focusnetwork.co Open in urlscan Pro
116.90.49.218  Public Scan

URL: https://focusnetwork.co/cisoleaders.com.au/homepage-melbourne-2022/
Submission: On November 18 via manual from AU — Scanned from DE

Form analysis 3 forms found in the DOM

POST /cisoleaders.com.au/homepage-melbourne-2022/#wpcf7-f6942-p15122-o1

<form action="/cisoleaders.com.au/homepage-melbourne-2022/#wpcf7-f6942-p15122-o1" method="post" class="wpcf7-form init" novalidate="novalidate">
  <label class="ebd_input"><input type="hidden" name="ebd_downloads[]" value="7895|2019 CIO/CISO LEADERS SUMMIT SYDNEY AUSTRALIA"> </label><input type="hidden" class="ebd_setting" name="ebd_settings[]"
    value="title|2019 CIO/CISO LEADERS SUMMIT SYDNEY AUSTRALIA"><input type="hidden" class="ebd_setting" name="ebd_settings[]" value="delivered_as|both"><input type="hidden" class="ebd_setting" name="ebd_settings[]" value="hide_form|no"><input
    type="hidden" class="ebd_setting" name="ebd_settings[]" value="radio|no"><input type="hidden" class="ebd_setting" name="ebd_settings[]" value="link_format|_blank"><input type="hidden" class="ebd_setting" name="ebd_settings[]"
    value="item_id|4"><input type="hidden" class="ebd_setting" name="ebd_settings[]" value="form_id|wpcf7-f6942-p15122-o1">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="6942">
    <input type="hidden" name="_wpcf7_version" value="5.2.2">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f6942-p15122-o1">
    <input type="hidden" name="_wpcf7_container_post" value="15122">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
    <input type="hidden" name="_wpcf7_recaptcha_response"
      value="03AGdBq25haxPDj79lgFK6bJWrRqFPgJ6esksnMjelG3a-58Bvoo6bLcEPnp9tniKihmNn07uBbuWTFgs7SOktxz8f59Jl1yTUv_QXNzjvz76qNMzgkDTUxsmbF9PzvWQENMiXCESD2h-6QXHK0pE3G-yYXxHxG25ViIiW2PzC5xnhabaqgLob5LnA0DaZcZ8BVasKZ1Y4yIDBZRNae8SmESqlQiGI5P-u3yTBMrl1SLtUGPcQIYPwdIrQTrHxdbLkGHuorg2ksyfRWqhykMRAC0Sxt6vIrVmMHSukPr_R_iNBIcQ5vUNkljxJ7GDSzr77rW6oW9vMlGmSsfUMNsss4ocRVNzc_OEBIzvh1g4QAn8Sa6uBb7P9sL6KcnDNav0iJrGdmbAU-algpEwY9JyTmmQ2XMVCurhFZzEQndnn0dZbXyvToehNVlOdYbPfFJCDWThR3gnNx3ukQNL27aqrrIoDPGuUwqvybw">
  </div>
  <div class="row">
    <div class="col-sm-6">
      <p><span class="wpcf7-form-control-wrap FirstName"><input type="text" name="FirstName" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"
            placeholder="FirstName *"></span></p>
      <p><span class="wpcf7-form-control-wrap Company"><input type="text" name="Company" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Company *"></span>
      </p>
      <p><span class="wpcf7-form-control-wrap Email"><input type="email" name="Email" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email" aria-required="true" aria-invalid="false"
            placeholder="Email Address *"></span></p>
      <p><br></p>
      <p><span class="wpcf7-form-control-wrap capital-quiz"><label><span class="wpcf7-quiz-label">Which is bigger, 2 or 8?</span> <input type="text" name="capital-quiz" size="40" class="wpcf7-form-control wpcf7-quiz" autocomplete="off"
              aria-required="true" aria-invalid="false"></label><input type="hidden" name="_wpcf7_quiz_answer_capital-quiz" value="331613392d44371ad6ad9b55d8d8280f"></span></p>
    </div>
    <div class="col-sm-6">
      <p><span class="wpcf7-form-control-wrap LastName"><input type="text" name="LastName" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="LastName *"></span>
      </p>
      <p><span class="wpcf7-form-control-wrap JobTitle"><input type="text" name="JobTitle" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"
            placeholder="Job Title *"></span></p>
      <p><span class="wpcf7-form-control-wrap Phone"><input type="text" name="Phone" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Phone *"></span></p>
    </div>
  </div>
  <div class="row text-center">
    <p><input type="submit" value="Send" class="wpcf7-form-control wpcf7-submit button button-blue3"><span class="ajax-loader"></span></p>
  </div>
  <input type="hidden" class="wpcf7-pum" value="{&quot;closepopup&quot;:false,&quot;closedelay&quot;:0,&quot;openpopup&quot;:false,&quot;openpopup_id&quot;:0}">
  <div class="wpcf7-response-output" role="alert" aria-hidden="true"></div>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7090044/c96949b9-3e7b-40e7-b665-b0e6a8a6e029

<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7090044/c96949b9-3e7b-40e7-b665-b0e6a8a6e029" enctype="multipart/form-data" id="hsForm_c96949b9-3e7b-40e7-b665-b0e6a8a6e029"
  method="POST" class="hs-form stacked hs-form-private hsForm_c96949b9-3e7b-40e7-b665-b0e6a8a6e029 hs-form-c96949b9-3e7b-40e7-b665-b0e6a8a6e029 hs-form-c96949b9-3e7b-40e7-b665-b0e6a8a6e029_1633f8c1-bbab-44be-8dc5-3bb316b3a45d"
  data-form-id="c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-portal-id="7090044" target="target_iframe_c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1">
  <fieldset class="form-columns-2" data-reactid=".hbspt-forms-1.1:$0">
    <div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$0.1:$firstname"><label id="label-firstname-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your "
        for="firstname-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$0.1:$firstname.0"><span data-reactid=".hbspt-forms-1.1:$0.1:$firstname.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$0.1:$firstname.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$0.1:$firstname.$firstname"><input id="firstname-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" type="text" name="firstname" required="" value="" placeholder="First name*"
          autocomplete="given-name" data-reactid=".hbspt-forms-1.1:$0.1:$firstname.$firstname.0" inputmode="text"></div>
    </div>
    <div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$0.1:$lastname"><label id="label-lastname-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your "
        for="lastname-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$0.1:$lastname.0"><span data-reactid=".hbspt-forms-1.1:$0.1:$lastname.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$0.1:$lastname.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$0.1:$lastname.$lastname"><input id="lastname-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" type="text" name="lastname" required="" value="" placeholder="Last name*"
          autocomplete="family-name" data-reactid=".hbspt-forms-1.1:$0.1:$lastname.$lastname.0" inputmode="text"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-2" data-reactid=".hbspt-forms-1.1:$1">
    <div class="hs_company hs-company hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$1.1:$company"><label id="label-company-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your "
        for="company-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$1.1:$company.0"><span data-reactid=".hbspt-forms-1.1:$1.1:$company.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$1.1:$company.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$1.1:$company.$company"><input id="company-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" type="text" name="company" required="" value="" placeholder="Company name*"
          autocomplete="organization" data-reactid=".hbspt-forms-1.1:$1.1:$company.$company.0" inputmode="text"></div>
    </div>
    <div class="hs_job_function hs-job_function hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$1.1:$job_function"><label id="label-job_function-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your "
        for="job_function-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$1.1:$job_function.0"><span data-reactid=".hbspt-forms-1.1:$1.1:$job_function.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$1.1:$job_function.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$1.1:$job_function.$job_function"><input id="job_function-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" type="text" name="job_function" required="" value="" placeholder="Job Title*"
          data-reactid=".hbspt-forms-1.1:$1.1:$job_function.$job_function.0" inputmode="text"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-2" data-reactid=".hbspt-forms-1.1:$2">
    <div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$2.1:$email"><label id="label-email-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your "
        for="email-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$2.1:$email.0"><span data-reactid=".hbspt-forms-1.1:$2.1:$email.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$2.1:$email.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$2.1:$email.$email"><input id="email-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" type="email" name="email" required="" placeholder="Email*" value="" autocomplete="email"
          data-reactid=".hbspt-forms-1.1:$2.1:$email.$email.0" inputmode="email"></div>
    </div>
    <div class="hs_phone hs-phone hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$2.1:$phone"><label id="label-phone-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your "
        for="phone-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$2.1:$phone.0"><span data-reactid=".hbspt-forms-1.1:$2.1:$phone.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$2.1:$phone.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$2.1:$phone.$phone"><input id="phone-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" type="tel" name="phone" required="" value="" placeholder="Mobile Phone*" autocomplete="tel"
          data-reactid=".hbspt-forms-1.1:$2.1:$phone.$phone.0" inputmode="tel"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-2" data-reactid=".hbspt-forms-1.1:$3">
    <div class="hs_which_location_ hs-which_location_ hs-fieldtype-select field hs-form-field" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_"><label id="label-which_location_-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class=""
        placeholder="Enter your Which location:" for="which_location_-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.0"><span data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.0.0">Which
          location:</span><span class="hs-form-required" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.0.1">*</span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.$which_location_"><select id="which_location_-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" required="" class="hs-input is-placeholder" name="which_location_"
          data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.$which_location_.0">
          <option value="" disabled="" selected="" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.$which_location_.0.0">Please Select</option>
          <option value="Melbourne" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.$which_location_.0.1:$Melbourne">Melbourne</option>
          <option value="Sydney" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.$which_location_.0.1:$Sydney">Sydney</option>
          <option value="Both" data-reactid=".hbspt-forms-1.1:$3.1:$which_location_.$which_location_.0.1:$Both">Both</option>
        </select></div>
    </div>
    <div class="hs_interested_in_checkbox hs-interested_in_checkbox hs-fieldtype-select field hs-form-field" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox"><label id="label-interested_in_checkbox-c96949b9-3e7b-40e7-b665-b0e6a8a6e029"
        class="" placeholder="Enter your Interested in" for="interested_in_checkbox-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.0"><span
          data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.0.0">Interested in</span><span class="hs-form-required" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.0.1">*</span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox"><select id="interested_in_checkbox-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" required="" class="hs-input is-placeholder"
          name="interested_in_checkbox" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox.0">
          <option value="" disabled="" selected="" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox.0.0">Please Select</option>
          <option value="Delegate" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox.0.1:$Delegate">Delegate</option>
          <option value="Sponsor" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox.0.1:$Sponsor">Sponsor</option>
          <option value="Speaker" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox.0.1:$Speaker">Speaker</option>
          <option value="Partner" data-reactid=".hbspt-forms-1.1:$3.1:$interested_in_checkbox.$interested_in_checkbox.0.1:$Partner">Partner</option>
        </select></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1" data-reactid=".hbspt-forms-1.1:$4">
    <div class="hs_message hs-message hs-fieldtype-textarea field hs-form-field" data-reactid=".hbspt-forms-1.1:$4.1:$message"><label id="label-message-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="" placeholder="Enter your Message"
        for="message-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" data-reactid=".hbspt-forms-1.1:$4.1:$message.0"><span data-reactid=".hbspt-forms-1.1:$4.1:$message.0.0">Message</span><span class="hs-form-required"
          data-reactid=".hbspt-forms-1.1:$4.1:$message.0.1">*</span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$4.1:$message.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$4.1:$message.$message"><textarea id="message-c96949b9-3e7b-40e7-b665-b0e6a8a6e029" class="hs-input" name="message" required="" placeholder=""
          data-reactid=".hbspt-forms-1.1:$4.1:$message.$message.0"></textarea></div>
    </div>
  </fieldset><noscript data-reactid=".hbspt-forms-1.2"></noscript>
  <div class="hs_recaptcha hs-recaptcha field hs-form-field" data-reactid=".hbspt-forms-1.3">
    <div class="input" data-reactid=".hbspt-forms-1.3.0">
      <div class="grecaptcha-badge" data-style="inline" style="width: 256px; height: 60px; box-shadow: gray 0px 0px 5px;">
        <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
            src="https://www.google.com/recaptcha/enterprise/anchor?ar=1&amp;k=6Ld_ad8ZAAAAAAqr0ePo1dUfAi0m4KPkCMQYwPPm&amp;co=aHR0cHM6Ly9mb2N1c25ldHdvcmsuY286NDQz&amp;hl=de&amp;v=_7Co1fh8iT2hcjvquYJ_3zSP&amp;size=invisible&amp;badge=inline&amp;cb=ty638z413sq1"
            width="256" height="60" role="presentation" name="a-h126b077txcz" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
        </div>
        <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response-1" name="g-recaptcha-response" class="g-recaptcha-response"
          style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div><iframe style="display: none;"></iframe>
    </div><input type="hidden" name="g-recaptcha-response" id="hs-recaptcha-response" value="" data-reactid=".hbspt-forms-1.3.1">
  </div>
  <div class="hs_submit hs-submit" data-reactid=".hbspt-forms-1.5">
    <div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.5.0"></div>
    <div class="actions" data-reactid=".hbspt-forms-1.5.1"><input type="submit" value="Submit" class="hs-button primary large" data-reactid=".hbspt-forms-1.5.1.0"></div>
  </div><noscript data-reactid=".hbspt-forms-1.6"></noscript><input name="hs_context" type="hidden"
    value="{&quot;rumScriptExecuteTime&quot;:3061.699999809265,&quot;rumServiceResponseTime&quot;:4885.300000190735,&quot;rumFormRenderTime&quot;:1.1999998092651367,&quot;rumTotalRenderTime&quot;:4917.39999961853,&quot;rumTotalRequestTime&quot;:1822.6000003814697,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;clonedFromForm&quot;:&quot;39e3f502-0c53-4d88-89eb-ba19c60f92e3&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;embedAtTimestamp&quot;:&quot;1637276520434&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1637205997202&quot;,&quot;pageUrl&quot;:&quot;https://focusnetwork.co/cisoleaders.com.au/homepage-melbourne-2022/&quot;,&quot;pageTitle&quot;:&quot;CISO Leaders Summit Australia 2021&quot;,&quot;source&quot;:&quot;FormsNext-static-5.412&quot;,&quot;sourceName&quot;:&quot;FormsNext&quot;,&quot;sourceVersion&quot;:&quot;5.412&quot;,&quot;sourceVersionMajor&quot;:&quot;5&quot;,&quot;sourceVersionMinor&quot;:&quot;412&quot;,&quot;timestamp&quot;:1637276520434,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36&quot;,&quot;originalEmbedContext&quot;:{&quot;region&quot;:&quot;na1&quot;,&quot;portalId&quot;:&quot;7090044&quot;,&quot;formId&quot;:&quot;c96949b9-3e7b-40e7-b665-b0e6a8a6e029&quot;,&quot;target&quot;:&quot;.hsform_eventr1&quot;},&quot;renderedFieldsIds&quot;:[&quot;firstname&quot;,&quot;lastname&quot;,&quot;company&quot;,&quot;job_function&quot;,&quot;email&quot;,&quot;phone&quot;,&quot;which_location_&quot;,&quot;interested_in_checkbox&quot;,&quot;message&quot;],&quot;formTarget&quot;:&quot;.hsform_eventr1&quot;,&quot;correlationId&quot;:&quot;2169cdf3-d2aa-4ad3-b0bc-3cdf678e3a32&quot;,&quot;contentType&quot;:&quot;standard-page&quot;,&quot;hutk&quot;:&quot;93e9e6e7d02c58eb5747500361f906b9&quot;,&quot;captchaStatus&quot;:&quot;LOADED&quot;}"
    data-reactid=".hbspt-forms-1.7"><iframe name="target_iframe_c96949b9-3e7b-40e7-b665-b0e6a8a6e029" style="display:none;" data-reactid=".hbspt-forms-1.8"></iframe>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7090044/ecb8c1d5-2187-48e8-ab63-b29615f9375e

