundamental financial analysis and internal IT auditing to assess performance. 30min 15:15 WORKSHOP 6 – CISO TRACK – DEVELOPING AND SUSTAINING A STRONG CYBERSMART CULTURE ACROSS THE ORGANISATION WORKSHOP 6 – CISO TRACK – DEVELOPING AND SUSTAINING A STRONG CYBERSMART CULTURE ACROSS THE ORGANISATION * Changing organisational way of thinking by making everyone part of the security team. * Raising awareness of digital dangers, the personal impact and ways to protect themselves online. * Involving leaders in the organisation to set the tone for how employees should approach it. 30min 15:50 CLOSING KEYNOTE PRESENTATION – HEADING TOWARDS THE FUTURE OF A SECURE DIGITAL ECONOMY IN AUSTRALIA CLOSING KEYNOTE PRESENTATION – HEADING TOWARDS THE FUTURE OF A SECURE DIGITAL ECONOMY IN AUSTRALIA * Accelerating digital capabilities to speed up and secure economic recovery from Covid-19 crisis. * Identifying skills and capabilities needed to further harness the benefits of digital technology. * Getting ready for emerging technologies and new business models in IT and IT security. 30min 16:20 NETWORKING DRINKS NETWORKING DRINKS 60min WHY ATTEND STAR KEYNOTES AND PRESENTERS We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program. NETWORKING OPPORTUNITIES Keeping in line with the main goal of the event in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails and informal introductions. 1-1 PRIVATE MEETINGS Allowing both buyers and sellers the opportunity to engage with one another onsite in a series of prearranged business meetings. These provide both parties a great opportunity to build new relationships by interacting face to face. TARGETED SESSIONS Being able to experience different sessions is what makes this event unique; whether you are looking to attend an interactive workshop, roundtable, 1-1 meeting or panel discussion. NETWORKING LUNCH Interact and relax amongst your peers at the Networking lunch where you will have the opportunity to be part of the entertainment. PERSONALISED PROGRAM The summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office. DOWNLOAD THE POST EVENT REPORT FROM OUR PREVIOUS EVENT CLICK HERE Please enter your details in the form below to get the download link: Which is bigger, 2 or 8? GET YOUR VIP TICKET CLICK HERE MEET LEADING IT EXECUTIVES FROM AUSTRALIA’S STRONGEST BRANDS. Interact and engage with some of the strongest and most powerful brands from across Australia. “FIRST OF ALL, CAN I JUST SAY THIS WAS ONE OF THE BEST CONFERENCES I HAVE BEEN TO IN THE LAST 5 YEARS. THE CALIBER OF DELEGATES (AND NETWORKING OPPORTUNITIES), SUPPLIERS AND SPEAKERS WAS EXCEPTIONAL. YOUR TEAM – WERE SO HELPFUL BEFORE AND DURING THE EVENT. WELL DONE, I'D BE VERY HAPPY TO BE INVITED BACK!” – 20TH CENTURY FOX 'FANTASTIC EVENT! CONGRATULATIONS TO YOU AND THE TEAM. HANDS DOWN THE BEST EVENT I HAVE ATTENDED AS A SPONSOR SINCE I'VE BEEN AT GENESYS. YOU AND YOUR TEAM WERE EXTREMELY PROFESSIONAL AND HELPFUL IN THE LEAD UP TO THE EVENT AND I VERY MUCH APPRECIATE YOUR PATIENCE IN DEALING WITH THE MANY HURDLES ALONG THE WAY. I CAN'T TELL YOU HOW REFRESHING THAT IS AFTER THE DEALINGS WE'VE HAD WITH SEVERAL OTHER EVENT/CONFERENCE PROVIDERS ACROSS APAC.' – GENESYS “JUST WANTED TO THANK YOU AND THE TEAM FOR MAKING US FEEL SO WELCOME AND LOOKING AFTER THE TEAM DURING THE CONFERENCE. IT WAS DEFINITELY ONE OF THE BEST ONES WE’VE BEEN TO, SO WELL DONE. WHEN IS YOUR NEXT EVENT? WOULD LOVE TO KEEP THE BALL ROLLING ON THIS.” – SHOOTSTA “I ALWAYS ENJOY THE OPPORTUNITY THIS SUMMIT AFFORDS FOR NETWORKING AND A GENERAL CHECK IN ON WHAT EVERYONE IS DOING.” TRAVERS STOW – SIGMA HEALTHCARE DIAMOND SPONSOR * WordPress Carousel Free Version HCL Software is a division of HCL Technologies (HCL) that operates its primary software business. It develops, markets, sells, and supports over 20 product families in the areas of DevSecOps, Automation, Digital Solutions, Data Management, Marketing and Commerce, and Mainframes. HCL Software has offices and labs around the world to serve thousands of customers. Its mission is to drive ultimate customer success with their IT investments through relentless innovation of its products. https://www.hcltechsw.com/ WordPress Carousel Plugin PLATINUM SPONSOR * WordPress Carousel Free Version We bring companies and customers together on the #1 CRM. Sharing the news, events, and innovation you need to change the world for good. www.salesforce.com WordPress Carousel Plugin GOLD SPONSORS * WordPress Carousel Free Version Try LastPass, the best password manager, password generator, and vault for free today! LastPass makes and remembers your passwords, so you don't have to! www.lastpass.com * As a cybersecurity leader championing the fight to secure data and all paths to it, Imperva offers a full defence-in-depth portfolio of application and data security solutions. Imperva Application Security, built on a single stack architecture and deployed across a global network, protects websites, business-critical APIs, legacy systems and applications based on open source, and more – without affecting performance. Imperva Database Security solutions, including Imperva Database Security and Cloud