Summit

ACS Half Day Summit: A focus on Cyber Security Management

This is an in-person, face-to-face event being held in Perth, Western Australia. Please do not register for this event if you do not live in, or cannot travel to, Western Australia (WA). This event will NOT be available online.

Technology Park Function Centre (Theatre), 2 Brodie Hall Drive (Corner Hayman Road), Bentley, WA, 6102
Tue 15 Feb 2022 09:00 AM AWST
Duration: 3.0 hours
Register by Mon 14 Feb 2022 09:00 AM AWST
In Person
CPD Hours: 3
Skills Level: Information security (SCTY) -> Level 5

About this event

User-added image

Cyber crime is a constant threat and is a rapidly growing global challenge for individuals and businesses alike.

Join us at this in-person Cyber Security Summit, a half day multi speaker event providing ICT professionals with contemporary, industry leading knowledge and skills on how to implement best practice cyber security.

There will be three sessions covering the following topics: -

ASD CYBER SKILLS FRAMEWORK AND THE FUTURE OF AUSTRALIA'S CYBER SECURITY WORKFORCE - presented by Sheavy Kaur | IT Services Manager at NIT Australia

In September 2020, the federal government’s Australian Signals Directorate (ASD) released the Cyber Skills Framework. This framework defines the blueprint of Australia’s cyber skills workforce development as a part of the government’s Cyber Security Strategy 2020. 
 
This presentation will highlight the key aspects of the ASD Cyber Skills framework including: - 

  • How the recruitment of cyber security specialists aligns with the skills, knowledge, and attributes of national and international industry standards.
  • How businesses and organisations can use the Cyber Skills Framework as a comprehensive and standard reference source to help them better identify which cyber roles they may need to fill.
  • What capabilities and proficiency levels personnel recruited for the cyber security roles should possess.
  • Outline how Australian cyber security professionals can improve their knowledge, skills, and abilities, as well as the necessary learning, career, development, and certification steps they can take to meet their career goals and contribute to a safer and more secure cyber Australia.
The presentation will also cover the alignment of the Cyber Skills Framework with SFIA (Skills Framework for the Information Age). This information is relevant for professionals interested in cyber security; IT managers; CISOs; business leaders; and IT recruiters.

----------------------------------------------------------------------------------------------------------------------------------------------------

STEALTH + - CYBER SECURITY STRATEGY - presented by Adi Trehan | Technical Director and Mohit Arora | Principal Consultant at First Call IT

The concept of counter strategy has been in existence throughout all of history. Essentially it is a strategy that used to counter or negate another strategy. The strategy of stealth is used by many hackers to make malware inconspicuous where they hide any modifications made to an infected machine by a virus. This session will discuss the counter strategy called STEALTH + , which is a cyber security methodology aimed at making users invisible to hackers.

This session will cover: -

  • Vulnerabilities that make users visible to hackers
  • What is STEALTH +
  • Key components of STEALTH +
  • How to implement a STEALTH + strategy

--------------------------------------------------------------------------------------------------------------------

XDR  - AN ESSENTIAL COMPONENT TO HELP IMPLEMENT EFFECTIVE CYBER SECURITY MANAGEMENT - presented by Adam Bennett | Chief Executive Officer at Red Piranha Limited

Having the best cyber security tools and technology is by no means a guarantee of safety. Of equal importance is to ensure there is an accompanying management system. XDR (Extend Detection and Response) can work alongside a security management program that collects and automatically connects data across multiple security layers such you Security Monitoring and Incident Response management systems. This session will examine the importance of having XDR as part of a robust cyber security management system, and look at: -

  • Security Monitoring and Incident Response - a look at Compliance and Requirements by Frameworks
  • How does XDR (Extend Detection and Response) work?
  • How can XDR help automate incident response management systems to meet Compliance Frameworks?
User-added image

IMPORTANT NOTICE FOR ATTENDEES
Due to the importance of contact tracing for COVID-19 purposes if required, it is important to have your attendance registered.

On arrival, please make sure to have your event confirmation e-mail with QR code ready to present at registration where your attendance will be recorded. This can be provided via your phone or a printed copy.

The venue also requires guests to scan the QR code using the SafeWA app, or complete the SafeWA contact tracing form.


COVID-19 EVENT ATTENDANCE COMPLIANCE
By registering to attend an ACS in person event, you are agreeing to the below terms and conditions: -
  • If an attendee is displaying flu or cold like symptoms in the days leading up to the event and therefore is not able to attend, ACS will refund the registration fee.
  • If an attendee comes to an event and is displaying flu or cold like symptoms, they will be asked to leave.
  • We ask all ACS members to respect the social distancing guidelines, if an attendee repeatedly disregards these guidelines, they may be asked to leave.
  • ACS reserves the right to cancel the event within 24 hours' notice if either the speaker or the event host has advised us that they are exhibiting flu or cold like symptoms.
  • All attendees must provide a valid phone number and email address to be contacted on if there is reason to notify about a possible COVID-19 exposure.

Speakers

Speaker
Amandeep Kaur (Sheavy)
Speaker
Adi Trehan
Speaker
Mohit Arora
Speaker
Adam Bennett

Event Location

Technology Park Function Centre (Theatre), 2 Brodie Hall Drive (Corner Hayman Road), Bentley, WA, 6102
Read