<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7090044/ecb8c1d5-2187-48e8-ab63-b29615f9375e" enctype="multipart/form-data" id="hsForm_ecb8c1d5-2187-48e8-ab63-b29615f9375e"
  method="POST" class="hs-form stacked hs-form-private hsForm_ecb8c1d5-2187-48e8-ab63-b29615f9375e hs-form-ecb8c1d5-2187-48e8-ab63-b29615f9375e hs-form-ecb8c1d5-2187-48e8-ab63-b29615f9375e_63847cb2-4f48-4808-8514-b25aef91eeed"
  data-form-id="ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-portal-id="7090044" target="target_iframe_ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0">
  <fieldset class="form-columns-2" data-reactid=".hbspt-forms-0.1:$0">
    <div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0.1:$firstname"><label id="label-firstname-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
        for="firstname-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$0.1:$firstname.0"><span data-reactid=".hbspt-forms-0.1:$0.1:$firstname.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1:$firstname.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-0.1:$0.1:$firstname.$firstname"><input id="firstname-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" type="text" name="firstname" required="" value="" placeholder="First name*"
          autocomplete="given-name" data-reactid=".hbspt-forms-0.1:$0.1:$firstname.$firstname.0" inputmode="text"></div>
    </div>
    <div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0.1:$lastname"><label id="label-lastname-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
        for="lastname-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$0.1:$lastname.0"><span data-reactid=".hbspt-forms-0.1:$0.1:$lastname.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1:$lastname.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-0.1:$0.1:$lastname.$lastname"><input id="lastname-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" type="text" name="lastname" required="" value="" placeholder="Last name*"
          autocomplete="family-name" data-reactid=".hbspt-forms-0.1:$0.1:$lastname.$lastname.0" inputmode="text"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-2" data-reactid=".hbspt-forms-0.1:$1">
    <div class="hs_company hs-company hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$1.1:$company"><label id="label-company-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
        for="company-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$1.1:$company.0"><span data-reactid=".hbspt-forms-0.1:$1.1:$company.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$1.1:$company.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-0.1:$1.1:$company.$company"><input id="company-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" type="text" name="company" required="" value="" placeholder="Company name*"
          autocomplete="organization" data-reactid=".hbspt-forms-0.1:$1.1:$company.$company.0" inputmode="text"></div>
    </div>
    <div class="hs_job_function hs-job_function hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$1.1:$job_function"><label id="label-job_function-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
        for="job_function-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$1.1:$job_function.0"><span data-reactid=".hbspt-forms-0.1:$1.1:$job_function.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$1.1:$job_function.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-0.1:$1.1:$job_function.$job_function"><input id="job_function-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" type="text" name="job_function" required="" value="" placeholder="Job Title*"
          data-reactid=".hbspt-forms-0.1:$1.1:$job_function.$job_function.0" inputmode="text"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-2" data-reactid=".hbspt-forms-0.1:$2">
    <div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$2.1:$email"><label id="label-email-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
        for="email-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$2.1:$email.0"><span data-reactid=".hbspt-forms-0.1:$2.1:$email.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$2.1:$email.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-0.1:$2.1:$email.$email"><input id="email-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" type="email" name="email" required="" placeholder="Email*" value="" autocomplete="email"
          data-reactid=".hbspt-forms-0.1:$2.1:$email.$email.0" inputmode="email"></div>
    </div>
    <div class="hs_phone hs-phone hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$2.1:$phone"><label id="label-phone-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
        for="phone-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$2.1:$phone.0"><span data-reactid=".hbspt-forms-0.1:$2.1:$phone.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$2.1:$phone.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-0.1:$2.1:$phone.$phone"><input id="phone-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" type="tel" name="phone" required="" value="" placeholder="Mobile Phone*" autocomplete="tel"
          data-reactid=".hbspt-forms-0.1:$2.1:$phone.$phone.0" inputmode="tel"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-2" data-reactid=".hbspt-forms-0.1:$3">
    <div class="hs_message hs-message hs-fieldtype-textarea field hs-form-field" data-reactid=".hbspt-forms-0.1:$3.1:$message"><label id="label-message-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="" placeholder="Enter your "
        for="message-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$3.1:$message.0"><span data-reactid=".hbspt-forms-0.1:$3.1:$message.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$3.1:$message.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-0.1:$3.1:$message.$message"><textarea id="message-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input" name="message" required="" placeholder="Message*"
          data-reactid=".hbspt-forms-0.1:$3.1:$message.$message.0"></textarea></div>
    </div>
    <div class="hs_which_location_ hs-which_location_ hs-fieldtype-select field hs-form-field" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_"><label id="label-which_location_-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class=""
        placeholder="Enter your Which location:" for="which_location_-ecb8c1d5-2187-48e8-ab63-b29615f9375e" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.0"><span data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.0.0">Which
          location:</span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.$which_location_"><select id="which_location_-ecb8c1d5-2187-48e8-ab63-b29615f9375e" class="hs-input is-placeholder" name="which_location_"
          data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.$which_location_.0">
          <option value="" disabled="" selected="" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.$which_location_.0.0">Please Select</option>
          <option value="Melbourne" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.$which_location_.0.1:$Melbourne">Melbourne</option>
          <option value="Sydney" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.$which_location_.0.1:$Sydney">Sydney</option>
          <option value="Both" data-reactid=".hbspt-forms-0.1:$3.1:$which_location_.$which_location_.0.1:$Both">Both</option>
        </select></div>
    </div>
  </fieldset><noscript data-reactid=".hbspt-forms-0.2"></noscript>
  <div class="hs_recaptcha hs-recaptcha field hs-form-field" data-reactid=".hbspt-forms-0.3">
    <div class="input" data-reactid=".hbspt-forms-0.3.0">
      <div class="grecaptcha-badge" data-style="inline" style="width: 256px; height: 60px; box-shadow: gray 0px 0px 5px;">
        <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
            src="https://www.google.com/recaptcha/enterprise/anchor?ar=1&amp;k=6Ld_ad8ZAAAAAAqr0ePo1dUfAi0m4KPkCMQYwPPm&amp;co=aHR0cHM6Ly9mb2N1c25ldHdvcmsuY286NDQz&amp;hl=de&amp;v=_7Co1fh8iT2hcjvquYJ_3zSP&amp;size=invisible&amp;badge=inline&amp;cb=w20pagnh6wyd"
            width="256" height="60" role="presentation" name="a-axk2q9s83uiv" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
        </div>
        <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
          style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div>
    </div><input type="hidden" name="g-recaptcha-response" id="hs-recaptcha-response" value="" data-reactid=".hbspt-forms-0.3.1">
  </div>
  <div class="hs_submit hs-submit" data-reactid=".hbspt-forms-0.5">
    <div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.5.0"></div>
    <div class="actions" data-reactid=".hbspt-forms-0.5.1"><input type="submit" value="Submit" class="hs-button primary large" data-reactid=".hbspt-forms-0.5.1.0"></div>
  </div><noscript data-reactid=".hbspt-forms-0.6"></noscript><input name="hs_context" type="hidden"
    value="{&quot;rumScriptExecuteTime&quot;:3068.699999809265,&quot;rumServiceResponseTime&quot;:4884.699999809265,&quot;rumFormRenderTime&quot;:1.6999998092651367,&quot;rumTotalRenderTime&quot;:4888,&quot;rumTotalRequestTime&quot;:1809.3999996185303,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;clonedFromForm&quot;:&quot;59fcc030-db55-4c97-970f-e3750d254c57&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;embedAtTimestamp&quot;:&quot;1637276520429&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1637198976708&quot;,&quot;pageUrl&quot;:&quot;https://focusnetwork.co/cisoleaders.com.au/homepage-melbourne-2022/&quot;,&quot;pageTitle&quot;:&quot;CISO Leaders Summit Australia 2021&quot;,&quot;source&quot;:&quot;FormsNext-static-5.412&quot;,&quot;sourceName&quot;:&quot;FormsNext&quot;,&quot;sourceVersion&quot;:&quot;5.412&quot;,&quot;sourceVersionMajor&quot;:&quot;5&quot;,&quot;sourceVersionMinor&quot;:&quot;412&quot;,&quot;timestamp&quot;:1637276520429,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36&quot;,&quot;originalEmbedContext&quot;:{&quot;region&quot;:&quot;na1&quot;,&quot;portalId&quot;:&quot;7090044&quot;,&quot;formId&quot;:&quot;ecb8c1d5-2187-48e8-ab63-b29615f9375e&quot;,&quot;target&quot;:&quot;.hsform_eventr&quot;},&quot;renderedFieldsIds&quot;:[&quot;firstname&quot;,&quot;lastname&quot;,&quot;company&quot;,&quot;job_function&quot;,&quot;email&quot;,&quot;phone&quot;,&quot;message&quot;,&quot;which_location_&quot;],&quot;formTarget&quot;:&quot;.hsform_eventr&quot;,&quot;correlationId&quot;:&quot;3a661145-481a-4ae6-87a0-5a91bc7e4ee4&quot;,&quot;contentType&quot;:&quot;standard-page&quot;,&quot;hutk&quot;:&quot;93e9e6e7d02c58eb5747500361f906b9&quot;,&quot;captchaStatus&quot;:&quot;LOADED&quot;}"
    data-reactid=".hbspt-forms-0.7"><iframe name="target_iframe_ecb8c1d5-2187-48e8-ab63-b29615f9375e" style="display:none;" data-reactid=".hbspt-forms-0.8"></iframe>
</form>

Text Content

Toggle navigation
 * About Us
   * Who We Are
   * Our Mission
   * Focus Careers
   * Our Clients
   * Testimonials
   * Our Reach
 * Insights Hub
   * Executive Insights Series
   * Expert Insights
   * Post Event Reports
   * News
   * Latest Updates
 * Digital Services
 * Private Events
 * Summits
   * IT
   * IT Security
   * Health & Safety
   * Upcoming Events
 * Contact


Toggle navigation
 * Speakers
 * Why Attend
 * Program
 * Sponsors
 * Venue
 * Register Now


Join us at the 8th CISO Leaders Australia Summit Be part of this year's upcoming
gathering where you will be able
to engage with the country's leading IT Security professionals on the 1st March
2022, Crown Conference Centre, Melbourne Join us at the 8th CISO Leaders
Australia Summit Be part of this year's upcoming gathering where you will be
able
to engage with the country's leading IT Security professionals on the 1st March
2022, Crown Conference Centre, Melbourne Join us at the 8th CISO Leaders
Australia Summit Be part of this year's upcoming gathering where you will be
able
to engage with the country's leading IT Security professionals on the 1st March
2022, Crown Conference Centre, Melbourne Join us at the 8th CISO Leaders
Australia Summit Be part of this year's upcoming gathering where you will be
able
to engage with the country's leading IT Security professionals on the 1st March
2022, Crown Conference Centre, Melbourne



JOIN US AT THE 8TH CISO LEADERS
AUSTRALIA SUMMIT

BE PART OF THIS YEAR’S UPCOMING GATHERING WHERE YOU WILL BE ABLE TO ENGAGE WITH
THE COUNTRY’S LEADING IT SECURITY PROFESSIONALS ON THE
1ST MARCH 2022, CROWN CONFERENCE CENTRE, MELBOURNE




JOIN THE GATHERING

GET YOUR VIP TICKET HERE



102

DAYS

0

HOURS

57

MINUTES

53

SECONDS





ABOUT THE EVENT

THE 8TH CISO LEADERS AUSTRALIA SUMMIT WILL TAKE PLACE ON THE 1ST OF MARCH 2022
AT THE CROWN CONFERENCE CENTRE IN MELBOURNE. THE SUMMIT WILL ONCE AGAIN BECOME
THE MEETING PLACE FOR MORE THAN 150 OF THE COUNTRY'S LEADING CISOS, HEADS OF IT
SECURITY, CYBER SECURITY AND CIOS.