Data Security, provide the most-targeted protection of your most valuable asset — your data — wherever you choose to host it. And with Imperva, you get complete visibility and defence against any enterprise-wide attack campaign that comes your way. www.imperva.com * WordPress Carousel Free Version Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 5,600 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to securely connect their people and technology. www.okta.com * BUILT FOR THE MOST AMBITIOUS BUSINESSES Looking for a product to deliver easy, reliable yet powerful virtual meetings? How about an affordable yet feature-rich VoIP phone solution to connect your growing business? Or maybe a single, unified solution together with state-of-the-art room systems? The GoTo Collaboration Cloud - featuring solutions for online meetings, voice, rooms, webinars and training - brings together the easiest, fastest, and most innovative unified communications and collaboration products. www.goto.com * WordPress Carousel Free Version Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible--providing easy access to information anywhere, at any time. Since the company's inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. www.cisco.com * Try LastPass, the best password manager, password generator, and vault for free today! LastPass makes and remembers your passwords, so you don't have to! www.lastpass.com * WordPress Carousel Free Version As a cybersecurity leader championing the fight to secure data and all paths to it, Imperva offers a full defence-in-depth portfolio of application and data security solutions. Imperva Application Security, built on a single stack architecture and deployed across a global network, protects websites, business-critical APIs, legacy systems and applications based on open source, and more – without affecting performance. Imperva Database Security solutions, including Imperva Database Security and Cloud Data Security, provide the most-targeted protection of your most valuable asset — your data — wherever you choose to host it. And with Imperva, you get complete visibility and defence against any enterprise-wide attack campaign that comes your way. www.imperva.com * Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 5,600 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to securely connect their people and technology. www.okta.com * WordPress Carousel Free Version BUILT FOR THE MOST AMBITIOUS BUSINESSES Looking for a product to deliver easy, reliable yet powerful virtual meetings? How about an affordable yet feature-rich VoIP phone solution to connect your growing business? Or maybe a single, unified solution together with state-of-the-art room systems? The GoTo Collaboration Cloud - featuring solutions for online meetings, voice, rooms, webinars and training - brings together the easiest, fastest, and most innovative unified communications and collaboration products. www.goto.com * Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible--providing easy access to information anywhere, at any time. Since the company's inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. www.cisco.com WordPress Carousel Plugin SILVER SPONSORS * WordPress Carousel Free Version Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, accessing e-government services or logging into corporate networks. Entrust offers an unmatched breadth of digital security and credential issuance solutions at the very heart of all these interactions. With more than 2,500 colleagues, a network of global partners, and customers in over 150 countries, it’s no wonder the world’s most entrusted organizations trust us. www.entrust.com * From the CISO to the analyst, Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools – including SIEMs, XDRs, cloud data lakes and hundreds of other business and security products. Out-of-the-box use case coverage delivers repeatable outcomes. Behavioral analytics allows security teams to detect compromised and malicious users that were previously difficult, or impossible, to find. And alert enhancement and automated timeline creation help overcome staff shortages by minimizing false positives and reducing the time it takes analysts to detect, triage, investigate and respond to incidents by 51 percent. www.exabeam.com * WordPress Carousel Free Version Since creating the first laptop case more than 30 years ago, Targus has continued to advance the mobile accessories category with cutting-edge, quality-made, productivity-boosting solutions. Compatible with major OEM brands, our carrying cases, universal docking stations, privacy screens, and peripherals enable an ever-changing workforce to perform at their best anytime, anywhere. Discover why organizations are choosing Targus, proven market leader and trusted partner of SMBs and Fortune 1000 businesses worldwide. www.targus.com * Thycotic prevents cyberattacks by securing passwords, protecting endpoints, and controlling application access. Thycotic is one of the world’s fastest-growing IT security companies because we provide customers with the freedom to choose cloud or on-premise software solutions that are the easiest