ACS Half Day Summit: A focus on Cyber Security Management [IN-PERSON]
This is an in-person, face-to-face event being held in Perth, Western Australia. Please do not register for this event if you do not live in, or cannot travel to, Western Australia (WA). This event will NOT be available online.
About this event
Cyber crime is a constant threat and is a rapidly growing global challenge for individuals and businesses alike.
Join us at this in-person Cyber Security Summit, a half day multi speaker event providing ICT professionals with contemporary, industry leading knowledge and skills on how to implement best practice cyber security.
There will be three sessions covering the following topics: -
ASD CYBER SKILLS FRAMEWORK AND THE FUTURE OF AUSTRALIA'S CYBER SECURITY WORKFORCE - presented by Sheavy Kaur | IT Services Manager at NIT Australia
In September 2020, the federal government’s Australian Signals Directorate (ASD) released the Cyber Skills Framework. This framework defines the blueprint of Australia’s cyber skills workforce development as a part of the government’s Cyber Security Strategy 2020.
This presentation will highlight the key aspects of the ASD Cyber Skills framework including: -
- How the recruitment of cyber security specialists aligns with the skills, knowledge, and attributes of national and international industry standards.
- How businesses and organisations can use the Cyber Skills Framework as a comprehensive and standard reference source to help them better identify which cyber roles they may need to fill.
- What capabilities and proficiency levels personnel recruited for the cyber security roles should possess.
- Outline how Australian cyber security professionals can improve their knowledge, skills, and abilities, as well as the necessary learning, career, development, and certification steps they can take to meet their career goals and contribute to a safer and more secure cyber Australia.
----------------------------------------------------------------------------------------------------------------------------------------------------
STEALTH + - CYBER SECURITY STRATEGY - presented by Adi Trehan | Technical Director and Mohit Arora | Principal Consultant at First Call IT
The concept of counter strategy has been in existence throughout all of history. Essentially it is a strategy that used to counter or negate another strategy. The strategy of stealth is used by many hackers to make malware inconspicuous where they hide any modifications made to an infected machine by a virus. This session will discuss the counter strategy called STEALTH + , which is a cyber security methodology aimed at making users invisible to hackers.
This session will cover: -
- Vulnerabilities that make users visible to hackers
- What is STEALTH +
- Key components of STEALTH +
- How to implement a STEALTH + strategy
--------------------------------------------------------------------------------------------------------------------
XDR - AN ESSENTIAL COMPONENT TO HELP IMPLEMENT EFFECTIVE CYBER SECURITY MANAGEMENT - presented by Adam Bennett | Chief Executive Officer at Red Piranha Limited
Having the best cyber security tools and technology is by no means a guarantee of safety. Of equal importance is to ensure there is an accompanying management system. XDR (Extend Detection and Response) can work alongside a security management program that collects and automatically connects data across multiple security layers such you Security Monitoring and Incident Response management systems. This session will examine the importance of having XDR as part of a robust cyber security management system, and look at: -
- Security Monitoring and Incident Response - a look at Compliance and Requirements by Frameworks
- How does XDR (Extend Detection and Response) work?
- How can XDR help automate incident response management systems to meet Compliance Frameworks?
PLEASE NOTE
To confirm attendance and CPD point allocation, on arrival at registration, please make sure to have your event confirmation e-mail with QR code ready to present where your attendance will be recorded. This can be provided via your phone or a printed copy.
Speakers
Sheavy is WA's number one Online Learning Accelerator user for ACS and highly recommends ACS’s Digital Library to both freshers in the IT industry as well as seasoned professionals.
As an ICT trainer and career coach, Sheavy helps both students and industry professionals in gaining skills that have been in demand, how they can best position as an emerging professional, and how they can leverage from Skills Frameworks such as SFIA and ASD-CSF to plan their career progression as an IT professional.
At First Call IT, they believe in bringing this development whilst keeping Cyber Security at the core of any system integration.
Event Location
Event Terms & Conditions
Registration
- Payment in full is required the time of booking in order for the registration to be valid.
- To avoid disappointment, ensure you pay for your booking(s) before the registration closing date. Anyone that has not received a confirmation email will not be on the event attendance list and therefore will not be admitted to the event.
- Online registration ends at the time stated on the event details page.
Cancellation and Refund
All cancellations must be processed through the website, a refund will only be considered if it is at least 3 working days prior to the event.
Disclaimer
- ACS reserves the right to change the program at any time. Every effort will be made to ensure a program of equivalent standard and members are updated with changes.
- All dietary requirements are considered, however we cannot guarantee a 100% allergen free environment.
- ACS reserves the right to prohibit entry or eject any person from an ACS event based on behaviour deemed inappropriate by ACS staff, its agents and/or others working under its authority.
- Filming or streaming by attendees is not permitted. If an attendee is found to be doing so they will be asked to leave the event immediately and further action may be taken.
- Photography and/or filming may take place during this event, by accepting these terms you consent to this. Please let a member of ACS know if you do not want your picture taken.
COVID-19 Event Attendance Compliance
By registering to attend an ACS in person event you are agreeing to the below terms and conditions
- If an attendee is displaying flu or cold like symptoms in the days leading up to the event and therefore is not able to attend, ACS will refund the registration fee.
- If an attendee comes to an event and is displaying flu or cold like symptoms they will be asked to leave
- We ask all ACS members to respect the social distancing guidelines, if an attendee repeatedly disregards these guidelines, they may be asked to leave
- ACS reserves the right to cancel the event within 24 hours' notice if either the speaker or the event host has advised us that they are exhibiting flu or cold like symptoms
- All attendees must provide a valid phone number and email address to be contacted on if there is reason to notify about a possible COVID-19 exposure
Personal information collection notice
By registering for this event, you are providing personal information to the Australian Computer Society. In accordance with the ACS Privacy Policy, ACS collects personal information through registrations and attendances at its events for the purposes of:
- organising and providing the various professional development events held by the ACS (including for example, courses, conferences, seminars, workshops, launches);
- processing and managing event registrations (including catering for dietary requirements);
- maintaining event attendance records;
- contacting registered event guests with information in regard to the event and seeking post-event feedback;
- communicating with you to in relation to future events or ACS products, courses, services, promotions or other products or services that ACS reasonably thinks may be of interest to attendees;
- processing and responding to attendee inquiries; and
- conducting research to improve its events and better understanding needs.
If the required information is not provided, we or any involved third parties, may not be able to respond to you, update you, or provide appropriate services or events to you.
We may obtain personal information directly from you or from someone who registers for the event on your behalf. If you provide us with personal information about another person, you must do so only with their consent and agree to make them aware of this privacy notice.
ACS may share your personal information with third parties for the collection purposes noted above or as set out in our Privacy Policy, where it is reasonably necessary for, or directly related to, one or more of our activities, or required by law.
When you register to participate in an overseas event, we may send personal information we collect overseas.
See our Privacy Policy at https://www.acs.org.au/privacy-policy.html for more information about our privacy practices.