THIS YEAR'S SUMMIT THEME WILL BE FOCUSSED ON 'RE-EVALUATING SECURITY POSTURE TO
BUILD A CYBER SECURITY ENTERPRISE' AND THIS MESSAGE WILL BE DELIVERED VIA A
NUMBER OF KEYNOTES, WORKSHOPS AND TARGETED ROUNDTABLES DISCUSSIONS TAKING PLACE
THROUGHOUT DAY.

ATTENDEES WILL HAVE THE OPPORTUNITY TO PERSONALISE THEIR OWN AGENDA AND MAXIMISE
THEIR TIME OUT OF THE OFFICE BY ENGAGING IN ONLY THE MOST RELEVANT SESSIONS FOR
THEIR BUSINESS.

OUR NETWORKING DRINKS FUNCTION WILL PROVIDE THE CHANCE TO INTERACT FACE TO FACE
WITH PEERS IN A VERY RELAXED SETTING.

WHILST WE ARE ALL ADJUSTING TO THE 'NEW NORM’ AND ADAPTING TO THE CHALLENGES AND
OPPORTUNITIES THAT COVID-19 BROUGHT FOR US ALL, WE ARE COMMITTED TO DELIVER A
GREAT EVENT IN A WELL-MANAGED AND SAFE ENVIRONMENT.

WE HAVE INTRODUCED NEW EVENT PROTOCOLS TO SAFEGUARD THE HEALTH AND WELLBEING OF
ALL OUR SPONSORS, ATTENDEES AND STAFF WHILST CONTINUING TO DELIVER STRONG
OPPORTUNITIES AND ENGAGEMENTS.

YOU CAN DOWNLOAD OUR SAFE EVENT GUIDELINES HERE





SPEAKERS

CHRIS BEZUIDENHOUT

Managing Director, CIB CIO APAC & Emerging Markets, Deutsche Bank AG

TIM WATTS MP

Shadow Assistant Minister for Communications & Cybersecurity and Federal Member
for Gellibrand, Parliament of Australia

JONATHAN MILTON

Head, Cyber Security, Bupa

LUKE STELLER

Head, Global Cyber Security Operations & Threat Intelligence, ANZ

MITRA MINAI

Chief Information Security Officer, Healthscope Operations

TRACEY EVANS

CIO, SEEK

VINAY MANIKKAM

Principal, Enterprise Security Architect, IAG

JENNIFER REBEIRO

CIO, City West Water

VIJAY NARAYAN

Chief Information Security Officer, Environment Protection Authority

DR. MALCOLM THATCHER

Chief Technology Officer, Australian Digital Health Agency

VENKATA VALLURI

Global IT Director, Treasury Wine Estates

IAN PADGHAM

CIO, Vicinity Centres Trust

MARC AIRO-FARULLA

Regional Sales Director Oceania (AU, NZ & Pacific Islands), Entrust

DRAGAN VLADICIC

Senior Manager, Solutions Engineer, Asia Pacific, Okta

REINHART HANSEN

Director of Technology, Office of the CTO, Imperva

JAY HIRA

Security and Compliance Advisor, Salesforce

AMR IBRAHIM

Lead Platform Specialist, Salesforce

MATTHEW BURNS

Director, BigFix, Asia Pacific & Japan, HCL Software

CLYDE FERNANDEZ

RVP, Platform, Salesforce

RANDEEP CHHABRA

General Manager, AppScan, Asia Pacific & Japan, HCL Software

BYRON COLLINS

Executive Director Business Services & Chief Technology Officer, University of
Melbourne

LUKE HANNAN

Professional Master of Ceremonies, Live Event Host, lukehannan.com.au




GET YOUR VIP TICKET

CLICK HERE



PROGRAM

The summit program is a draft and is subject to change.

 * Melbourne 2022
 * Sydney 2022

08:00

ARRIVAL & REGISTRATION

ARRIVAL & REGISTRATION



40min



08:40

WELCOME & INTRODUCTION

WELCOME & INTRODUCTION



TYRON MCGURGAN, CEO, FOCUS NETWORK




5min



08:45

MASTER OF CEREMONIES, CIO TRACK MAIN PLENARY

MASTER OF CEREMONIES, CIO TRACK MAIN PLENARY



LUKE HANNAN, MASTER OF CEREMONIES, LUKEHANNAN.COM.AU

 



5min

LUKE HANNAN

Luke founded his Professional Master of Ceremonies business
www.lukehannan.com.au on 3 key principles; Service, Preparation & Delivery.
Based [...]

08:50

OPENING KEYNOTE PRESENTATION – ENABLING NEW APPROACHES TO ORGANISATIONAL DIGITAL
INNOVATION IN THE POST-PANDEMIC ERA

OPENING KEYNOTE PRESENTATION – ENABLING NEW APPROACHES TO ORGANISATIONAL DIGITAL
INNOVATION IN THE POST-PANDEMIC ERA



CHRIS BEZUIDENHOUT, MANAGING DIRECTOR, CIB CIO APAC & EMERGING MARKETS, DEUTSCHE
BANK AG

As innovation becomes synonymous with disruption, IT leaders are distinctively
set to evolve into innovation leaders. The need to building required
competencies, skills to envision technology-driven business change and deliver
on their commitments are essential.



30min

CHRIS BEZUIDENHOUT

Chris is an experienced CIO with a wealth of expertise in technology management,
risk, finance and large-scale transformation for employers, [...]

09:20

KEYNOTE PRESENTATION – ARE YOU ENCRYPTING YOUR DATA AND USING A HARDWARE
SECURITY MODULE TO STORE YOUR KEYS?

KEYNOTE PRESENTATION – ARE YOU ENCRYPTING YOUR DATA AND USING A HARDWARE
SECURITY MODULE TO STORE YOUR KEYS?



MARC AIRO-FARULLA, REGIONAL SALES DIRECTOR OCEANIA (AU, NZ & PACIFIC ISLANDS),
ENTRUST

The Annual Global Encryption Trends study and the country report of Australia
will help you understand why this question is so important! As Information
Security leaders, protecting customer and organisational data from internal and
external threats is the core pillar to Security. General security solutions and
digital applications are standard practice, but what about Encryption and Key
Management strategies, are you, as the leading authority in your organisation
implementing these solutions and if so, are they in the most secure way with an
HSM? Let's talk about the Annual GETS (Global Encryption Trends Study) and the
Australia country report, where thousands of like-minded professionals have
their say!



30min

MARC AIRO-FARULLA

Over 20 years experience and knowledge in the field of Security & Digital
Technological implementations, mastered the art of enterprise [...]

09:55

ROUNDTABLE DISCUSSION – CISO TRACK – CREATING A CYBER-RISK CULTURE IN THE
BOARDROOM AND BEYOND

ROUNDTABLE DISCUSSION – CISO TRACK – CREATING A CYBER-RISK CULTURE IN THE
BOARDROOM AND BEYOND



 * Breaking the cyber security knowledge gap
 * Structuring a cyber security risk profile aligned to enterprise risk
 * Develop an effective security metrics and dashboard

 



40min



09:55

ROUNDTABLE DISCUSSION – CIO TRACK – CX COLLABORATION – CIO AS ENABLER OF
BUSINESS SUCCESS

ROUNDTABLE DISCUSSION – CIO TRACK – CX COLLABORATION – CIO AS ENABLER OF
BUSINESS SUCCESS



TRACEY EVANS, CHIEF INFORMATION OFFICER, SEEK

 * Importance of being insight-driven and operationally efficient while
   continuously invoking innovation
 * Identifying new opportunities to design and deliver a better CX thru in sync
   with other departments
 * Creating the right culture of service and accountability measures in a
   Post-COVID-19 world



40min

TRACEY EVANS

Tracey is a passionate technologist with extensive experience leading change and
enterprise transformation across the Asia Pacific region. She [...]

09:55

ROUNDTABLE DISCUSSION – CIO TRACK – BUILDING A MORE RESILIENT AND ADAPTABLE
ENTERPRISE THROUGH TECHNOLOGY

ROUNDTABLE DISCUSSION – CIO TRACK – BUILDING A MORE RESILIENT AND ADAPTABLE
ENTERPRISE THROUGH TECHNOLOGY



IAN PADGHAM, GENERAL MANAGER, ENTERPRISE TECHNOLOGY & CIO, VICINITY CENTRES
TRUST

 * Driving the principles of agile delivery to create a more flexible
   organisation that’s adaptable to constant change & volatility
 * Rethinking tech funding and governance
 * Empowering both human and technology-centred solutions



40min

IAN PADGHAM

Ian Padgham joined Vicinity Centres in June 2015 as part of the Merger of
Federation Centres and Novion Property Group (Novion) and has more than [...]

09:55

ROUNDTABLE DISCUSSION – CISO TRACK – UNDERSTANDING YOUR THREAT LANDSCAPE TO
BUILD A CYBER RESILIENT ENTERPRISE

ROUNDTABLE DISCUSSION – CISO TRACK – UNDERSTANDING YOUR THREAT LANDSCAPE TO
BUILD A CYBER RESILIENT ENTERPRISE



JONATHAN MILTON, HEAD OF CYBERSECURITY, BUPA

 * Driving a threat-led security posture
 * Train like you fight, being ready for game day
 * Being ransomware ready, throughout your enterprise




40min

JONATHAN MILTON

Jonathan is currently the head of cyber security at Bupa. With over 15 years
leading complex programs of investment across cyber security, [...]

10:35

NETWORKING BREAK

NETWORKING BREAK



15min



10:55

WORKSHOP 1 – CISO TRACK – KEEPING PACE WITH EVOLVING REGULATORY AND CYBER
LANDSCAPES

WORKSHOP 1 – CISO TRACK – KEEPING PACE WITH EVOLVING REGULATORY AND CYBER
LANDSCAPES



JAY HIRA, SECURITY AND COMPLIANCE ADVISOR, SALESFORCE

AMR IBRAHIM, LEAD PLATFORM SPECIALIST, SALESFORCE

As we grapple with the rapidly changing threat and regulatory environments, it
is important for organisations to take a step back to reflect on their business
strategy and adapt their security and compliance stance accordingly. This is
doubly so for cloud providers like Salesforce.

In this session, we will cover these evolving landscapes as we see them, how we
measure our success, how we embed TRUST into everything we do, and what we have
learnt - not only from within, but also from our customers.




30min

JAY HIRA

Jay is an innovative and adept information security practitioner with 14+ years
of experience, having successfully delivered information security [...]

AMR IBRAHIM

Amr is an experienced technical architect with 12+ years of experience in the IT
industry. He holds a degree in software engineering. He has [...]

10:55

WORKSHOP 1 – CIO TRACK – SECURING ENDPOINTS AND ENSURING COMPLIANCE

WORKSHOP 1 – CIO TRACK – SECURING ENDPOINTS AND ENSURING COMPLIANCE



MATTHEW BURNS, DIRECTOR, BIGFIX, ASIA PACIFIC & JAPAN, HCL SOFTWARE

Enterprises are under increasing pressure to protect data from breaches in an
aggressive attack environment. Security professionals must re-evaluate their
security software to adjust for new threats and risk with an eye on reducing
complexity. In this session, you will hear;
 * How are enterprises dealing with compliance challenges around distributed
   workforces?
 * What are the key trends around data breaches, and how can organizations
   defend against those risks?
 * How can organizations consolidate security toolkits and software?




30min

MATTHEW BURNS

Matthew Burns is responsible for customer satisfaction and solution
responsibility for the BigFix business in the Asia Pacific and Japan. He has
[...]

11:30

WORKSHOP 2 – CIO TRACK – ADOPTING AI TO ENHANCE YOUR DATA AND ANALYTICS
CAPABILITY

WORKSHOP 2 – CIO TRACK – ADOPTING AI TO ENHANCE YOUR DATA AND ANALYTICS
CAPABILITY



VENKATA VALLURI, GLOBAL IT DIRECTOR, TREASURY WINE ESTATES

 * Importance in leveraging AI and advanced analytics in driving value creation
 * Dealing with the data deluge across multiple systems
 * Implementing data governance to break data silos for effective data
   centralisation



30min

VENKATA VALLURI

Venkata is currently the Global IT Director Analytics and Insights for Treasury
Wine Estates. He is a skilled data management and analytics [...]