to implement and use in the industry. Thycotic has grown to serve more than 12,500 customers. www.thycotic.com * WordPress Carousel Free Version Relentless protection. Resilient world. Mimecast (NASDAQ: MIME) was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our tens of thousands of customers around the globe; always putting them first, and never giving up on tackling their biggest security challenges together. We are the company that built an intentional and scalable design ideology that solves the number one cyberattack vector – email. We continuously invest to thoughtfully integrate brand protection, security awareness training, web security, compliance and other essential capabilities. Mimecast is here to help protect large and small organizations from malicious activity, human error and technology failure; and to lead the movement toward building a more resilient world. Learn more about us at www.mimecast.com. www.mimecast.com * Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, accessing e-government services or logging into corporate networks. Entrust offers an unmatched breadth of digital security and credential issuance solutions at the very heart of all these interactions. With more than 2,500 colleagues, a network of global partners, and customers in over 150 countries, it’s no wonder the world’s most entrusted organizations trust us. www.entrust.com * WordPress Carousel Free Version From the CISO to the analyst, Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools – including SIEMs, XDRs, cloud data lakes and hundreds of other business and security products. Out-of-the-box use case coverage delivers repeatable outcomes. Behavioral analytics allows security teams to detect compromised and malicious users that were previously difficult, or impossible, to find. And alert enhancement and automated timeline creation help overcome staff shortages by minimizing false positives and reducing the time it takes analysts to detect, triage, investigate and respond to incidents by 51 percent. www.exabeam.com * Since creating the first laptop case more than 30 years ago, Targus has continued to advance the mobile accessories category with cutting-edge, quality-made, productivity-boosting solutions. Compatible with major OEM brands, our carrying cases, universal docking stations, privacy screens, and peripherals enable an ever-changing workforce to perform at their best anytime, anywhere. Discover why organizations are choosing Targus, proven market leader and trusted partner of SMBs and Fortune 1000 businesses worldwide. www.targus.com * WordPress Carousel Free Version Thycotic prevents cyberattacks by securing passwords, protecting endpoints, and controlling application access. Thycotic is one of the world’s fastest-growing IT security companies because we provide customers with the freedom to choose cloud or on-premise software solutions that are the easiest to implement and use in the industry. Thycotic has grown to serve more than 12,500 customers. www.thycotic.com * Relentless protection. Resilient world. Mimecast (NASDAQ: MIME) was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our tens of thousands of customers around the globe; always putting them first, and never giving up on tackling their biggest security challenges together. We are the company that built an intentional and scalable design ideology that solves the number one cyberattack vector – email. We continuously invest to thoughtfully integrate brand protection, security awareness training, web security, compliance and other essential capabilities. Mimecast is here to help protect large and small organizations from malicious activity, human error and technology failure; and to lead the movement toward building a more resilient world. Learn more about us at www.mimecast.com. www.mimecast.com WordPress Carousel Plugin * WordPress Carousel Free Version Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems. This includes insider threat, industrial espionage, IoT compromises, zero-day malware, data loss, supply chain risk and long-term infrastructure vulnerabilities. The company has over 1,000 employees, 44 global offices and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage. www.darktrace.com * Axway gives heritage IT infrastructure new life, helping more than 11,000 customers worldwide build on what they already have to digitally transform, add new business capabilities, and drive growth. With our Amplify API Management Platform —the only open, independent platform for managing and governing APIs across teams, the hybrid cloud, and third-party solutions — we help companies move forward faster, reach new markets, and create brilliant digital experiences. Our MFT and B2B integration solutions have been trusted for 20 years. Axway (Euronext: AXW.PA) employs over 1,800 people in 18 countries. www.axway.com * WordPress Carousel Free Version We focus on helping our clients understand the security vulnerabilities of their networks, applications, premises and people. www.hacktive.io * MetricStream, the independent market leader in enterprise and cloud applications for Governance, Risk, Compliance (GRC) and Quality Management, makes GRC simple. MetricStream apps improve business performance by strengthening risk management, corporate governance, regulatory compliance, vendor governance, and quality management for hundreds of thousands of users in dozens of industries, including Financial Services, Healthcare, Life Sciences, Energy and Utilities, Food, Retail, CPG, Government, Hi-Tech and Manufacturing. MetricStream is headquartered in Palo Alto, California, with an operations and R&D center in Bangalore, India, and sales and operations support in 12 other cities globally. www.metricstream.com * WordPress Carousel Free Version Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with over 300 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately. Covering millions of devices at customers like the New York Times, Schneider Electric, Landmark Health, AppsFlyer, and many more, Axonius was named the Most Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was named to the CNBC Upstart 100 list and Forbes 20 Rising Stars. www.axonius.com * Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems. This includes insider threat, industrial espionage, IoT compromises, zero-day malware, data loss, supply chain risk and long-term infrastructure vulnerabilities. The company has over 1,000 employees, 44 global offices and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage. www.darktrace.com * WordPress Carousel Free Version Axway gives heritage IT infrastructure new life, helping more than 11,000 customers worldwide build on what they already have to digitally transform, add new business capabilities, and drive growth. With our Amplify API Management Platform —the only open, independent platform for managing and governing APIs across teams, the hybrid cloud, and third-party solutions — we help companies move forward faster, reach new markets, and create brilliant digital experiences. Our MFT and B2B integration solutions have been trusted for 20 years. Axway (Euronext: AXW.PA) employs over 1,800 people in 18 countries. www.axway.com * We focus on helping our clients understand the security vulnerabilities of their networks, applications, premises and people. www.hacktive.io * WordPress Carousel Free Version MetricStream, the independent market leader in enterprise and cloud applications for Governance, Risk, Compliance (GRC) and Quality Management, makes GRC simple. MetricStream apps improve business performance by strengthening risk management, corporate governance, regulatory compliance, vendor governance, and quality management for hundreds of thousands of users in dozens of industries, including Financial Services, Healthcare, Life Sciences, Energy and Utilities, Food, Retail, CPG, Government, Hi-Tech and Manufacturing. MetricStream is headquartered in Palo Alto, California, with an operations and R&D center in Bangalore, India, and sales and operations support in 12 other cities globally. www.metricstream.com * Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with over 300 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately. Covering millions of devices at customers like the New York Times, Schneider Electric, Landmark Health, AppsFlyer, and many more, Axonius was named the Most Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was named to the CNBC Upstart 100 list and Forbes 20 Rising Stars. www.axonius.com WordPress Carousel Plugin * WordPress Carousel Free Version BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com. www.beyondtrust.com * The Synopsys difference Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in application security, provides static analysis, software composition analysis, and dynamic analysis solutions that enable teams to quickly find and fix vulnerabilities and defects in proprietary code, open source components, and application behavior. https://www.synopsys.com/ * WordPress Carousel Free Version Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com. www.paloaltonetworks.com * The Accellion kiteworks content firewall prevents data breaches and compliance violations from third party cyber risk. CIOs and CISOs rely on the Accellion platform for complete visibility, security and control over the communication of IP, PII, PHI, and other sensitive content across email, file sharing, mobile, enterprise apps, web portals, SFTP, and automated inter-business workflows. By consolidating security across third party communication channels, the Accellion content firewall simplifies complex infrastructure and reduces costs, while improving the user experience. When employees click the Accellion button, they know it’s the safe, secure way to share sensitive information with the outside world. With on-premise, private cloud, hybrid and FedRAMP deployment options, the Accellion content firewall provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, CCPA, GLBA, and FISMA. Accellion solutions have protected more than 25 million end users at more than 3,000 global corporations and government agencies, including NYC Health + Hospitals; KPMG; Kaiser Permanente; AVL; American Automobile Association (AAA); Tyler Technologies; and the National Institute