Skip to main content
Cookies Policy
Detailed information on the use of cookies on this website is provided in our Privacy Policy. By closing this message and proceeding, you consent to our use of cookies in accordance with our Cookies Policy.
  • icon-facebook
  • icon-linkedin
  • icon-twitter

ACS Half Day Summit: A focus on Cyber Security Management [IN-PERSON]

This is an in-person, face-to-face event being held in Perth, Western Australia. Please do not register for this event if you do not live in, or cannot travel to, Western Australia (WA). This event will NOT be available online.

Registration End Date: Tue, 26 Jul, 09:00 AM

  • where

  • State Library of WA, Theatre (Ground Floor)
    25 Francis Street
    PERTH WA 6000
  • when

  • Event Start: Wed, 27 Jul, 09:00 AM
    Event Finish: Wed, 27 Jul, 12:00 PM
  • event price

  • -

<p><img alt="User-added image" src=";oid=00D90000000o5NE&amp;lastMod=1637557695000"></img><br><br>Cyber crime is a constant threat and is a rapidly growing global challenge for individuals and businesses alike.<br><br>Join us at this in-person Cyber Security Summit, a half day multi speaker event providing ICT professionals with contemporary, industry leading knowledge and skills on how to implement best practice cyber security.<br><br>There will be three sessions covering the following topics: -<br><br><strong>ASD CYBER SKILLS FRAMEWORK AND THE FUTURE OF AUSTRALIA&#39;S CYBER SECURITY WORKFORCE - presented by Sheavy Kaur | IT Services Manager at NIT Australia</strong><br><br>In September 2020, the federal government’s Australian Signals Directorate (ASD) released the Cyber Skills Framework. This framework defines the blueprint of Australia’s cyber skills workforce development as a part of the government’s Cyber Security Strategy 2020. <br> <br>This presentation will highlight the key aspects of the ASD Cyber Skills framework including: - </p> <ul><li>How the recruitment of cyber security specialists aligns with the skills, knowledge, and attributes of national and international industry standards.</li><li>How businesses and organisations can use the Cyber Skills Framework as a comprehensive and standard reference source to help them better identify which cyber roles they may need to fill.</li><li>What capabilities and proficiency levels personnel recruited for the cyber security roles should possess.</li><li>Outline how Australian cyber security professionals can improve their knowledge, skills, and abilities, as well as the necessary learning, career, development, and certification steps they can take to meet their career goals and contribute to a safer and more secure cyber Australia.</li></ul> The presentation will also cover the alignment of the Cyber Skills Framework with SFIA (Skills Framework for the Information Age). This information is relevant for professionals interested in cyber security; IT managers; CISOs; business leaders; and IT recruiters.<br><br>----------------------------------------------------------------------------------------------------------------------------------------------------<br><br><strong>STEALTH + - CYBER SECURITY STRATEGY - presented by Adi Trehan | Technical Director and Mohit Arora | Principal Consultant at First Call IT</strong> <p>The concept of counter strategy has been in existence throughout all of history. Essentially it is a strategy that used to counter or negate another strategy. The strategy of stealth is used by many hackers to make malware inconspicuous where they hide any modifications made to an infected machine by a virus. This session will discuss the counter strategy called STEALTH + , which is a cyber security methodology aimed at making users invisible to hackers.<br><br>This session will cover: -</p> <ul><li>Vulnerabilities that make users visible to hackers</li><li>What is STEALTH +</li><li>Key components of STEALTH +</li><li>How to implement a STEALTH + strategy</li></ul> <p><span style="font-size: 11.0pt;"><span>--------------------------------------------------------------------------------------------------------------------</span></span><br><br><strong><span style="font-size: 11.0pt;"><span>XDR  - AN ESSENTIAL COMPONENT TO HELP IMPLEMENT EFFECTIVE CYBER SECURITY MANAGEMENT - presented by Adam Bennett | Chief Executive Officer at Red Piranha Limited</span></span></strong><br><br>Having the best cyber security tools and technology is by no means a guarantee of safety. Of equal importance is to ensure there is an accompanying management system. XDR (Extend Detection and Response) can work alongside a security management program that collects and automatically connects data across multiple security layers such you Security Monitoring and Incident Response management systems. This session will examine the importance of having XDR as part of a robust cyber security management system, and look at: -</p> <ul><li>Security Monitoring and Incident Response - a look at Compliance and Requirements by Frameworks</li><li>How does XDR (Extend Detection and Response) work?</li><li>How can XDR help automate incident response management systems to meet Compliance Frameworks?</li></ul> <img alt="User-added image" src=";oid=00D90000000o5NE&amp;lastMod=1639375779000"></img><br><br><u><strong>PLEASE NOTE</strong></u><br><em>To confirm attendance and CPD point allocation, on arrival at registration, please make sure to have your event confirmation e-mail with QR code ready to present where your attendance will be recorded. This can be provided via your phone or a printed copy.</em><br> 