11:30

WORKSHOP 2 – CISO TRACK – CISOS & BOARD – ARE YOU SPEAKING THE SAME LANGUAGE?!
HOW TO TRANSLATE YOUR TECHNICAL CYBER LANGUAGE AND HAVE AN EFFECTIVE RISK-BASED
DISCUSSION WITH THE BOARD

WORKSHOP 2 – CISO TRACK – CISOS & BOARD – ARE YOU SPEAKING THE SAME LANGUAGE?!
HOW TO TRANSLATE YOUR TECHNICAL CYBER LANGUAGE AND HAVE AN EFFECTIVE RISK-BASED
DISCUSSION WITH THE BOARD



MITRA MINAI, CHIEF INFORMATION SECURITY OFFICER, HEALTHSCOPE OPERATIONS

Take-aways from this session:
 * Translate the technical language of Cyber Risk and align with business
   strategy and objectives
 * Techniques in presenting the Cybersecurity Strategy and Roadmap to the Board
 * Demonstrating the business value of cybersecurity
 * Cybersecurity Metrics and Dashboard reporting
 * Moving the organization from Cyber Defense to Cyber Resilience

 



30min

MITRA MINAI

Mitra is a senior Technology and Security Transformation executive with over 20
years’ experience working in the Health, Financial and [...]

12:05

ROUNDTABLE DISCUSSION – CIO TRACK – INNOVATE FROM ANYWHERE: SUCCEEDING IN THE
NEXT NORMAL

ROUNDTABLE DISCUSSION – CIO TRACK – INNOVATE FROM ANYWHERE: SUCCEEDING IN THE
NEXT NORMAL



CLYDE FERNANDEZ, RVP, PLATFORM, SALESFORCE

BYRON COLLINS, EXECUTIVE DIRECTOR BUSINESS SERVICES & CHIEF TECHNOLOGY OFFICER,
UNIVERSITY OF MELBOURNE

If the past year has taught us anything, it's that digital transformation is an
urgent priority for Australian businesses. But as we accelerate the shift from
information to innovation, we need to be acutely aware of changes in our
customer and employee expectations. Join us for an interactive discussion with
some Trailblazers who will provide insights on some of the key contributors to
your success, including:
 * Enabling work from anywhere
 * Why culture matters now more than ever, and
 * Growing your innovation talent pool



40min

CLYDE FERNANDEZ

Clyde is a career technologist who has spent time working in many sectors in
Australia, Asia & the UK. He now works for Salesforce, leading a [...]

BYRON COLLINS

Provides a full range of class leading information technology and facilities
management services to all operating entities of the University, and [...]

12:05

ROUNDTABLE DISCUSSION – CISO TRACK – APP, DATA AND EDGE SECURITY – WORKING IN
UNISON

ROUNDTABLE DISCUSSION – CISO TRACK – APP, DATA AND EDGE SECURITY – WORKING IN
UNISON



REINHART HANSEN, DIRECTOR OF TECHNOLOGY, OFFICE OF THE CTO, IMPERVA

Almost every organisation is juggling a skilfully stacked mix of security
vendors and solutions. Add a threat you didn’t know existed; mix in some new
cloud apps; cover all of that with the new Privacy Act and data regulations. In
this roundtable, we’ll discuss:
 * How you can avoid complexity in your security stack
 * Strategies for taking the high-ground from hackers and cybercriminals
 * Integrating app, data and edge security for the best defence
 * Responding to evolving legislative and industry regulations




40min

REINHART HANSEN

Experienced Cyber Security & IT professional with a demonstrated history of
working in technology advisory, architecture, solution design and [...]

12:05

ROUNDTABLE DISCUSSION – CISO TRACK – EMERGING APPSEC TRENDS IN 2022 AND BEYOND

ROUNDTABLE DISCUSSION – CISO TRACK – EMERGING APPSEC TRENDS IN 2022 AND BEYOND



RANDEEP CHHABRA, GENERAL MANAGER, APPSCAN, ASIA PACIFIC & JAPAN, HCL SOFTWARE

Today Enterprise Applications are one of the most valuable IT asset for
organizations, as these applications run critical business processes, conduct
transactions and deliver offerings.  These applications are being built at the
speed of DevOps to address aggressive Time to Market and Agility requirements.
 Prioritizing speed without security in app development can lead to an uptick in
critical vulnerabilities with disastrous results.

To avoid this, organizations must address security earlier in the software
development life cycle. While the security technologies across networking and
operations are more commonly implemented to high standards, we see unique
challenges and trends faced by clients in implementing effective application
security programs.

Join the HCL Software roundtable session for a robust discussion on the
following:

 * How are CISOs improving processes to integrate security into DevOps, and what
   challenges do they face?
 * What are the practices, techniques and strategies that can be used to achieve
   better application security?
 * What are the key trends for 2022 and beyond?




40min

RANDEEP CHHABRA

Randeep Chhabra leads the HCL AppScan business across Asia Pacific and Japan at
HCL Software. Randeep has been actively working for more than a [...]

12:05

ROUNDTABLE DISCUSSION – CIO TRACK – DRIVING YOUR COMPETITIVE ADVANTAGE WITH
CLOUD-FIRST IDENTITY AND ACCESS MANAGEMENT

ROUNDTABLE DISCUSSION – CIO TRACK – DRIVING YOUR COMPETITIVE ADVANTAGE WITH
CLOUD-FIRST IDENTITY AND ACCESS MANAGEMENT



DRAGAN VLADICIC, SENIOR MANAGER, SOLUTIONS ENGINEER, ASIA PACIFIC, OKTA

These days, many organizations are operating their IT environment in a hybrid
state. While the cloud has allowed organizations to realize new levels of
efficiency and ROI by leveraging modern approaches such as SaaS, a certain
number of apps will likely remain on-premises for the foreseeable future.

And while the efficiencies of a cloud-first approach are well established,
organizations and their employees find it difficult to move back-and-forth
between their SaaS apps on one side of the hybrid state, and those legacy
applications that need to remain within the on-premises data center.

Identity technologies help ease the pain of moving between these two worlds, and
organizations relying on legacy solutions can create friction within their
business, with disjointed architectures that create duplicate capabilities. This
inconsistent and slow integration experience can create issues for employees who
rely on SaaS for their daily work but might need to access on-premises apps for
critical projects.

How can security and IT teams provide employees with a seamless, yet secure,
experience as they need to access both SaaS and on-premises applications? How
can organizations leverage a cloud-first approach to better manage their
applications as well as identity and access management (IAM)? What are the best
ways for organizations to leverage newer technologies to help scale their
infrastructure to meet customer needs?




40min

DRAGAN VLADICIC

Bio coming [...]

12:45

NETWORKING LUNCH

NETWORKING LUNCH



40min



13:30

WORKSHOP 3 – CIO TRACK – DIGITAL CHALLENGES AND OPPORTUNITIES OF A GLOBAL HEALTH
CRISIS

WORKSHOP 3 – CIO TRACK – DIGITAL CHALLENGES AND OPPORTUNITIES OF A GLOBAL HEALTH
CRISIS



DR. MALCOLM THATCHER, CHIEF TECHNOLOGY OFFICER, AUSTRALIAN DIGITAL HEALTH AGENCY

The COVID-19 pandemic has disrupted typical work streams and services across all
sectors around the world.

It is imperative to redefine priorities, reallocating resources, and identifying
new opportunities to have impact to create space for rapid innovation and
scale-up of existing digital tools.




30min

DR. MALCOLM THATCHER

Dr Malcolm Thatcher is the Chief Technology Officer at the Australian Digital
Health Agency, a role he commenced in February 2021. Dr Thatcher [...]

13:30

WORKSHOP 3 – CISO TRACK

WORKSHOP 3 – CISO TRACK



SPEAKER & SYNOPSIS COMING SOON



30min



14:05

WORKSHOP 4 – CIO TRACK

WORKSHOP 4 – CIO TRACK



SPEAKER & SYNOPSIS COMING SOON



30min



14:05

WORKSHOP 4 – CISO TRACK

WORKSHOP 4 – CISO TRACK



VINAY MANIKKAM, PRINCIPAL, ENTERPRISE SECURITY ARCHITECT, IAG

Synopsis coming soon





30min

VINAY MANIKKAM

Bio to be [...]

14:40

WORKSHOP 5 – CISO TRACK – PRIORITISING INTEGRATION OF GOVERNANCE, RISK AND
COMPLIANCE IN CYBERSECURITY IN THE NEW NORMAL

WORKSHOP 5 – CISO TRACK – PRIORITISING INTEGRATION OF GOVERNANCE, RISK AND
COMPLIANCE IN CYBERSECURITY IN THE NEW NORMAL



VIJAY NARAYAN, CHIEF INFORMATION SECURITY OFFICER, ENVIRONMENT PROTECTION
AUTHORITY

 * Re-emphasized the importance of data protection through a multitude of
   mandates
 * Implementation of security controls on cloud components
 * Providing leadership with timely, comprehensive risk and compliance-related
   reporting

 



30min

VIJAY NARAYAN

Vijay is currently the Chief Information Security Officer at Environment
Protection Authority. He is a subject matter expert in Information [...]

14:40

WORKSHOP 5 – CIO TRACK – ADDRESSING DIVERSITY AND DIGITAL SKILLS DEFICIENCY IN A
RAPIDLY CHANGING FUTURE

WORKSHOP 5 – CIO TRACK – ADDRESSING DIVERSITY AND DIGITAL SKILLS DEFICIENCY IN A
RAPIDLY CHANGING FUTURE



JENNIFER REBEIRO, CHIEF INFORMATION OFFICER, CITY WEST WATER

 * The importance of reskilling and upskilling as new roles emerge and skills
   requirements change.
 * Leverage the experts you already have on staff and creating an extensive
   career path.
 * Adopting more inclusive hiring practices outside of traditional talent pools.



30min

JENNIFER REBEIRO

Jennifer is the Chief Information Officer at City West Water. She has led teams
across a wide range of industries and functions, challenging and [...]

15:15

ROUNDTABLE DISCUSSION – CIO TRACK- SPEAKER AND SYNOPSIS COMING SOON

ROUNDTABLE DISCUSSION – CIO TRACK- SPEAKER AND SYNOPSIS COMING SOON



30min



15:15

ROUNDTABLE DISCUSSION – CISO TRACK – DELIVERING AN AGILE SECURITY OPERATIONS
CENTRE

ROUNDTABLE DISCUSSION – CISO TRACK – DELIVERING AN AGILE SECURITY OPERATIONS
CENTRE



LUKE STELLER, HEAD, GLOBAL CYBER SECURITY OPERATIONS & THREAT INTELLIGENCE, ANZ

In this workshop, Luke will cover:
 * Automating security operations to keep up with growing threats across
   continuous controls testing;
 * SIEM alerting and risk scoring, incident case management, incident response,
   actionable threat intelligence, security devops, autonomous workforce and
   cloud;
 * Aligning security to organisational strategy and mapping to key threat
   frameworks.





30min

LUKE STELLER

Luke heads the Security Operations Centre and Threat Intelligence in one of the
largest financial institutions in Australia which operates in [...]

15:15

ROUNDTABLE DISCUSSION – CIO TRACK- SPEAKER AND SYNOPSIS COMING SOON

ROUNDTABLE DISCUSSION – CIO TRACK- SPEAKER AND SYNOPSIS COMING SOON



30min



15:15

ROUNDTABLE DISCUSSION – CISO TRACK- SPEAKER AND SYNOPSIS COMING SOON

ROUNDTABLE DISCUSSION – CISO TRACK- SPEAKER AND SYNOPSIS COMING SOON



30min



15:50

CLOSING KEYNOTE PRESENTATION – TIME FOR A NATIONAL RANSOMWARE STRATEGY

CLOSING KEYNOTE PRESENTATION – TIME FOR A NATIONAL RANSOMWARE STRATEGY



TIM WATTS MP, SHADOW ASSISTANT MINISTER FOR COMMUNICATIONS AND CYBER SECURITY,
FEDERAL MEMBER FOR GELLIBRAND, PARLIAMENT OF AUSTRALIA

Ransomware is the highest threat facing Australian businesses and government in
the cyber domain.

The federal government must play a leading role in making enterprises a less
attractive target for these ransomware groups by creating potential policies,
including increased law enforcement, targeted international sanctions, offensive
cyber actions and regulating the payment of ransoms.

 



30min

TIM WATTS MP

Tim has been the Federal Member for Gellibrand in Melbourne’s west since 2013.
Since being elected, Tim has been an active advocate on issues [...]