for Standards and Technology (NIST). www.accellion.com * WordPress Carousel Free Version BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com. www.beyondtrust.com * The Synopsys difference Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in application security, provides static analysis, software composition analysis, and dynamic analysis solutions that enable teams to quickly find and fix vulnerabilities and defects in proprietary code, open source components, and application behavior. https://www.synopsys.com/ * WordPress Carousel Free Version Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com. www.paloaltonetworks.com * The Accellion kiteworks content firewall prevents data breaches and compliance violations from third party cyber risk. CIOs and CISOs rely on the Accellion platform for complete visibility, security and control over the communication of IP, PII, PHI, and other sensitive content across email, file sharing, mobile, enterprise apps, web portals, SFTP, and automated inter-business workflows. By consolidating security across third party communication channels, the Accellion content firewall simplifies complex infrastructure and reduces costs, while improving the user experience. When employees click the Accellion button, they know it’s the safe, secure way to share sensitive information with the outside world. With on-premise, private cloud, hybrid and FedRAMP deployment options, the Accellion content firewall provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, CCPA, GLBA, and FISMA. Accellion solutions have protected more than 25 million end users at more than 3,000 global corporations and government agencies, including NYC Health + Hospitals; KPMG; Kaiser Permanente; AVL; American Automobile Association (AAA); Tyler Technologies; and the National Institute for Standards and Technology (NIST). www.accellion.com WordPress Carousel Plugin BECOME A SPONSOR CLICK HERE OUR PARTNERS * WordPress Carousel Free Version APAC CIOoutlook is a print magazine that aims to provide a platform for CIOs, CTOs and other senior levels IT buyers and decision makers along with CXOs of solution providers to share their experiences, wisdom and advice with enterprise IT community of APAC countries. We promote our unique 'learn from our peers approach' in the Asia Pacific region. From enterprise applications to the leading trends in big data, mobile computing, security and the Cloud, APAC CIOoutlook delivers practical, actionable information from senior practitioners in the trenches. We leverage our extensive peer-to-peer network, among leading technology executives, to bring their experience and the best practices to other members of the CIO community in Asia Pacific countries. We also identify and profile emerging companies providing cutting edge solutions to enterprises in APAC. For every technology and every industry vertical, our research team has access to and has deep background research done on hundreds of vendors providing solutions in APAC. Published from the hub of technology, Silicon Valley, USA. www.apacciooutlook.com * Business Chief, formally known as Business Review Magazines, is a media brand fit for the digital age, providing cutting-edge content tailored for company executives, business pioneers and industry thinkers. Divided into eight separate regional titles, Business Chief tells the stories that matter to business leaders and professionals on their way to the top. Through our expertly-crafted digital magazines, websites, videos and social media, those stories reach the right people. Our flagship features are the Leadership Showcases; exclusive interviews with key decision-makers at some of the biggest companies on the globe, documenting their journeys to business transformation and the lessons they’ve learned along the way. With further themes focused on technology, talent and sustainability, Business Chief has insight on the trends that matter to C and V-level executives, while also delivering consumer-friendly lifestyle content to reflect their interests and wider ambitions. On top of all that and more, Business Chief showcases in-depth digital reports on companies every month, ensuring it covers every angle in the world of business. www.businesschief.com * WordPress Carousel Free Version CISO MAG is the handbook for Chief Information Security Officer (CISO)s, CXOs, and every stakeholder of safe internet. To provide the cybersecurity experts key information and analysis to tackle the security challenges, EC-Council created CISO MAG, an information security magazine for best practices, trends, and news. For all the latest happening in cyber security space, visit our site: www.cisomag.com Follow us on LinkedIn for all the latest news & updates. Preview & Subscribe for our latest issue here www.cisomag.com * Gigabit is a digital information and media platform for executives and leaders, providing expert insight into the ever expanding space occupied by technology in business. Packed with deep features and insight from key leaders in business, Gigabit content can be found online or via our exclusive digital magazine, distributed monthly to a select