CIO Summit 2019

Print agenda

Agenda

8:00am - 8:40am Registration - Arrival Tea and Coffee
8:40am - 8:50am

Opening Address and Welcome

Byron Connolly, Editor-in-Chief, CIO

8:50am - 9:20am

The Roadmap to Future Industries

Emilie Ditton, Associate Vice President, IDC Energy Insights Asia/Pacific

9:20am - 9:50am

Fireside Chat: Technology-Led Enablement for a Trusted Future


Featuring:

  • Peter Lawther, CTO, Fujitsu 
  • Stuart Long, CTO, HPE 
  • Iggy Pintado, Managing Director, IDC ANZ
9:50am - 10:20am   Defining and Leading a Transformation - What are The Challenges and How Do You Lead Through Them?
Sam McCready, CIO, Racing & Wagering WA (RWWA)

With the meteoric rise of digital corporate wagering companies such as Sports Bet, BetEasy and Ladbrokes the WA TAB have had to transform quickly.  The challenge is always, where do you start and how do you get traction?  Sam will talk through the experience so far at RWWA, sharing some of the highs but more of the lows and how to lead others through the challenges.
10:20am - 10:50am

Morning Tea & Networking

10:50am - 11:30am

It all Started with an Email

Michael Connory, CEO, Security in Depth


A review and demonstration on how and why 81% of worldwide data breaches begin with a simple email. Michael will be demonstrating  an actual cyber-attack utilising an email to start the chain of Cyber incidents as well as providing information how hacking groups such as APT10 target organisations around the world – and successfully hacked IBM, HP and SAP.

11:30am - 11:45am Do you have what it takes to defeat cyber crooks?

Phil Wallace, Director of Customer Experience, Macquarie Cloud Services


It’s not a matter of ‘if’ your organisation falls victim to a cyberattack, it’s when. Even Australia’s top 200 ASX-listed firms, some of the most mature and well-resourced, are having trouble sufficiently deploying cyber security basics. So what chance does your organisation have?  

And as your organisation moves more and more applications and systems to the cloud under what is likely to be a hybrid infrastructure model, sufficiently securing customer data and ensuring you are meeting the necessary regulatory compliance frameworks can become a big challenge.  

Join Macquarie Cloud Services’ Phillip Wallace for a TED style Talk followed by interactive enterprise networking roundtables at this year’s CIO Summit in Perth where you can discuss your business’ cyber security challenges.

The informal discussion will include but not be limited to:

 - Your strategy for dealing with cyberattacks particularly as you move more services to the cloud.
 - Are you needing to increase the number of security staff across your organisation and if so, why? Is it difficult to attract new talent?
 - What strategies are you using inside your organisation and are these strategies working?
 - What policies and procedures are in place with your cloud providers if there is a data breach?

11:45am - 12:15pm Digital IT Maturity Matrix 
Peter Nevin, CIO Executive Council Advisory Board


From the depths of Hype Cycles to the disruptive impact of the fourth industrial revolution CxOs are bombarded with an ongoing procession of complex and contradicting leadership strategies and methodologies.
Against this background, the CIO Executive Council identified an urgent need to develop a simple, effective strategic diagnostic and planning tool for Digital Leaders including a ground-breaking leadership methodology.
This session will launch, the Digital IT Maturity Matrix and illustrate how it can be used as the foundation for assessment, through strategy development and implementation to career and personal development planning.
12:15pm - 1:15pm

Lunch & Networking

1:15pm - 3:00pm

Executive Networking Tables: Mini Roundtable Insight Discussions

3:00pm - 3:30pm Afternoon Tea & Networking
3:30pm - 4:00pm Bankwest Digital Transformation – Lessons Learnt to Date
Andy Weir, Executive General Manager - Technology & Transformation, Bankwest
4:00pm - 4:30pm How to Reduce Password Security Risk
Hai Tran, CISO, WA Police

Whilst multifactor authentication is generally accepted as a superior mechanism for authentication; Password based, single factor authentication remains the most common method for authenticating users on ICT systems because there are no additional upfront costs.

Password security is critical where ICT system rely on passwords as the sole method for authenticating users and then authorising them access to sensitive information. Penetration tests commissioned by the WA Police Force have demonstrated that even a single account with a weak password could cause serious data breaches resulting in data loss, data compromise or system unavailability.

Password complexity and frequent password changes makes it difficult for authorised users to create a robust password and remember a new one periodically. A direct and measurable consequence of this is the high number of service desk calls to reset user passwords and the high number of weak passwords recovered by periodic password security assessments.
4:30pm - 5:00pm Closing Remarks & Prize Draws
5:00pm - 6:00pm Networking Drinks Proudly Sponsored by Juniper Networks & Dicker Data

Diamond Sponsor

Platinum Sponsor

Executive Networking Table Sponsor

Gold Plus Sponsor

Gold Sponsor

Silver Sponsor

Breakfast Sponsor

Networking Drinks Sponsors

Perth

Date/Time

Wednesday, 8th May 2019 8:00 a.m. - 5:00 p.m.

Venue

Crown Towers Perth Great Eastern Highway Burswood WA Australia

Sydney

Date/Time

Tuesday, 13th Aug 2019 8:00 a.m. - 5:00 p.m.

Venue

Hilton Sydney 488 George St Sydney NSW Australia

Melbourne

Date/Time

Wednesday, 20th Nov 2019 8:00 a.m. - 5:00 p.m.

Venue

Melbourne Convention Exhibition Centre 1 Convention Centre Place South Wharf Melbourne VIC Australia

Sponsored by

  • Fujitsu
  • HPE
  • Macquarie Cloud Services
  • Macquarie Cloud Services
  • Juniper Networks
  • Cohesity
  • HPE
  • Fujitsu
  • Outsystems
  • nbn Business
  • ASG
  • DC Alliance LTD
  • nbn Business
  • Juniper Networks

Who Should Attend

  • CIOs, IT Directors, GM IT, Heads of IT
  • CTOs , VPs
  • 2ICT, IT Managers