Learn how to leverage machine learning and automation to improve cyber threat prevention and remediation, all while offering visibility to help you manage all endpoints.
There are four ways to mitigate risks. Accept, Avoid, Transfer, Reduce. Ransomware and other cyber attacks can never be accepted, completely avoided or transferred. The only way to reduce your exposure to Zero Day Threats is to focus on breach prevention. In the new location-independent and collaborative working environments of most organisations, how do we drive prevention-first security operations and culture?
In this summit series we will take you through the strategies required to protect your organisation from threats. – The importance of unifying your security management platform and a continuously evolving set of endpoints. – What hackers are doing next and how AI & ML is deployed to prevent attacks with speed and scale to meet future threats as they materialise. – Best practice for securing a Remote Workforce for the longer term. Case study examples.
30 minutes keynote presented by John E. McClurg, Senior Vice President & Chief Information Security Officer, Blackberry, followed by a 30 minutes CISO panel with Angela Donohoe, CIO, BPAY Group; Grant Lockwood, CISO, DHHS & James Turner, Founder, CISO Lens.
John. E McClurg – Senior Vice President & Chief Information Security Officer, BlackBerry
John McClurg serves as Senior Vice President & Chief Information Security Officer. He comes to Blackberry from Cylance where he served as Vice President & Ambassador-At-Large. He engages the industry around the globe on today’s risk challenges and how BlackBerry uniquely mitigates them with the application of AI & machine learning. Champions a move from a historically reactive security posture to one focused on proactively predicting and preventing future risks.
He came to Cylance from Dell where he served as its CSO, advancing responsibilities that included the strategic focus and tactical operations of Dell’s internal global security services, both physical and cyber. He was also charged with the advocacy of business resilience and security prowess generally, the seamless integration of Dell’s various security offerings, and with improving the effectiveness and efficiency of security initiatives, including Business Continuity and Disaster Recovery.
Jonathan Jackson, Director, Technical Solutions, APJ, BlackBerry
A staunch advocate of Data Protection and Privacy, Jonathan brings over two decades of tactical experience in the architecture, development and management of security solutions. Jonathan has been with BlackBerry for over 6 years and was the Head of Security Advisory for ANZ before assuming his current role. Prior to this, he worked with Nokia and Microsoft where he held a number of roles focusing on enterprise mobility.
Jonathan advises customers looking to navigate the daunting world of enterprise mobility and cyber threats, working with them to develop a mobile strategy that satisfies both the demands of IT and end users now and in the future. He has advised a number of large financial and government institutions on how to leverage the expanding capability of security solutions in driving end user productivity while protecting corporate data, assets and staff.
Angela Donohoe, Chief Information Officer, BPAY Group
Angela Donohoe is responsible for leading BPAY Group’s technology function including business focussed strategy, architecture, solutions, and operations that enable high quality and innovative technology and payments services.
Angela was appointed to the role of Chief Information Officer in 2016 and is a member of BPAY Group’s executive team. In this role, she has ownership and oversight of technology governance, IT brisk management and information security for BPAY Group.
Angela has more than 25 years’ experience in senior technology leadership roles in financial services and government including Revenue NSW, Cuscal, Societe Generale, and Bank of New York. Angela is a Fellow of CPA Australia and FINSIA, holds technology advisory roles, is a director of a not for profit childcare organisation, and is an active mentor and promoter of STEM careers for young women.
James Turner, Founder, CISO Lens
James Turner is the founder of CISO Lens, where he works with the security leaders from the largest organisations across Australia and New Zealand. James facilitates connections and collaboration, and helps share strategic information across organisations, industries and countries. Since 2005, James has specialised as a security industry analyst and advisor, gathering, curating and disseminating information that is of strategic importance to cyber risk management. In 2018 James launched the CISO Lens Benchmark, an annual report providing independent, local, and current information for local technology and security executives. In 2017, when working as an Advisor at IBRS, James established the CIO Cyber and Risk Network. Now, as an emeritus Advisor at IBRS, James continues to chair the gatherings of this group. In 2019, James was named an AustCyber AllStar. James also writes opinion pieces for the Australian Financial Review on national cyber security issues.
Grant Lockwood, Health Sector Chief Information Security Officer, Department of Health and Human Services
Grant Lockwood is the Chief Information Security Officer for the Victorian Public Healthcare Sector. His 20-ish year IT career has taken him from education to high performance sports to managed services before landing in public healthcare. His interest in tweaking systems “just to see what happens” has led to cybersecurity, where he now finds himself advising a range of hospitals and business on improving their security posture. His hobbies include skydiving, astrophysics, and lying in biographies.
The Power of Prevention: How to Defeat APT29 MITRE ATT&CK
How to Defeat APT29 MITRE ATT&CK Modern problems require modern solutions. Attackers prime targets originates on the endpoint with 70% of successful breaches. Enterprises today face an increasingly chaotic environment where cyberthreats are ever-more sophisticated and pervasive. At the same time, enterprise endpoints and the amount of data shared at the edge…