membership of industry leaders around the world. Technological innovation is now an inescapable facet of business across all industries, and Gigabit serves up a diet of cutting-edge insight via exclusive interviews with CIOs, CTOs and Heads of IT from some of the world’s most influential companies. Gigabit is here to answer and, perhaps more importantly, ask the questions that enterprises need to answer in addressing the challenges and opportunities a dynamic and changing technological landscape represent. www.gigabitmagazine.com * WordPress Carousel Free Version APAC CIOoutlook is a print magazine that aims to provide a platform for CIOs, CTOs and other senior levels IT buyers and decision makers along with CXOs of solution providers to share their experiences, wisdom and advice with enterprise IT community of APAC countries. We promote our unique 'learn from our peers approach' in the Asia Pacific region. From enterprise applications to the leading trends in big data, mobile computing, security and the Cloud, APAC CIOoutlook delivers practical, actionable information from senior practitioners in the trenches. We leverage our extensive peer-to-peer network, among leading technology executives, to bring their experience and the best practices to other members of the CIO community in Asia Pacific countries. We also identify and profile emerging companies providing cutting edge solutions to enterprises in APAC. For every technology and every industry vertical, our research team has access to and has deep background research done on hundreds of vendors providing solutions in APAC. Published from the hub of technology, Silicon Valley, USA. www.apacciooutlook.com * Business Chief, formally known as Business Review Magazines, is a media brand fit for the digital age, providing cutting-edge content tailored for company executives, business pioneers and industry thinkers. Divided into eight separate regional titles, Business Chief tells the stories that matter to business leaders and professionals on their way to the top. Through our expertly-crafted digital magazines, websites, videos and social media, those stories reach the right people. Our flagship features are the Leadership Showcases; exclusive interviews with key decision-makers at some of the biggest companies on the globe, documenting their journeys to business transformation and the lessons they’ve learned along the way. With further themes focused on technology, talent and sustainability, Business Chief has insight on the trends that matter to C and V-level executives, while also delivering consumer-friendly lifestyle content to reflect their interests and wider ambitions. On top of all that and more, Business Chief showcases in-depth digital reports on companies every month, ensuring it covers every angle in the world of business. www.businesschief.com * WordPress Carousel Free Version CISO MAG is the handbook for Chief Information Security Officer (CISO)s, CXOs, and every stakeholder of safe internet. To provide the cybersecurity experts key information and analysis to tackle the security challenges, EC-Council created CISO MAG, an information security magazine for best practices, trends, and news. For all the latest happening in cyber security space, visit our site: www.cisomag.com Follow us on LinkedIn for all the latest news & updates. Preview & Subscribe for our latest issue here www.cisomag.com * Gigabit is a digital information and media platform for executives and leaders, providing expert insight into the ever expanding space occupied by technology in business. Packed with deep features and insight from key leaders in business, Gigabit content can be found online or via our exclusive digital magazine, distributed monthly to a select membership of industry leaders around the world. Technological innovation is now an inescapable facet of business across all industries, and Gigabit serves up a diet of cutting-edge insight via exclusive interviews with CIOs, CTOs and Heads of IT from some of the world’s most influential companies. Gigabit is here to answer and, perhaps more importantly, ask the questions that enterprises need to answer in addressing the challenges and opportunities a dynamic and changing technological landscape represent. www.gigabitmagazine.com WordPress Carousel Plugin * WordPress Carousel Free Version ITUpdate is an online publication of IT vendor releases. Its aim is to bring you the very latest releases directly from the vendor. Currently, it has listed the Top 250 leading Global IT vendors in the market today. ITUpdate is owned by Inform Group Pty Ltd and Australian Pty Ltd company ABN: 63 103 190 781. Inform Group Pty Ltd has been successfully working in the IT industry for nearly 20 years. Our head office is in Sydney, Australia and we have additional offices in Melbourne, Singapore, and Manila. www.itupdate.com.au * CIO Tech Asia is an online news and media platform that allows it's readers to stay up to date with the latest insights and stories that are shaping the technology landscape across Asia. ciotechasia.com * WordPress Carousel Free Version ITUpdate is an online publication of IT vendor releases. Its