|8:00am - 8:40am||Registration - Arrival Tea and Coffee|
|8:40am - 8:50am||
Opening Address and Welcome
Byron Connolly, Editor-in-Chief, CIO
|8:50am - 9:20am||
The Roadmap to Future Industries
Emilie Ditton, Associate Vice President, IDC Energy Insights Asia/Pacific
|9:20am - 9:50am||
Fireside Chat: Technology-Led Enablement for a Trusted Future
|9:50am - 10:20am||Defining and Leading a Transformation - What are The Challenges and How Do You Lead Through Them?
Sam McCready, CIO, Racing & Wagering WA (RWWA)
With the meteoric rise of digital corporate wagering companies such as Sports Bet, BetEasy and Ladbrokes the WA TAB have had to transform quickly. The challenge is always, where do you start and how do you get traction? Sam will talk through the experience so far at RWWA, sharing some of the highs but more of the lows and how to lead others through the challenges.
|10:20am - 10:50am||
Morning Tea & Networking
|10:50am - 11:30am||
It all Started with an Email
Michael Connory, CEO, Security in Depth
|11:30am - 11:45am||Do you have what it takes to defeat cyber crooks?
Phil Wallace, Director of Customer Experience, Macquarie Cloud Services
It’s not a matter of ‘if’ your organisation falls victim to a cyberattack, it’s when. Even Australia’s top 200 ASX-listed firms, some of the most mature and well-resourced, are having trouble sufficiently deploying cyber security basics. So what chance does your organisation have?
And as your organisation moves more and more applications and systems to the cloud under what is likely to be a hybrid infrastructure model, sufficiently securing customer data and ensuring you are meeting the necessary regulatory compliance frameworks can become a big challenge.
Join Macquarie Cloud Services’ Phillip Wallace for a TED style Talk followed by interactive enterprise networking roundtables at this year’s CIO Summit in Perth where you can discuss your business’ cyber security challenges.
The informal discussion will include but not be limited to:
- Your strategy for dealing with cyberattacks particularly as you move more services to the cloud.
- Are you needing to increase the number of security staff across your organisation and if so, why? Is it difficult to attract new talent?
- What strategies are you using inside your organisation and are these strategies working?
- What policies and procedures are in place with your cloud providers if there is a data breach?
|11:45am - 12:15pm||Digital IT Maturity Matrix
Peter Nevin, CIO Executive Council Advisory Board
From the depths of Hype Cycles to the disruptive impact of the fourth industrial revolution CxOs are bombarded with an ongoing procession of complex and contradicting leadership strategies and methodologies.
Against this background, the CIO Executive Council identified an urgent need to develop a simple, effective strategic diagnostic and planning tool for Digital Leaders including a ground-breaking leadership methodology.
This session will launch, the Digital IT Maturity Matrix and illustrate how it can be used as the foundation for assessment, through strategy development and implementation to career and personal development planning.
|12:15pm - 1:15pm||
Lunch & Networking
|1:15pm - 3:00pm||
Executive Networking Tables: Mini Roundtable Insight Discussions
|3:00pm - 3:30pm||Afternoon Tea & Networking|
|3:30pm - 4:00pm||Bankwest Digital Transformation – Lessons Learnt to Date
Andy Weir, Executive General Manager - Technology & Transformation, Bankwest
|4:00pm - 4:30pm||How to Reduce Password Security Risk
Hai Tran, CISO, WA Police
Whilst multifactor authentication is generally accepted as a superior mechanism for authentication; Password based, single factor authentication remains the most common method for authenticating users on ICT systems because there are no additional upfront costs.
Password security is critical where ICT system rely on passwords as the sole method for authenticating users and then authorising them access to sensitive information. Penetration tests commissioned by the WA Police Force have demonstrated that even a single account with a weak password could cause serious data breaches resulting in data loss, data compromise or system unavailability.
Password complexity and frequent password changes makes it difficult for authorised users to create a robust password and remember a new one periodically. A direct and measurable consequence of this is the high number of service desk calls to reset user passwords and the high number of weak passwords recovered by periodic password security assessments.
|4:30pm - 5:00pm||Closing Remarks & Prize Draws|
|5:00pm - 6:00pm||Networking Drinks Proudly Sponsored by Juniper Networks & Dicker Data|