Skip to main content
Cookies Policy
Detailed information on the use of cookies on this website is provided in our Privacy Policy. By closing this message and proceeding, you consent to our use of cookies in accordance with our Cookies Policy.
x
  • CONTACT US
  • icon-facebook
  • icon-linkedin
  • icon-twitter

ACS Half Day Summit: What's new in Cyber Security?

The Cyber Security Summit is a half day multi speaker event aimed at providing ICT professionals with contemporary, industry leading knowledge and skills on how to implement best practice cyber security.

Registration End Date: Wed, 26 Feb, 08:30 AM

Completed
  • where

  • Technology Park Function Centre (Seminar Room 2)
    2 Brodie-Hall Drive
    Bentley WA 6102
  • when

  • Event Start: Wed, 26 Feb, 08:30 AM
    Event Finish: Wed, 26 Feb, 12:00 PM
  • event price

  • -

<img alt="Cyber Security Pic" src="https://id.acs.org.au/servlet/rtaImage?eid=7010o000001ezsx&amp;feoid=00N9000000EVCh7&amp;refid=0EM0o000001g3CW" style="height: 333px; width: 500px;"></img><br><br><u><b>SPECIAL OFFER</b></u><br>Join as a new full fee member and receive a complementary registration for this event. <a href="https://www.acs.org.au/membership-application.html?q=1" target="_blank">Click here to join as member.</a><br>Email <a href="mailto:[email protected]" target="_blank">[email protected]</a> to claim your free registration.<br><br>The half day summit will provide delegates with an update on the latest tools, technology and practices in Cyber Security. There will be three sessions covering the following topics: -<br><br><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><b>Session 1:  Latest development in ISMS (Information Security Management System) - Presented by Terry Walsh</b></span></span> <ul><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">What makes up a security program (ISMS)?</span></span></li><li><font face="Calibri, sans-serif"><span style="font-size: 11pt;">What is needed to have a true </span><span style="font-size: 14.6667px;">defence</span><span style="font-size: 11pt;"> in depth strategy?</span></font></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Information security management system (ISMS)</span></span></li></ul> <span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><b>Session 2: Securing our Digital Future - Presented by Tony Marceddo and Mike Johnstone</b></span></span> <ul><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Cyber Security – concerns, trends and facts (the last 12 months) </span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Changing shape of research </span></span> <ul><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Critical infrastructure</span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Digital Forensics</span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Secure Systems </span></span></li></ul> </li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Case studies </span></span> <ul><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Shipping</span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Drones</span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Anti-Machine Learning</span></span></li></ul> </li></ul> <span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><b>Session 3: SOAR as a service (Protect, Detect, Respond) - Presented by Adam Bennett</b></span></span> <ul><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Does your organisation need it?</span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">SOAR as a service - how it’s not just about protection but detection and response</span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">How do end customers put this into practice?</span></span></li></ul> <br><b>PROUDLY SUPPORTED BY</b><br><a href="https://redpiranha.net/" target="_blank"><img alt="User-added image" src="https://id.acs.org.au/servlet/rtaImage?eid=7010o000001ezsx&amp;feoid=00N9000000EVCh7&amp;refid=0EM0o000001gt7I"></img></a><br><br><img alt="User-added image" src="https://id.acs.org.au/servlet/rtaImage?eid=7010o000001ezsx&amp;feoid=00N9000000EVCh7&amp;refid=0EM0o000001gt7c"></img>

AGENDA

 SCHEDULE  ACTIVITY
 08:30 AM - 09:00 AM  Registration Open                          
 09:00 AM - 09:15 AM  Opening Address                          
 09:15 AM - 09:50 AM  Session 1 - Latest development in ISMS (Information Security Management System)                          
 09:50 AM - 10:15 AM  Morning Tea                          
 10:15 AM - 11:00 AM  Session 2 - Securing our Digital Future                          
 11:00 AM - 11:45 AM  Session 3 - SOAR as a service (Protect, Detect, Respond)                          
 11:45 AM - 12:00 PM  Event Close                          

Contact Details

Share this event:

CPD HOURS

3

SFIA Category

Penetration testing (PENT) - 4

Speaker

Adam Bennett

Adam Bennett

Adam Bennett, CEO at Red Piranha
Both a professional project manager and ethical hacker, Adam has studied Computer Science and Information Security at AMTC, MIT, and Charles Sturt University. With over 20 years in professional management – a decade of those spent in the security and risk management industry – Adam has previously held positions on the board of Australian listed public companies and is the chair of the business development committee of Electronic Frontiers Australia; he is also a member of the Linux Foundation, ISACA. Adam now sits at the helm of Red Piranha, Australia’s only dedicated next-generation firewall manufacturer (United Threat Management solutions).

Show More

Speaker

Mike Johnstone

Mike Johnstone

Mike Johnstone, Associate Professor at ECU
Mike is an Associate Professor at the School of Science at Edith Cowan University where he teaches secure programming and advanced software engineering.  As a senior member of the Security Research Institute at ECU his work on resilient systems covers secure development methodologies, wireless sensor networks and the security of IoT devices with a focus on critical infrastructure. With over 30 years of experience in ICT, he provides consultancy services in cyber security for private industry, government and research organisations and has held various IT roles including programmer, systems analyst, project manager and network manager before moving to academia.

Mike serves on various cyber-related conference committees and is the current chair of the Australian Information Security Management conference.  He is also the theme lead for Network Forensics-Response to Emerging Threats in the Industry-driven, Federally-funded Cyber Security Co-operative Research Centre.

Show More

Speaker

Tony Marceddo

Tony Marceddo

Tony Marceddo, Director at Institute for Securing Digital Futures

Tony Marceddo as the Director leads the strategy and development of the Institute for Securing Digital Futures (ISDF), a new whole-of-institution interdisciplinary research institute that builds on ECU’s existing strengths in cyber security, digital forensics, network security, information warfare, and physical and infrastructure security. Tony has demonstrated his skills as a trusted business manager, and program director through over 30-years leadership experience spanning numerous industries including the Defence, Intelligence, Space, Cyber and Communication sectors. In his previous role, Tony served as General Manager of Vault Cloud, leading the development and implementation of Vault’s’ operational strategy and ensuring the smooth running of the governance of the company. Previously, Tony was General Manager of Australian Intelligence and Cyber Security at Northrop Grumman. He was responsible for the incorporation of M5 Network Security into Northrop Grumman operations. The integration included the delivery of key projects to the Defence industry.  Previously, Tony spent over 25 years working for Government in range of management roles in Defence Intelligence.
Tony’s achievements in the Defence and Intelligence sectors have been recognised by the Australian and United States Intelligence communities. Tony has been awarded a United States Intelligence Medallion and an Australian Intelligence Community Medallion.

Show More

Speaker

Terry Walsh

Terry Walsh

2 Brodie-Hall Drive,Bentley,WA,Australia

Recommended Events