16:25

NETWORKING DRINKS

NETWORKING DRINKS



40min



08:00

ARRIVAL & REGISTRATION

ARRIVAL & REGISTRATION



40min



08:40

WELCOME & INTRODUCTION

WELCOME & INTRODUCTION



TYRON MCGURGAN, CEO, FOCUS NETWORK



5min



08:45

MASTER OF CEREMONIES, CIO TRACK

MASTER OF CEREMONIES, CIO TRACK



5min



08:50

OPENING KEYNOTE PRESENTATION – HARNESSING DIGITAL TRANSFORMATION AND EMERGING
TECHNOLOGIES IN THE POST COVID-19 ERA

OPENING KEYNOTE PRESENTATION – HARNESSING DIGITAL TRANSFORMATION AND EMERGING
TECHNOLOGIES IN THE POST COVID-19 ERA



CHRIS BEZUIDENHOUT, MANAGING DIRECTOR, CIB CIO APAC & EMERGING MARKETS, DEUTSCHE
BANK AG

 * Evaluating the strengths and weaknesses of digital performance during the
   pandemic.
 * Combining digital, technology, mindset and culture to create a smooth digital
   experience.
 * Embedding or reassessing security and regulatory compliance in the cloud.




30min

CHRIS BEZUIDENHOUT

Chris is an experienced CIO with a wealth of expertise in technology management,
risk, finance and large-scale transformation for employers, [...]

09:20

KEYNOTE PRESENTATION – SAFEGUARDING YOUR ORGANISATION AGAINST RANSOMWARE ATTACKS
WITH A DEFENCE-IN-DEPTH APPROACH

KEYNOTE PRESENTATION – SAFEGUARDING YOUR ORGANISATION AGAINST RANSOMWARE ATTACKS
WITH A DEFENCE-IN-DEPTH APPROACH



 * Preventing an attack before it occurs with easy implementation of security
   best practices.
 * Keeping an eye out for unusual or anomalous behaviour and taking the right
   steps to warn.
 * Executing a business continuity and disaster recovery plan for continued
   business operations.



30min



09:55

ROUNDTABLE DISCUSSION – CIO TRACK – CREATING AN AGILE, RESILIENT AND SUSTAINABLE
ORGANISATION THROUGH DIGITALISATION

ROUNDTABLE DISCUSSION – CIO TRACK – CREATING AN AGILE, RESILIENT AND SUSTAINABLE
ORGANISATION THROUGH DIGITALISATION



CHRISTOPHER JOHNSON, HEAD OF GROUP TECHNOLOGY, CHARTER HALL

 * Drawing up a digital-first operation model and technology-led capabilities
   strategy.
 * Setting up a digital knowledge hub to showcase the impact of digital in
   transforming business.
 * Leveraging on new age technologies and collaborative ways of working to
   accelerate innovations.



40min

CHRISTOPHER JOHNSON

Christopher Johnson has been working in the IT industry for more than 25 years,
across marketing, telecommunications, publishing, professional [...]

09:55

ROUNDTABLE DISCUSSION – CIO TRACK – CIO AS AN AGENT OF CHANGE: SPEARHEADING A
DIGITAL CULTURE AT EVERY LEVEL OF THE BUSINESS

ROUNDTABLE DISCUSSION – CIO TRACK – CIO AS AN AGENT OF CHANGE: SPEARHEADING A
DIGITAL CULTURE AT EVERY LEVEL OF THE BUSINESS



BEN WATERHOUSE, CHIEF INFORMATION OFFICER, COATES HIRE

 * Reaching out to all frontline employees in the mission areas directly and
   continuously.
 * Conducting robust trainings and e-learnings on the different technologies and
   practices.
 * Improving leadership and management skills for effective top and down
   communication.




40min

BEN WATERHOUSE

I specialise in embedding a digital transformation culture and setting up
technology teams to excel in delivering continuous business value [...]

09:55

ROUNDTABLE DISCUSSION – CISO TRACK – BEST PRACTICES OF MIGRATING TO THE CLOUD
SECURELY AND SEAMLESSLY

ROUNDTABLE DISCUSSION – CISO TRACK – BEST PRACTICES OF MIGRATING TO THE CLOUD
SECURELY AND SEAMLESSLY



 * Exploring the pre-migration, migration, post-migration and mass migration
   stages.
 * Following the right principles to uphold security and compliance
   requirements.
 * Clearing up the roadblocks and dealing with the hurdles faced during cloud
   migration.



40min



09:55

ROUNDTABLE DISCUSSION – CISO TRACK – GETTING THE BOARD’S BUY-IN ON CYBER
SECURITY INITIATIVES WITH PROVEN TACTICS

ROUNDTABLE DISCUSSION – CISO TRACK – GETTING THE BOARD’S BUY-IN ON CYBER
SECURITY INITIATIVES WITH PROVEN TACTICS



 * Learning to speak in business terms to improve budgetary and investment win
   rate.
 * Quantifying enterprise cyber-risk with business objectives for an informed
   decision.
 * Demonstrating a tactical cyber security strategy to help the board understand
   the ROI.



40min



10:35

NETWORKING BREAK

NETWORKING BREAK



15min



10:55

WORKSHOP 1 – CIO TRACK – DIGITISING WORKFLOW AND BUSINESS PROCESSES WITH ROBOTIC
PROCESS AUTOMATION

WORKSHOP 1 – CIO TRACK – DIGITISING WORKFLOW AND BUSINESS PROCESSES WITH ROBOTIC
PROCESS AUTOMATION



30min



10:55

WORKSHOP 1 – CISO TRACK – SECURING CLOUD INFRASTRUCTURE WITH CLOUD SECURITY
POSTURE MANAGEMENT

WORKSHOP 1 – CISO TRACK – SECURING CLOUD INFRASTRUCTURE WITH CLOUD SECURITY
POSTURE MANAGEMENT



30min



11:30

WORKSHOP 2 – CIO TRACK – BUILDING AND MAINTAINING A DATA-DRIVEN ORGANISATION TO
REMAIN COMPETITIVE

WORKSHOP 2 – CIO TRACK – BUILDING AND MAINTAINING A DATA-DRIVEN ORGANISATION TO
REMAIN COMPETITIVE



 * Incorporating data and analytics into the business strategy, systems and
   processes.
 * Detecting business and technical obstacles in preventing the organisation
   from being data-driven.
 * Implementing critical steps and pragmatic recommendations to resolve these
   barriers.



30min



11:30

WORKSHOP 2 – CISO TRACK – THE ANYWHERE WORKFORCE: SECURING THE HYBRID WORKFORCE
IN THE NEW NORMAL

WORKSHOP 2 – CISO TRACK – THE ANYWHERE WORKFORCE: SECURING THE HYBRID WORKFORCE
IN THE NEW NORMAL



RASSOUL GHAZNAVI ZADEH, DIRECTOR OF INFORMATION SECURITY, RESMED

 * Examining identity protection tools existing internally and using it to
   protect from attacks.
 * Adopting Zero Trust methodologies to prevent, detect and respond to cyber
   security incidents.
 * Taking advantage of more robust security in the cloud and having a strong
   cloud posture.




30min

RASSOUL GHAZNAVI ZADEH

Rassoul is an Information Security expert, leader, author of a few cyber
security books, online and university instructor, and active member of [...]

12:05

ROUNDTABLE DISCUSSION – CIO TRACK – HYBRID CLOUD VS. MULTI-CLOUD: CHOOSING THE
BEST FIT FOR YOUR ORGANISATION

ROUNDTABLE DISCUSSION – CIO TRACK – HYBRID CLOUD VS. MULTI-CLOUD: CHOOSING THE
BEST FIT FOR YOUR ORGANISATION



40min



12:05

ROUNDTABLE DISCUSSION – CISO TRACK – PROTECTING AND SECURING THE ENDPOINTS FROM
EVOLVING CYBER SECURITY THREATS

ROUNDTABLE DISCUSSION – CISO TRACK – PROTECTING AND SECURING THE ENDPOINTS FROM
EVOLVING CYBER SECURITY THREATS



40min



12:05

ROUNDTABLE DISCUSSION – CIO TRACK – TURNING TO EDGE COMPUTING TO TRANSFORM DATA
AND ENHANCE CLOUD INFRASTRUCTURE

ROUNDTABLE DISCUSSION – CIO TRACK – TURNING TO EDGE COMPUTING TO TRANSFORM DATA
AND ENHANCE CLOUD INFRASTRUCTURE



40min



12:05

ROUNDTABLE DISCUSSION – CISO TRACK – ENCRYPTION AND KEY MANAGEMENT: WHY IS IT
NECESSARY AND HOW TO DEPLOY

ROUNDTABLE DISCUSSION – CISO TRACK – ENCRYPTION AND KEY MANAGEMENT: WHY IS IT
NECESSARY AND HOW TO DEPLOY



40min



12:45

NETWORKING LUNCH

NETWORKING LUNCH



40min



13:30

WORKSHOP 3 – CIO TRACK – THE EVERYWHERE WORKPLACE: PLANNING AND PREPARING FOR A
HYBRID WORKPLACE

WORKSHOP 3 – CIO TRACK – THE EVERYWHERE WORKPLACE: PLANNING AND PREPARING FOR A
HYBRID WORKPLACE



DR. ASHISH BHARADWAJ, CIO, TORRENS GLOBAL EDUCATION SERVICES

Rethinking communication, training and development, knowledge exchange and
psychological needs.
 * Reimagining the office space while knowing the specific requirements needed
   for the home workplace.
 * Reinforcing integrity, security, privacy and liabilities policies while
   putting in place a contingency plan.





30min

DR. ASHISH BHARADWAJ

Dr. Ashish Bharadwaj is an executive, technologist and educator with over 20
years of rich experience in delivering impactful technology and [...]

13:30

WORKSHOP 3 – CISO TRACK

WORKSHOP 3 – CISO TRACK



SPEAKER & SYNOPSIS COMING SOON



30min

ANDREW WAN

Andrew is an innovative industry veteran in security and has worked across
government, critical infrastructure, telecommunications, health, [...]

14:05

WORKSHOP 4 – CIO TRACK – THE NEW MANAGEMENT APPROACH: FOCUSING ON PRODUCTIVITY
MEASURES VS. TIME MEASURES

WORKSHOP 4 – CIO TRACK – THE NEW MANAGEMENT APPROACH: FOCUSING ON PRODUCTIVITY
MEASURES VS. TIME MEASURES



 * Understanding the importance of measuring productivity instead of time in the
   new normal.
 * Addressing the biggest productivity challenges in the modern workplace and
   ways of overcoming.
 * Discussing strategies that emphasises on results while ensuring employees
   wellbeing.



30min



14:05

WORKSHOP 4 – CISO TRACK – MAKING DATA PRIVACY A STRATEGIC PRIORITY TO STAY ON
TOP OF DATA BREACH AND RISKS

WORKSHOP 4 – CISO TRACK – MAKING DATA PRIVACY A STRATEGIC PRIORITY TO STAY ON
TOP OF DATA BREACH AND RISKS



SPEAKER TBC

 * Analysing data privacy risks to know every vulnerability, threat source and
   joint impact.
 * Developing a comprehensive data privacy, security and IT compliance program.
 * Overcoming the 3 most common challenges faced when implementing a privacy
   program.



30min



14:40

WORKSHOP 5 – CIO TRACK – PROVIDING A SAFE, SECURE AND SUSTAINABLE CUSTOMER
EXPERIENCE WITH A STRATEGIC ROADMAP

WORKSHOP 5 – CIO TRACK – PROVIDING A SAFE, SECURE AND SUSTAINABLE CUSTOMER
EXPERIENCE WITH A STRATEGIC ROADMAP



 * Innovating the customer journey across departments to attract, serve and
   retains customers.
 * Designing the right data plan to harvest, leverage and secure customer data
   across CX platform.
 * Deploying cutting-edge methods and embracing innovations to measure and
   enhance CX.



30min



14:40

WORKSHOP 5 – CISO TRACK – PREPARING FOR NEW CRITICAL INFRASTRUCTURE REGULATIONS:
WHAT CAN BE DONE TODAY?

WORKSHOP 5 – CISO TRACK – PREPARING FOR NEW CRITICAL INFRASTRUCTURE REGULATIONS:
WHAT CAN BE DONE TODAY?



 * Gaining visibility on the available assets, how they communicate with each
   other and over what protocols.
 * Mitigating known vulnerabilities and defending defenceless asserts with
   pervasive controls.
 * Finding efficiencies to manage additional responsibility and report incidents
   at a faster pace.



30min



15:15

WORKSHOP 6 – CIO TRACK – USING CORE COMPETENCIES TO IMPROVE OPERATIONAL
EFFECTIVENESS AND EFFICIENCY

WORKSHOP 6 – CIO TRACK – USING CORE COMPETENCIES TO IMPROVE OPERATIONAL
EFFECTIVENESS AND EFFICIENCY



 * Refining processes by automating organisational processes, workflows and
   systems.
 * Supporting employees with time management, resource management and setting
   KPIs.
 * Carrying out a fundamental financial analysis and internal IT auditing to
   assess performance.



30min



15:15

WORKSHOP 6 – CISO TRACK – DEVELOPING AND SUSTAINING A STRONG CYBERSMART CULTURE
ACROSS THE ORGANISATION

WORKSHOP 6 – CISO TRACK – DEVELOPING AND SUSTAINING A STRONG CYBERSMART CULTURE
ACROSS THE ORGANISATION



 * Changing organisational way of thinking by making everyone part of the
   security team.
 * Raising awareness of digital dangers, the personal impact and ways to protect
   themselves online.
 * Involving leaders in the organisation to set the tone for how employees
   should approach it.