aim is to bring you the very latest releases directly from the vendor. Currently, it has listed the Top 250 leading Global IT vendors in the market today. ITUpdate is owned by Inform Group Pty Ltd and Australian Pty Ltd company ABN: 63 103 190 781. Inform Group Pty Ltd has been successfully working in the IT industry for nearly 20 years. Our head office is in Sydney, Australia and we have additional offices in Melbourne, Singapore, and Manila. www.itupdate.com.au * CIO Tech Asia is an online news and media platform that allows it's readers to stay up to date with the latest insights and stories that are shaping the technology landscape across Asia. ciotechasia.com WordPress Carousel Plugin VENUE CROWN CONFERENCE CENTRE, MELBOURNE Crown Conference Centre Crown Promenade, Crown Melbourne, 8 Whiteman Street, Southbank VIC 3006, Australia Telephone: +61-3-9292-6222 Contact: Click here More Information Gelände Kurzbefehle KartendatenKartendaten © 2021 Google Nutzungsbedingungen Fehler bei Google Maps melden Kartendaten © 2021 Google GET YOUR VIP TICKET CLICK HERE Connect With Us Quick Links * * Speakers * Why Attend? * Program * Sponsors * Venue * Register * Contact View a full list of all our events Get in touch AUSTRALIA Level 2, 146 Arthur Street, North Sydney, NSW 2060 Australia T: +61 2 8188 8535 SINGAPORE Level 30, Six Battery Road, Singapore 049909 T: +65 6725 6324 USA Suite 2710, 101 California Street, San Francisco CA 94111, USA T: +1 415 633 8846 Copyright 2021 ©Focus Network. All rights reserved REGISTER If you are looking to join the upcoming gathering and would like to receive further information, please fill in your details below and one of our team will be in contact with you shortly. Which location:* Please SelectMelbourneSydneyBoth Interested in* Please SelectDelegateSponsorSpeakerPartner Message* x REGISTER If you wish to become a sponsor for the upcoming event, please complete your details below and one of our team will be in contact with you shortly. Which location: Please SelectMelbourneSydneyBoth x Should you wish to attend this year’s upcoming 8th Australian CISO Leaders Summit on the 1st of March 2022, at the Crown Conference Centre, Melbourne, as one of our free VIP guests, you must complete the following Registration form and submit it back. Once this form has been submitted you will then receive a confirmation email with further details around your participation As a VIP Guest your ticket will include: * Access to all workshops, keynotes and roundtable presentations * All food and beverages included for duration of the summit * 1 x pass to official networking drinks on the 1stth March * Opportunity to set up business meetings with suppliers * Access to all slides/ presentations from the day Please note that this free VIP pass will only be provided to non vendor specific supplier companies within the industry. Should your company offer a product or service in this sector you will not be allowed to join as a free VIP guest and will need to pay a fee. click here x REGISTER x 2019 POST EVENT REPORT Please enter your full name and email address in the form below and a link will be sent to you to download the pdf: [email-download-link namefield=”YES” id=”2″] x x Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed a leo quis purus feugiat facilisis. Interdum et malesuada fames ac ante ipsum primis in faucibus. Aliquam quis elit tristique, efficitur enim viverra, consequat odio. Duis porta ipsum ut magna dignissim vestibulum. Ut finibus augue nec mi maximus, nec laoreet arcu sagittis. Fusce pellentesque ipsum non lobortis bibendum. Sed consectetur dolor et ligula venenatis facilisis. http://focusnetwork.co/ohsleaders.com.au/ X Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed a leo quis purus feugiat facilisis. Interdum et malesuada fames ac ante ipsum primis in faucibus. Aliquam quis elit tristique, efficitur enim viverra, consequat odio. Duis porta ipsum ut magna dignissim vestibulum. Ut finibus augue nec mi maximus, nec laoreet arcu sagittis. Fusce pellentesque ipsum non lobortis bibendum. Sed consectetur dolor et ligula venenatis facilisis. http://focusnetwork.co/ohsleaders.com.au/ X Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed a leo quis purus feugiat facilisis. Interdum et malesuada fames ac ante ipsum primis in faucibus. Aliquam quis elit tristique, efficitur enim viverra, consequat odio. Duis porta ipsum ut magna dignissim vestibulum. Ut finibus augue nec mi maximus, nec laoreet arcu sagittis. Fusce pellentesque ipsum non lobortis bibendum. Sed consectetur dolor et ligula venenatis facilisis. http://focusnetwork.co/ohsleaders.com.au/ X The requested content cannot be loaded. Please try again later. The requested content cannot be loaded. Please try again later. The requested content cannot be loaded. Please try again later. The requested content cannot be loaded. Please try again later. The requested content cannot be loaded. Please try again later. The requested content cannot be loaded. Please try again later. The requested content cannot be loaded. Please try again later. The requested content cannot be loaded. Please try again later.