Data breaches are the new normal. We've created ecosystems with so many moving parts and so many complex units, it's little wonder that we so frequently see them go wrong. A combination of more systems, more people, more devices and more ways than ever of producing and publishing data stack the odds in favour of attackers breaching more systems than ever.
In this talk, you'll get a look inside the world of data breaches based on my experiences dealing with billions of breached records. You'll see what's motivating hackers, how they're gaining access to data and how organisations are dealing with the aftermath of attacks. Most importantly, it will help you contextualise these incidents and understand both what these attacks actually look like and how to defend against them in your organisation.
Speaker: Troy Hunt
For the last 20 years, the security industry has relied on a standard ‘security blueprint’. You know the one: implement a security policy, deploy some firewalls, put in a DLP, spray some anti-virus around your endpoints, build a SOC and monitor it. It’s been an effective approach to preventing the kinds of threats common in the late 1990’s and early 2000s. However, with the dramatic rise in large-scale and very public cyber-attacks, it’s effectiveness against current threats is questionable at best.
We need a new approach, a new way of looking at cyber security that is more adaptive to change and focused on threats and assets rather than the network perimeter. Creativity and innovation are key to this new approach, and cyber security teams need to be in lock-step with technology and their business. Security can no longer be bolted on – it needs to be part of every business’s DNA.
Speaker: Mark Sayer, Former Head of Security Strategy & Architecture, National Australia Bank
Hear from Mike about cyber risks associated with emerging technologies, the opportunities for the Australian cyber security industry and thinking beyond the tech - what really matters?
Speaker: Mike Bareja, National Network Program Manager, AustCyber
Strategy & Insight Session: Insights from VMware: Security Policy and Service Automation – Just say “Yes!”
Often the potential business impact of a security breach is widely understood.
Yet when it comes to actually designing, implementing and monitoring security policy and services, there's a view that it's the responsibility of a single person or team. When it comes to securing your company's sensitive data, everyone has a role to play: security architects, infrastructure operators, and software developers alike.
Come and learn how automating application-centric security policy using VMware technology makes life easier for everyone. Don't be a roadblock; just say "yes!"
Dale Shaw, Systems Engineer, Networking & Security, VMware
Andrew Obersnel, Senior Systems Engineer, Networking and Security Business Unit, VMware
Insights from Palo Alto Networks: Securing Multi-Cloud Beyond Layer 4
Security policy lifecycle management, automated security actions based on observed security events and protecting multiple NSX deployments are some of the key challenges facing network and security teams. With the general availability the latest versions of our products, network and security teams now have a simple, automated security management platform for managing and enforcing security policies within VMware NSX enabled software defined data centres.
This session will provide an advanced technical overview of recent enhancements including:
Insights from VMware: Increase Application Security with AppDefense & NSX™
The biggest obstacle in security may well be an architectural gap between the apps and data we must protect and the infrastructure in which we place controls. The cloud represents an opporutnity to architect in security rather than bolt it on.
The question is no longer "How do I secure the cloud?" "but rather "How can I leverage the unique opportunities of the cloud to transform security?"
Micro-segmentation opened the door, enabling us to see and control the infrastructure through the lens of the application to prevent security breaches. This application-centric approach is now being extended up the stack to detect anomalies in applications and execute automated responses to threats.
Speaker:Harman Nagra, Systems Engineer, Networking & Security, VMware
Insights from Trend Micro: Automated Security for the Real-Time Enterprise
Understand how automation and security go hand-in-hand from visibility and context through to risk assessment, protection and security maintenance.
In today's real-time enterprise where we all must do more with less, the operations team is sometimes forced to take shortcuts. Forgetting to manually apply security controls is often one of the first tasks to fall by the wayside. Applications are often put into production, lacking adequate protection and leaving high-risk vulnerabiilties for exploitation.
This session focuses on how to get the right security at the right time and integrate this into your everyday DevOps environment.
Speaker: Mick McCluney, Technical Lead, Trend Micro
Insights from VMware: A Modern Security Policy Design with VMware NSX – A Customer Perspective
Join us for a customer interview on how NSX has been used in their environment, specifically focusing on security related projects such as micro-segmentation, and more.
This session will help you discover why our customers chose NSX, including the factors they considered as well as how they architected their environments and implemented the technology.
Raymond Maisano, Director, Networking & Security - VMware
Eugene Ostapenko, Manager, Information Security - VicTrack
Insights from Fortinet:
How Expert Systems with Deep Learning Are Changing the Face of Security
Nate Cochrane, Founder & CEO Pixntxt Content Lab
Bruce Davie, VP & CTO, VMware APJ
Mark Sayer, Innovative Cyber Security Executive
Andrew Guerra, Security Offering Manager, IBM Cloud for VMware Solutions
Adi Ashkenazy, VP Product & GM APAC at XM
James Turner, Advisor, IBRS