30min



15:50

CLOSING KEYNOTE PRESENTATION – HEADING TOWARDS THE FUTURE OF A SECURE DIGITAL
ECONOMY IN AUSTRALIA

CLOSING KEYNOTE PRESENTATION – HEADING TOWARDS THE FUTURE OF A SECURE DIGITAL
ECONOMY IN AUSTRALIA



 * Accelerating digital capabilities to speed up and secure economic recovery
   from Covid-19 crisis.
 * Identifying skills and capabilities needed to further harness the benefits of
   digital technology.
 * Getting ready for emerging technologies and new business models in IT and IT
   security.

 



30min



16:20

NETWORKING DRINKS

NETWORKING DRINKS



60min





WHY ATTEND


STAR KEYNOTES
AND PRESENTERS

We invite only the leading international and local experts to provide sessions
on site, this allows for attendees to be taught by front-line executives that
compress years of meaningful experience into a systematic, well organised
learning program.




NETWORKING
OPPORTUNITIES

Keeping in line with the main goal of the event in achieving new relationships,
we provide a huge amount of networking opportunities for attendees through
breakfast, luncheons, cocktails and informal introductions.





1-1 PRIVATE
MEETINGS

Allowing both buyers and sellers the opportunity to engage with one another
onsite in a series of prearranged business meetings. These provide both parties
a great opportunity to build new relationships by interacting face to face.




TARGETED
SESSIONS

Being able to experience different sessions is what makes this event unique;
whether you are looking to attend an interactive workshop, roundtable, 1-1
meeting or panel discussion.





NETWORKING
LUNCH

Interact and relax amongst your peers at the Networking lunch where you will
have the opportunity to be part of the entertainment.




PERSONALISED
PROGRAM

The summit is personalised for YOU, this means that what is important to your
business is important to us. We create personalised itineraries around sessions
you want to attend, allowing for your time to be spent wisely while out of the
office.






DOWNLOAD THE POST EVENT REPORT FROM OUR PREVIOUS EVENT

CLICK HERE

Please enter your details in the form below to get the download link:




Which is bigger, 2 or 8?









GET YOUR VIP TICKET

CLICK HERE



MEET LEADING IT EXECUTIVES FROM AUSTRALIA’S STRONGEST BRANDS.

Interact and engage with some of the strongest and most powerful brands from
across Australia.





“FIRST OF ALL, CAN I JUST SAY THIS WAS ONE OF THE BEST CONFERENCES I HAVE BEEN
TO IN THE LAST 5 YEARS. THE CALIBER OF DELEGATES (AND NETWORKING OPPORTUNITIES),
SUPPLIERS AND SPEAKERS WAS EXCEPTIONAL. YOUR TEAM – WERE SO HELPFUL BEFORE AND
DURING THE EVENT. WELL DONE, I'D BE VERY HAPPY TO BE INVITED BACK!”

 

– 20TH CENTURY FOX





'FANTASTIC EVENT! CONGRATULATIONS TO YOU AND THE TEAM. HANDS DOWN THE BEST EVENT
I HAVE ATTENDED AS A SPONSOR SINCE I'VE BEEN AT GENESYS. YOU AND YOUR TEAM WERE
EXTREMELY PROFESSIONAL AND HELPFUL IN THE LEAD UP TO THE EVENT AND I VERY MUCH
APPRECIATE YOUR PATIENCE IN DEALING WITH THE MANY HURDLES ALONG THE WAY. I CAN'T
TELL YOU HOW REFRESHING THAT IS AFTER THE DEALINGS WE'VE HAD WITH SEVERAL OTHER
EVENT/CONFERENCE PROVIDERS ACROSS APAC.'

 

– GENESYS





“JUST WANTED TO THANK YOU AND THE TEAM FOR MAKING US FEEL SO WELCOME AND LOOKING
AFTER THE TEAM DURING THE CONFERENCE. IT WAS DEFINITELY ONE OF THE BEST ONES
WE’VE BEEN TO, SO WELL DONE. WHEN IS YOUR NEXT EVENT? WOULD LOVE TO KEEP THE
BALL ROLLING ON THIS.”

 

– SHOOTSTA


“I ALWAYS ENJOY THE OPPORTUNITY THIS SUMMIT AFFORDS FOR NETWORKING AND A GENERAL
CHECK IN ON WHAT EVERYONE IS DOING.”

 

TRAVERS STOW – SIGMA HEALTHCARE






DIAMOND SPONSOR


 * WordPress Carousel Free Version
   
   
   HCL Software is a division of HCL Technologies (HCL) that operates its
   primary software business. It develops, markets, sells, and supports over 20
   product families in the areas of DevSecOps, Automation, Digital Solutions,
   Data Management, Marketing and Commerce, and Mainframes.
   
   HCL Software has offices and labs around the world to serve thousands of
   customers.
   
   Its mission is to drive ultimate customer success with their IT investments
   through relentless innovation of its products.
   
   https://www.hcltechsw.com/
   




WordPress Carousel Plugin




PLATINUM SPONSOR


 * WordPress Carousel Free Version
   
   
   We bring companies and customers together on the #1 CRM. Sharing the news,
   events, and innovation you need to change the world for good.
   
   www.salesforce.com
   




WordPress Carousel Plugin




GOLD SPONSORS


 * WordPress Carousel Free Version
   
   Try LastPass, the best password manager, password generator, and vault for
   free today! LastPass makes and remembers your passwords, so you don't have
   to!
   www.lastpass.com

 * As a cybersecurity leader championing the fight to secure data and all paths
   to it, Imperva offers a full defence-in-depth portfolio of application and
   data security solutions. Imperva Application Security, built on a single
   stack architecture and deployed across a global network, protects websites,
   business-critical APIs, legacy systems and applications based on open source,
   and more – without affecting performance. Imperva Database Security
   solutions, including Imperva Database Security and Cloud Data Security,
   provide the most-targeted protection of your most valuable asset — your data
   — wherever you choose to host it. And with Imperva, you get complete
   visibility and defence against any enterprise-wide attack campaign that comes
   your way.
   
   www.imperva.com
 * WordPress Carousel Free Version
   
   
   Okta is the leading independent provider of identity for the enterprise. The
   Okta Identity Cloud enables organizations to both secure and manage their
   extended enterprise, and transform their customers’ experiences. With over
   5,500 pre-built integrations to applications and infrastructure providers,
   Okta customers can easily and securely adopt the technologies they need to
   fulfill their missions. Over 5,600 organizations, including 20th Century Fox,
   JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to
   securely connect their people and technology.
   
   www.okta.com

 * BUILT FOR THE MOST AMBITIOUS BUSINESSES
   
   Looking for a product to deliver easy, reliable yet powerful virtual
   meetings? How about an affordable yet feature-rich VoIP phone solution to
   connect your growing business? Or maybe a single, unified solution together
   with state-of-the-art room systems?
   
   The GoTo Collaboration Cloud - featuring solutions for online meetings,
   voice, rooms, webinars and training - brings together the easiest, fastest,
   and most innovative unified communications and collaboration products.
   
   www.goto.com
 * WordPress Carousel Free Version
   
   
   Cisco hardware, software, and service offerings are used to create the
   Internet solutions that make networks possible--providing easy access to
   information anywhere, at any time.
   
   Since the company's inception, Cisco engineers have been leaders in the
   development of Internet Protocol (IP)-based networking technologies. Today,
   this tradition of innovation continues with industry-leading products and
   solutions in the company's core development areas of routing and switching,
   as well as in advanced technologies such as home networking, IP telephony,
   optical networking, security, storage area networking, and wireless
   technology.
   
   www.cisco.com
 * Try LastPass, the best password manager, password generator, and vault for
   free today! LastPass makes and remembers your passwords, so you don't have
   to!
   www.lastpass.com
 * WordPress Carousel Free Version
   
   
   As a cybersecurity leader championing the fight to secure data and all paths
   to it, Imperva offers a full defence-in-depth portfolio of application and
   data security solutions. Imperva Application Security, built on a single
   stack architecture and deployed across a global network, protects websites,
   business-critical APIs, legacy systems and applications based on open source,
   and more – without affecting performance. Imperva Database Security
   solutions, including Imperva Database Security and Cloud Data Security,
   provide the most-targeted protection of your most valuable asset — your data
   — wherever you choose to host it. And with Imperva, you get complete
   visibility and defence against any enterprise-wide attack campaign that comes
   your way.
   
   www.imperva.com

 * Okta is the leading independent provider of identity for the enterprise. The
   Okta Identity Cloud enables organizations to both secure and manage their
   extended enterprise, and transform their customers’ experiences. With over
   5,500 pre-built integrations to applications and infrastructure providers,
   Okta customers can easily and securely adopt the technologies they need to
   fulfill their missions. Over 5,600 organizations, including 20th Century Fox,
   JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to
   securely connect their people and technology.
   
   www.okta.com
 * WordPress Carousel Free Version
   
   
   BUILT FOR THE MOST AMBITIOUS BUSINESSES
   
   Looking for a product to deliver easy, reliable yet powerful virtual
   meetings? How about an affordable yet feature-rich VoIP phone solution to
   connect your growing business? Or maybe a single, unified solution together
   with state-of-the-art room systems?
   
   The GoTo Collaboration Cloud - featuring solutions for online meetings,
   voice, rooms, webinars and training - brings together the easiest, fastest,
   and most innovative unified communications and collaboration products.
   
   www.goto.com

 * Cisco hardware, software, and service offerings are used to create the
   Internet solutions that make networks possible--providing easy access to
   information anywhere, at any time.
   
   Since the company's inception, Cisco engineers have been leaders in the
   development of Internet Protocol (IP)-based networking technologies. Today,
   this tradition of innovation continues with industry-leading products and
   solutions in the company's core development areas of routing and switching,
   as well as in advanced technologies such as home networking, IP telephony,
   optical networking, security, storage area networking, and wireless
   technology.
   
   www.cisco.com
   




WordPress Carousel Plugin




SILVER SPONSORS


 * WordPress Carousel Free Version
   
   
   Today more than ever, people demand seamless, secure experiences, whether
   they’re crossing borders, making a purchase, accessing e-government services
   or logging into corporate networks. Entrust offers an unmatched breadth of
   digital security and credential issuance solutions at the very heart of all
   these interactions. With more than 2,500 colleagues, a network of global
   partners, and customers in over 150 countries, it’s no wonder the world’s
   most entrusted organizations trust us.
   
   www.entrust.com

 * From the CISO to the analyst, Exabeam helps security teams outsmart the odds
   by adding intelligence to their existing security tools – including SIEMs,
   XDRs, cloud data lakes and hundreds of other business and security products.
   Out-of-the-box use case coverage delivers repeatable outcomes. Behavioral
   analytics allows security teams to detect compromised and malicious users
   that were previously difficult, or impossible, to find. And alert enhancement
   and automated timeline creation help overcome staff shortages by minimizing
   false positives and reducing the time it takes analysts to detect, triage,
   investigate and respond to incidents by 51 percent.
   
   www.exabeam.com
 * WordPress Carousel Free Version
   
   
   Since creating the first laptop case more than 30 years ago, Targus has
   continued to advance the mobile accessories category with cutting-edge,
   quality-made, productivity-boosting solutions. Compatible with major OEM
   brands, our carrying cases, universal docking stations, privacy screens, and
   peripherals enable an ever-changing workforce to perform at their best
   anytime, anywhere. Discover why organizations are choosing Targus, proven
   market leader and trusted partner of SMBs and Fortune 1000 businesses
   worldwide.
   
   www.targus.com

 * Thycotic prevents cyberattacks by securing passwords, protecting endpoints,
   and controlling application access. Thycotic is one of the world’s
   fastest-growing IT security companies because we provide customers with the
   freedom to choose cloud or on-premise software solutions that are the easiest
   to implement and use in the industry. Thycotic has grown to serve more than
   12,500 customers.
   
   www.thycotic.com
 * WordPress Carousel Free Version
   
   
   Relentless protection. Resilient world.
   
