Summit

ACS Half Day Summit: A focus on Cyber Security Management [IN-PERSON]

This is an in-person, face-to-face event being held in Perth, Western Australia. Please do not register for this event if you do not live in, or cannot travel to, Western Australia (WA). This event will NOT be available online.

State Library of WA, Theatre (Ground Floor), 25 Francis Street, PERTH, WA, 6000
Wed 27 Jul 2022 09:00 AM AWST
Duration: 3.0 hours
Register by Tue 26 Jul 2022 09:00 AM AWST
In Person
CPD Hours: 3
Skills Level: Information security (SCTY) -> Level 5

About this event

User-added image

Cyber crime is a constant threat and is a rapidly growing global challenge for individuals and businesses alike.

Join us at this in-person Cyber Security Summit, a half day multi speaker event providing ICT professionals with contemporary, industry leading knowledge and skills on how to implement best practice cyber security.

There will be three sessions covering the following topics: -

ASD CYBER SKILLS FRAMEWORK AND THE FUTURE OF AUSTRALIA'S CYBER SECURITY WORKFORCE - presented by Sheavy Kaur | IT Services Manager at NIT Australia

In September 2020, the federal government’s Australian Signals Directorate (ASD) released the Cyber Skills Framework. This framework defines the blueprint of Australia’s cyber skills workforce development as a part of the government’s Cyber Security Strategy 2020. 
 
This presentation will highlight the key aspects of the ASD Cyber Skills framework including: - 

  • How the recruitment of cyber security specialists aligns with the skills, knowledge, and attributes of national and international industry standards.
  • How businesses and organisations can use the Cyber Skills Framework as a comprehensive and standard reference source to help them better identify which cyber roles they may need to fill.
  • What capabilities and proficiency levels personnel recruited for the cyber security roles should possess.
  • Outline how Australian cyber security professionals can improve their knowledge, skills, and abilities, as well as the necessary learning, career, development, and certification steps they can take to meet their career goals and contribute to a safer and more secure cyber Australia.
The presentation will also cover the alignment of the Cyber Skills Framework with SFIA (Skills Framework for the Information Age). This information is relevant for professionals interested in cyber security; IT managers; CISOs; business leaders; and IT recruiters.

----------------------------------------------------------------------------------------------------------------------------------------------------

STEALTH + - CYBER SECURITY STRATEGY - presented by Adi Trehan | Technical Director and Mohit Arora | Principal Consultant at First Call IT

The concept of counter strategy has been in existence throughout all of history. Essentially it is a strategy that used to counter or negate another strategy. The strategy of stealth is used by many hackers to make malware inconspicuous where they hide any modifications made to an infected machine by a virus. This session will discuss the counter strategy called STEALTH + , which is a cyber security methodology aimed at making users invisible to hackers.

This session will cover: -

  • Vulnerabilities that make users visible to hackers
  • What is STEALTH +
  • Key components of STEALTH +
  • How to implement a STEALTH + strategy

--------------------------------------------------------------------------------------------------------------------

XDR  - AN ESSENTIAL COMPONENT TO HELP IMPLEMENT EFFECTIVE CYBER SECURITY MANAGEMENT - presented by Adam Bennett | Chief Executive Officer at Red Piranha Limited

Having the best cyber security tools and technology is by no means a guarantee of safety. Of equal importance is to ensure there is an accompanying management system. XDR (Extend Detection and Response) can work alongside a security management program that collects and automatically connects data across multiple security layers such you Security Monitoring and Incident Response management systems. This session will examine the importance of having XDR as part of a robust cyber security management system, and look at: -

  • Security Monitoring and Incident Response - a look at Compliance and Requirements by Frameworks
  • How does XDR (Extend Detection and Response) work?
  • How can XDR help automate incident response management systems to meet Compliance Frameworks?
User-added image

PLEASE NOTE
To confirm attendance and CPD point allocation, on arrival at registration, please make sure to have your event confirmation e-mail with QR code ready to present where your attendance will be recorded. This can be provided via your phone or a printed copy.
 

Speakers

Speaker
Amandeep Kaur (Sheavy)
Speaker
Adi Trehan
Speaker
Mohit Arora
Speaker
Adam Bennett

Event Location

State Library of WA, Theatre (Ground Floor), 25 Francis Street, PERTH, WA, 6000
Read