Contact Details

Share this event:




Information security (SCTY) -> Level 5


Amandeep Kaur (Sheavy)

Amandeep Kaur (Sheavy)

Over the past 10 years in the IT industry, Sheavy has developed and deployed software programs and worked with complex network infrastructures. She understands that the human factor plays a major role in making businesses vulnerable worldwide and she has been helping organisations of different sizes and ages to protect themselves from data breaches and attacks by providing them cyber security consultations and awareness workshops.

Sheavy is WA's number one Online Learning Accelerator user for ACS and highly recommends ACS’s Digital Library to both freshers in the IT industry as well as seasoned professionals.

As an ICT trainer and career coach, Sheavy helps both students and industry professionals in gaining skills that have been in demand, how they can best position as an emerging professional, and how they can leverage from Skills Frameworks such as SFIA and ASD-CSF to plan their career progression as an IT professional. 

Show More


Adi Trehan

Adi Trehan

After 15 years in the IT Industry, I saw an opportunity to create a service through which Technology works for People and not the other way around.

Show More


Mohit Arora

Mohit Arora

Mohit believes every organisation aims to thrive each day and technology proves to be a crucial component for their enhancement.

At First Call IT, they believe in bringing this development whilst keeping Cyber Security at the core of any system integration. 

Show More


Adam Bennett

Adam Bennett

Adam is an accomplished and driven leader in the Cybersecurity space. As the brains behind the Crystal Eye platform, he sets the technological roadmap and strategic direction for Red Piranha. Both a professional project manager and ethical hacker, Adam has studied Computer Science and Information Security at AMTC, MIT, and Charles Sturt University and is a member of the Linux Foundation.

Show More
25 Francis Street,PERTH,WA,Australia

Recommended Events

Event Terms and Conditions


  • ACS reserves the right to change the program at any time. Every effort will be made to ensure a program of equivalent standard and members are updated with changes.
  • All dietary requirements are considered, however we cannot guarantee a 100% allergen free environment.
  • ACS reserves the right to prohibit entry or eject any person from an ACS event based on behaviour deemed inappropriate by ACS staff, its agents and/or others working under its authority.
  • Filming or streaming by attendees is not permitted. If an attendee is found to be doing so they will be asked to leave the event immediately and further action may be taken.
  • Photography and/or filming may take place during this event, by accepting these terms you consent to this. Please let a member of ACS know if you do not want your picture taken.

COVID-19 Event Attendance Compliance

By registering to attend an ACS in person event you are agreeing to the below terms and conditions

  • If an attendee is displaying flu or cold like symptoms in the days leading up to the event and therefore is not able to attend, ACS will refund the registration fee.
  • If an attendee comes to an event and is displaying flu or cold like symptoms they will be asked to leave
  • We ask all ACS members to respect the social distancing guidelines, if an attendee repeatedly disregards these guidelines, they may be asked to leave
  • ACS reserves the right to cancel the event within 24 hours' notice if either the speaker or the event host has advised us that they are exhibiting flu or cold like symptoms
  • All attendees must provide a valid phone number and email address to be contacted on if there is reason to notify about a possible COVID-19 exposure

Personal information collection notice

By registering for this event, you are providing personal information to the Australian Computer Society. In accordance with the ACS Privacy Policy, ACS collects personal information through registrations and attendances at its events for the purposes of:

  • organising and providing the various professional development events held by the ACS (including for example, courses, conferences, seminars, workshops, launches);
  • processing and managing event registrations (including catering for dietary requirements);
  • maintaining event attendance records;
  • contacting registered event guests with information in regard to the event and seeking post-event feedback;
  • communicating with you to in relation to future events or ACS products, courses, services, promotions or other products or services that ACS reasonably thinks may be of interest to attendees;
  • processing and responding to attendee inquiries; and
  • conducting research to improve its events and better understanding needs. 

If the required information is not provided, we or any involved third parties, may not be able to respond to you, update you, or provide appropriate services or events to you.

We may obtain personal information directly from you or from someone who registers for the event on your behalf. If you provide us with personal information about another person, you must do so only with their consent and agree to make them aware of this privacy notice.

ACS may share your personal information with third parties for the collection purposes noted above or as set out in our Privacy Policy, where it is reasonably necessary for, or directly related to, one or more of our activities, or required by law.

When you register to participate in an overseas event, we may send personal information we collect overseas.

See our Privacy Policy at for more information about our privacy practices.