   Mimecast (NASDAQ: MIME) was born in 2003 with a focus on delivering
   relentless protection. Each day, we take on cyber disruption for our tens of
   thousands of customers around the globe; always putting them first, and never
   giving up on tackling their biggest security challenges together. We are the
   company that built an intentional and scalable design ideology that solves
   the number one cyberattack vector – email. We continuously invest to
   thoughtfully integrate brand protection, security awareness training, web
   security, compliance and other essential capabilities. Mimecast is here to
   help protect large and small organizations from malicious activity, human
   error and technology failure; and to lead the movement toward building a more
   resilient world. Learn more about us at www.mimecast.com.
   
   www.mimecast.com

 * Today more than ever, people demand seamless, secure experiences, whether
   they’re crossing borders, making a purchase, accessing e-government services
   or logging into corporate networks. Entrust offers an unmatched breadth of
   digital security and credential issuance solutions at the very heart of all
   these interactions. With more than 2,500 colleagues, a network of global
   partners, and customers in over 150 countries, it’s no wonder the world’s
   most entrusted organizations trust us.
   
   www.entrust.com
 * WordPress Carousel Free Version
   
   
   From the CISO to the analyst, Exabeam helps security teams outsmart the odds
   by adding intelligence to their existing security tools – including SIEMs,
   XDRs, cloud data lakes and hundreds of other business and security products.
   Out-of-the-box use case coverage delivers repeatable outcomes. Behavioral
   analytics allows security teams to detect compromised and malicious users
   that were previously difficult, or impossible, to find. And alert enhancement
   and automated timeline creation help overcome staff shortages by minimizing
   false positives and reducing the time it takes analysts to detect, triage,
   investigate and respond to incidents by 51 percent.
   
   www.exabeam.com

 * Since creating the first laptop case more than 30 years ago, Targus has
   continued to advance the mobile accessories category with cutting-edge,
   quality-made, productivity-boosting solutions. Compatible with major OEM
   brands, our carrying cases, universal docking stations, privacy screens, and
   peripherals enable an ever-changing workforce to perform at their best
   anytime, anywhere. Discover why organizations are choosing Targus, proven
   market leader and trusted partner of SMBs and Fortune 1000 businesses
   worldwide.
   
   www.targus.com
 * WordPress Carousel Free Version
   
   
   Thycotic prevents cyberattacks by securing passwords, protecting endpoints,
   and controlling application access. Thycotic is one of the world’s
   fastest-growing IT security companies because we provide customers with the
   freedom to choose cloud or on-premise software solutions that are the easiest
   to implement and use in the industry. Thycotic has grown to serve more than
   12,500 customers.
   
   www.thycotic.com

 * Relentless protection. Resilient world.
   
   Mimecast (NASDAQ: MIME) was born in 2003 with a focus on delivering
   relentless protection. Each day, we take on cyber disruption for our tens of
   thousands of customers around the globe; always putting them first, and never
   giving up on tackling their biggest security challenges together. We are the
   company that built an intentional and scalable design ideology that solves
   the number one cyberattack vector – email. We continuously invest to
   thoughtfully integrate brand protection, security awareness training, web
   security, compliance and other essential capabilities. Mimecast is here to
   help protect large and small organizations from malicious activity, human
   error and technology failure; and to lead the movement toward building a more
   resilient world. Learn more about us at www.mimecast.com.
   
   www.mimecast.com
   




WordPress Carousel Plugin


 * WordPress Carousel Free Version
   
   
   Darktrace is the world’s leading cyber AI company and the creator of
   Autonomous Response technology.
   
   Its self-learning AI is modeled on the human immune system and used by over
   3,000 organizations to protect against threats to the cloud, email, IoT,
   networks and industrial systems. This includes insider threat, industrial
   espionage, IoT compromises, zero-day malware, data loss, supply chain risk
   and long-term infrastructure vulnerabilities.
   
   The company has over 1,000 employees, 44 global offices and headquarters in
   San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back
   against a cyber-threat, preventing it from causing damage.
   
   www.darktrace.com

 * Axway gives heritage IT infrastructure new life, helping more than 11,000
   customers worldwide build on what they already have to digitally transform,
   add new business capabilities, and drive growth.
   
   With our Amplify API Management Platform —the only open, independent platform
   for managing and governing APIs across teams, the hybrid cloud, and
   third-party solutions — we help companies move forward faster, reach new
   markets, and create brilliant digital experiences.
   
   Our MFT and B2B integration solutions have been trusted for 20 years. Axway
   (Euronext: AXW.PA) employs over 1,800 people in 18 countries.
   
   www.axway.com
 * WordPress Carousel Free Version
   
   We focus on helping our clients understand the security vulnerabilities of
   their networks, applications, premises and people.
   www.hacktive.io

 * MetricStream, the independent market leader in enterprise and cloud
   applications for Governance, Risk, Compliance (GRC) and Quality Management,
   makes GRC simple.
   
   MetricStream apps improve business performance by strengthening risk
   management, corporate governance, regulatory compliance, vendor governance,
   and quality management for hundreds of thousands of users in dozens of
   industries, including Financial Services, Healthcare, Life Sciences, Energy
   and Utilities, Food, Retail, CPG, Government, Hi-Tech and Manufacturing.
   
   MetricStream is headquartered in Palo Alto, California, with an operations
   and R&D center in Bangalore, India, and sales and operations support in 12
   other cities globally.
   
   www.metricstream.com
 * WordPress Carousel Free Version
   
   
   Axonius is the cybersecurity asset management platform that gives
   organizations a comprehensive asset inventory, uncovers security solution
   coverage gaps, and automatically validates and enforces security policies. By
   seamlessly integrating with over 300 security and management solutions,
   Axonius is deployed in minutes, improving cyber hygiene immediately. Covering
   millions of devices at customers like the New York Times, Schneider Electric,
   Landmark Health, AppsFlyer, and many more, Axonius was named the Most
   Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was
   named to the CNBC Upstart 100 list and Forbes 20 Rising Stars.
   
   www.axonius.com

 * Darktrace is the world’s leading cyber AI company and the creator of
   Autonomous Response technology.
   
   Its self-learning AI is modeled on the human immune system and used by over
   3,000 organizations to protect against threats to the cloud, email, IoT,
   networks and industrial systems. This includes insider threat, industrial
   espionage, IoT compromises, zero-day malware, data loss, supply chain risk
   and long-term infrastructure vulnerabilities.
   
   The company has over 1,000 employees, 44 global offices and headquarters in
   San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back
   against a cyber-threat, preventing it from causing damage.
   
   www.darktrace.com
 * WordPress Carousel Free Version
   
   
   Axway gives heritage IT infrastructure new life, helping more than 11,000
   customers worldwide build on what they already have to digitally transform,
   add new business capabilities, and drive growth.
   
   With our Amplify API Management Platform —the only open, independent platform
   for managing and governing APIs across teams, the hybrid cloud, and
   third-party solutions — we help companies move forward faster, reach new
   markets, and create brilliant digital experiences.
   
   Our MFT and B2B integration solutions have been trusted for 20 years. Axway
   (Euronext: AXW.PA) employs over 1,800 people in 18 countries.
   
   www.axway.com
 * We focus on helping our clients understand the security vulnerabilities of
   their networks, applications, premises and people.
   www.hacktive.io
 * WordPress Carousel Free Version
   
   
   MetricStream, the independent market leader in enterprise and cloud
   applications for Governance, Risk, Compliance (GRC) and Quality Management,
   makes GRC simple.
   
   MetricStream apps improve business performance by strengthening risk
   management, corporate governance, regulatory compliance, vendor governance,
   and quality management for hundreds of thousands of users in dozens of
   industries, including Financial Services, Healthcare, Life Sciences, Energy
   and Utilities, Food, Retail, CPG, Government, Hi-Tech and Manufacturing.
   
   MetricStream is headquartered in Palo Alto, California, with an operations
   and R&D center in Bangalore, India, and sales and operations support in 12
   other cities globally.
   
   www.metricstream.com

 * Axonius is the cybersecurity asset management platform that gives
   organizations a comprehensive asset inventory, uncovers security solution
   coverage gaps, and automatically validates and enforces security policies. By
   seamlessly integrating with over 300 security and management solutions,
   Axonius is deployed in minutes, improving cyber hygiene immediately. Covering
   millions of devices at customers like the New York Times, Schneider Electric,
   Landmark Health, AppsFlyer, and many more, Axonius was named the Most
   Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was
   named to the CNBC Upstart 100 list and Forbes 20 Rising Stars.
   
   www.axonius.com
   




WordPress Carousel Plugin


 * WordPress Carousel Free Version
   
   
   BeyondTrust is the worldwide leader in Privileged Access Management, offering
   the most seamless approach to preventing data breaches related to stolen
   credentials, misused privileges, and compromised remote access.
   
   Our extensible platform empowers organizations to easily scale privilege
   security as threats evolve across endpoint, server, cloud, DevOps, and
   network device environments. BeyondTrust unifies the industry’s broadest set
   of privileged access capabilities with centralized management, reporting, and
   analytics, enabling leaders to take decisive and informed actions to defeat
   attackers. Our holistic platform stands out for its flexible design that
   simplifies integrations, enhances user productivity, and maximizes IT and
   security investments.
   
   BeyondTrust gives organizations the visibility and control they need to
   reduce risk, achieve compliance objectives, and boost operational
   performance. We are trusted by 20,000 customers, including half of the
   Fortune 100, and a global partner network. Learn more at www.beyondtrust.com.
   
   www.beyondtrust.com

 * The Synopsys difference
   
   Synopsys helps development teams build secure, high-quality software,
   minimizing risks while maximizing speed and productivity.
   
   Synopsys, a recognized leader in application security, provides static
   analysis, software composition analysis, and dynamic analysis solutions that
   enable teams to quickly find and fix vulnerabilities and defects in
   proprietary code, open source components, and application behavior.
   
   https://www.synopsys.com/
 * WordPress Carousel Free Version
   
   
   Palo Alto Networks, the global cybersecurity leader, is shaping the
   cloud-centric future with technology that is transforming the way people and
   organizations operate. Our mission is to be the cybersecurity partner of
   choice, protecting our digital way of life. We help address the world's
   greatest security challenges with continuous innovation that seizes the
   latest breakthroughs in artificial intelligence, analytics, automation, and
   orchestration. By delivering an integrated platform and empowering a growing
   ecosystem of partners, we are at the forefront of protecting tens of
   thousands of organizations across clouds, networks, and mobile devices. Our
   vision is a world where each day is safer and more secure than the one
   before. For more information, visit www.paloaltonetworks.com.
   
   www.paloaltonetworks.com

 * The Accellion kiteworks content firewall prevents data breaches and
   compliance violations from third party cyber risk. CIOs and CISOs rely on the
   Accellion platform for complete visibility, security and control over the
   communication of IP, PII, PHI, and other sensitive content across email, file
   sharing, mobile, enterprise apps, web portals, SFTP, and automated
   inter-business workflows. By consolidating security across third party
   communication channels, the Accellion content firewall simplifies complex
   infrastructure and reduces costs, while improving the user experience. When
   employees click the Accellion button, they know it’s the safe, secure way to
   share sensitive information with the outside world.
   
   With on-premise, private cloud, hybrid and FedRAMP deployment options, the
   Accellion content firewall provides the security and governance CISOs need to
   protect their organizations, mitigate risk, and adhere to rigorous compliance
   regulations such as NIST 800-171, HIPAA, SOX, GDPR, CCPA, GLBA, and FISMA.
   Accellion solutions have protected more than 25 million end users at more
   than 3,000 global corporations and government agencies, including NYC Health
   + Hospitals; KPMG; Kaiser Permanente; AVL; American Automobile Association
   (AAA); Tyler Technologies; and the National Institute for Standards and
   Technology (NIST).
   
   www.accellion.com
 * WordPress Carousel Free Version
   
   
   BeyondTrust is the worldwide leader in Privileged Access Management, offering
   the most seamless approach to preventing data breaches related to stolen
   credentials, misused privileges, and compromised remote access.
   
   Our extensible platform empowers organizations to easily scale privilege
   security as threats evolve across endpoint, server, cloud, DevOps, and
   network device environments. BeyondTrust unifies the industry’s broadest set
   of privileged access capabilities with centralized management, reporting, and
   analytics, enabling leaders to take decisive and informed actions to defeat
   attackers. Our holistic platform stands out for its flexible design that
   simplifies integrations, enhances user productivity, and maximizes IT and
   security investments.
   
   BeyondTrust gives organizations the visibility and control they need to
   reduce risk, achieve compliance objectives, and boost operational
   performance. We are trusted by 20,000 customers, including half of the
   Fortune 100, and a global partner network. Learn more at www.beyondtrust.com.
   
   www.beyondtrust.com

 * The Synopsys difference
   
   Synopsys helps development teams build secure, high-quality software,
   minimizing risks while maximizing speed and productivity.
   
   Synopsys, a recognized leader in application security, provides static
   analysis, software composition analysis, and dynamic analysis solutions that
   enable teams to quickly find and fix vulnerabilities and defects in
   proprietary code, open source components, and application behavior.
   
   https://www.synopsys.com/
 * WordPress Carousel Free Version
   
   
   Palo Alto Networks, the global cybersecurity leader, is shaping the
   cloud-centric future with technology that is transforming the way people and
   organizations operate. Our mission is to be the cybersecurity partner of
   choice, protecting our digital way of life. We help address the world's
   greatest security challenges with continuous innovation that seizes the
   latest breakthroughs in artificial intelligence, analytics, automation, and
   orchestration. By delivering an integrated platform and empowering a growing
   ecosystem of partners, we are at the forefront of protecting tens of
   thousands of organizations across clouds, networks, and mobile devices. Our
   vision is a world where each day is safer and more secure than the one
   before. For more information, visit www.paloaltonetworks.com.
   
   www.paloaltonetworks.com

 * The Accellion kiteworks content firewall prevents data breaches and
   compliance violations from third party cyber risk. CIOs and CISOs rely on the
   Accellion platform for complete visibility, security and control over the
   communication of IP, PII, PHI, and other sensitive content across email, file
   sharing, mobile, enterprise apps, web portals, SFTP, and automated
   inter-business workflows. By consolidating security across third party
   communication channels, the Accellion content firewall simplifies complex
   infrastructure and reduces costs, while improving the user experience. When
   employees click the Accellion button, they know it’s the safe, secure way to
   share sensitive information with the outside world.
   
   With on-premise, private cloud, hybrid and FedRAMP deployment options, the
   Accellion content firewall provides the security and governance CISOs need to
   protect their organizations, mitigate risk, and adhere to rigorous compliance
   regulations such as NIST 800-171, HIPAA, SOX, GDPR, CCPA, GLBA, and FISMA.
   Accellion solutions have protected more than 25 million end users at more
   than 3,000 global corporations and government agencies, including NYC Health
   + Hospitals; KPMG; Kaiser Permanente; AVL; American Automobile Association
   (AAA); Tyler Technologies; and the National Institute for Standards and
   Technology (NIST).
   
   www.accellion.com
   




WordPress Carousel Plugin



BECOME A SPONSOR

CLICK HERE



OUR PARTNERS


 * WordPress Carousel Free Version
   
   APAC CIOoutlook is a print magazine that aims to provide a platform for CIOs,
   CTOs and other senior levels IT buyers and decision makers along with CXOs of
   solution providers to share their experiences, wisdom and advice with
   enterprise IT community of APAC countries. We promote our unique 'learn from
   our peers approach' in the Asia Pacific region. From enterprise applications
   to the leading trends in big data, mobile computing, security and the Cloud,
   APAC CIOoutlook delivers practical, actionable information from senior
   practitioners in the trenches. We leverage our extensive peer-to-peer
   network, among leading technology executives, to bring their experience and
   the best practices to other members of the CIO community in Asia Pacific
   countries. We also identify and profile emerging companies providing cutting
   edge solutions to enterprises in APAC. For every technology and every
   industry vertical, our research team has access to and has deep background
   research done on hundreds of vendors providing solutions in APAC. Published
   from the hub of technology, Silicon Valley, USA.
   www.apacciooutlook.com

 * Business Chief, formally known as Business Review Magazines, is a media brand
   fit for the digital age, providing cutting-edge content tailored for company
   executives, business pioneers and industry thinkers.
   
   Divided into eight separate regional titles, Business Chief tells the stories
   that matter to business leaders and professionals on their way to the top.
   Through our expertly-crafted digital magazines, websites, videos and social
   media, those stories reach the right people.
   
   Our flagship features are the Leadership Showcases; exclusive interviews with
   key decision-makers at some of the biggest companies on the globe,
   documenting their journeys to business transformation and the lessons they’ve
   learned along the way.
   
   With further themes focused on technology, talent and sustainability,
   Business Chief has insight on the trends that matter to C and V-level
   executives, while also delivering consumer-friendly lifestyle content to
   reflect their interests and wider ambitions.
   
   On top of all that and more, Business Chief showcases in-depth digital
   reports on companies every month, ensuring it covers every angle in the world
   of business.
   
   www.businesschief.com
 * WordPress Carousel Free Version
   
   
   CISO MAG is the handbook for Chief Information Security Officer (CISO)s,
   CXOs, and every stakeholder of safe internet. To provide the cybersecurity
   experts key information and analysis to tackle the security challenges,
   EC-Council created CISO MAG, an information security magazine for best
   practices, trends, and news. For all the latest happening in cyber security
   space, visit our site: www.cisomag.com Follow us on LinkedIn for all the
   latest news & updates. Preview & Subscribe for our latest issue here
   
   www.cisomag.com

 * Gigabit is a digital information and media platform for executives and
   leaders, providing expert insight into the ever expanding space occupied by
   technology in business.
   
   Packed with deep features and insight from key leaders in business, Gigabit
   content can be found online or via our exclusive digital magazine,
   distributed monthly to a select membership of industry leaders around the
   world.
   
   Technological innovation is now an inescapable facet of business across all
   industries, and Gigabit serves up a diet of cutting-edge insight via
   exclusive interviews with CIOs, CTOs and Heads of IT from some of the world’s
   most influential companies.
   
   Gigabit is here to answer and, perhaps more importantly, ask the questions
   that enterprises need to answer in addressing the challenges and
   opportunities a dynamic and changing technological landscape represent.
   
   www.gigabitmagazine.com
 * WordPress Carousel Free Version
   
   APAC CIOoutlook is a print magazine that aims to provide a platform for CIOs,
   CTOs and other senior levels IT buyers and decision makers along with CXOs of
   solution providers to share their experiences, wisdom and advice with
   enterprise IT community of APAC countries. We promote our unique 'learn from
   our peers approach' in the Asia Pacific region. From enterprise applications
   to the leading trends in big data, mobile computing, security and the Cloud,
   APAC CIOoutlook delivers practical, actionable information from senior
   practitioners in the trenches. We leverage our extensive peer-to-peer
   network, among leading technology executives, to bring their experience and
   the best practices to other members of the CIO community in Asia Pacific
   countries. We also identify and profile emerging companies providing cutting
   edge solutions to enterprises in APAC. For every technology and every
   industry vertical, our research team has access to and has deep background
   research done on hundreds of vendors providing solutions in APAC. Published
   from the hub of technology, Silicon Valley, USA.
   www.apacciooutlook.com

 * Business Chief, formally known as Business Review Magazines, is a media brand
   fit for the digital age, providing cutting-edge content tailored for company
   executives, business pioneers and industry thinkers.
   
   Divided into eight separate regional titles, Business Chief tells the stories
   that matter to business leaders and professionals on their way to the top.
   Through our expertly-crafted digital magazines, websites, videos and social
   media, those stories reach the right people.
   
   Our flagship features are the Leadership Showcases; exclusive interviews with
   key decision-makers at some of the biggest companies on the globe,
   documenting their journeys to business transformation and the lessons they’ve
   learned along the way.
   
   With further themes focused on technology, talent and sustainability,
   Business Chief has insight on the trends that matter to C and V-level
   executives, while also delivering consumer-friendly lifestyle content to
   reflect their interests and wider ambitions.
   
   On top of all that and more, Business Chief showcases in-depth digital
   reports on companies every month, ensuring it covers every angle in the world
   of business.
   
   www.businesschief.com
 * WordPress Carousel Free Version
   
   
   CISO MAG is the handbook for Chief Information Security Officer (CISO)s,
   CXOs, and every stakeholder of safe internet. To provide the cybersecurity
   experts key information and analysis to tackle the security challenges,
   EC-Council created CISO MAG, an information security magazine for best
   practices, trends, and news. For all the latest happening in cyber security
   space, visit our site: www.cisomag.com Follow us on LinkedIn for all the
   latest news & updates. Preview & Subscribe for our latest issue here
   
   www.cisomag.com

 * Gigabit is a digital information and media platform for executives and
   leaders, providing expert insight into the ever expanding space occupied by
   technology in business.
   
   Packed with deep features and insight from key leaders in business, Gigabit
   content can be found online or via our exclusive digital magazine,
   distributed monthly to a select membership of industry leaders around the
   world.
   
   Technological innovation is now an inescapable facet of business across all
   industries, and Gigabit serves up a diet of cutting-edge insight via
   exclusive interviews with CIOs, CTOs and Heads of IT from some of the world’s
   most influential companies.
   
   Gigabit is here to answer and, perhaps more importantly, ask the questions
   that enterprises need to answer in addressing the challenges and
   opportunities a dynamic and changing technological landscape represent.
   
   www.gigabitmagazine.com
   




WordPress Carousel Plugin


 * WordPress Carousel Free Version
   
   
   ITUpdate is an online publication of IT vendor releases. Its aim is to bring
   you the very latest releases directly from the vendor. Currently, it has
   listed the Top 250 leading Global IT vendors in the market today. ITUpdate is
   owned by Inform Group Pty Ltd and Australian Pty Ltd company ABN: 63 103 190
   781. Inform Group Pty Ltd has been successfully working in the IT industry
   for nearly 20 years. Our head office is in Sydney, Australia and we have
   additional offices in Melbourne, Singapore, and Manila.
   
   www.itupdate.com.au

 * CIO Tech Asia is an online news and media platform that allows it's readers
   to stay up to date with the latest insights and stories that are shaping the
   technology landscape across Asia.
   
   ciotechasia.com
 * WordPress Carousel Free Version
   
   
   ITUpdate is an online publication of IT vendor releases. Its aim is to bring
   you the very latest releases directly from the vendor. Currently, it has
   listed the Top 250 leading Global IT vendors in the market today. ITUpdate is
   owned by Inform Group Pty Ltd and Australian Pty Ltd company ABN: 63 103 190
   781. Inform Group Pty Ltd has been successfully working in the IT industry
   for nearly 20 years. Our head office is in Sydney, Australia and we have
   additional offices in Melbourne, Singapore, and Manila.
   
   www.itupdate.com.au

 * CIO Tech Asia is an online news and media platform that allows it's readers
   to stay up to date with the latest insights and stories that are shaping the
   technology landscape across Asia.
   
   ciotechasia.com
   




WordPress Carousel Plugin




VENUE

CROWN CONFERENCE CENTRE, MELBOURNE



Crown Conference Centre
Crown Promenade, Crown Melbourne, 8 Whiteman Street, Southbank VIC 3006,
Australia
Telephone: +61-3-9292-6222
Contact: Click here

More Information


Gelände












Kurzbefehle
KartendatenKartendaten © 2021 Google
Nutzungsbedingungen
Fehler bei Google Maps melden
Kartendaten © 2021 Google




GET YOUR VIP TICKET

CLICK HERE

Connect With Us


 

Quick Links
 * * Speakers
   * Why Attend?
   * Program
   * Sponsors
   * Venue
   * Register
   * Contact



 
View a full list of all our events


Get in touch

AUSTRALIA

Level 2, 146 Arthur Street,
North Sydney, NSW 2060
Australia

T: +61 2 8188 8535

SINGAPORE

Level 30, Six Battery Road,
Singapore 049909

T: +65 6725 6324

USA

Suite 2710, 101 California Street,
San Francisco CA 94111,
USA

T: +1 415 633 8846



Copyright 2021 ©Focus Network. All rights reserved


REGISTER

If you are looking to join the upcoming gathering and would like to receive
further information, please fill in your details below and one of our team will
be in contact with you shortly.

Which location:*
Please SelectMelbourneSydneyBoth
Interested in*
Please SelectDelegateSponsorSpeakerPartner
Message*








x


REGISTER


If you wish to become a sponsor for the upcoming event, please complete your
details below and one of our team will be in contact with you shortly.

Which location:
Please SelectMelbourneSydneyBoth





x

Should you wish to attend this year’s upcoming 8th Australian CISO Leaders
Summit on the 1st of March 2022, at the Crown Conference Centre, Melbourne, as
one of our free VIP guests, you must complete the following Registration form
and submit it back.

Once this form has been submitted you will then receive a confirmation email
with further details around your participation

As a VIP Guest your ticket will include:

 * Access to all workshops, keynotes and roundtable presentations
 * All food and beverages included for duration of the summit
 * 1 x pass to official networking drinks on the 1stth March
 * Opportunity to set up business meetings with suppliers
 * Access to all slides/ presentations from the day

Please note that this free VIP pass will only be provided to non vendor specific
supplier companies within the industry. Should your company offer a product or
service in this sector you will not be allowed to join as a free VIP guest and
will need to pay a fee.

 

click here

x


REGISTER


x


2019 POST EVENT REPORT

Please enter your full name and email address in the form below and a link will
be sent to you to download the pdf:
[email-download-link namefield=”YES” id=”2″]
x

x

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed a leo quis purus
feugiat facilisis. Interdum et malesuada fames ac ante ipsum primis in faucibus.
Aliquam quis elit tristique, efficitur enim viverra, consequat odio. Duis porta
ipsum ut magna dignissim vestibulum. Ut finibus augue nec mi maximus, nec
laoreet arcu sagittis. Fusce pellentesque ipsum non lobortis bibendum. Sed
consectetur dolor et ligula venenatis facilisis.

http://focusnetwork.co/ohsleaders.com.au/

X

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed a leo quis purus
feugiat facilisis. Interdum et malesuada fames ac ante ipsum primis in faucibus.
Aliquam quis elit tristique, efficitur enim viverra, consequat odio. Duis porta
ipsum ut magna dignissim vestibulum. Ut finibus augue nec mi maximus, nec
laoreet arcu sagittis. Fusce pellentesque ipsum non lobortis bibendum. Sed
consectetur dolor et ligula venenatis facilisis.

http://focusnetwork.co/ohsleaders.com.au/

X

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed a leo quis purus
feugiat facilisis. Interdum et malesuada fames ac ante ipsum primis in faucibus.
Aliquam quis elit tristique, efficitur enim viverra, consequat odio. Duis porta
ipsum ut magna dignissim vestibulum. Ut finibus augue nec mi maximus, nec
laoreet arcu sagittis. Fusce pellentesque ipsum non lobortis bibendum. Sed
consectetur dolor et ligula venenatis facilisis.

http://focusnetwork.co/ohsleaders.com.au/

X
The requested content cannot be loaded.
Please try again later.






The requested content cannot be loaded.
Please try again later.






The requested content cannot be loaded.
Please try again later.






The requested content cannot be loaded.
Please try again later.






The requested content cannot be loaded.
Please try again later.






The requested content cannot be loaded.
Please try again later.






The requested content cannot be loaded.
Please try again later.






The requested content cannot be loaded.
Please try again later.