Your Results

YOU SEARCHED

CEBIT THEME: Data privacy & trust

Here’s a summary of what’s on that best matches your search criteria.

Go Back

Go

Back

Gary Blair

Director, Imali

How do we create a collaborative industry based on trust?

It’s us against them. Them being hackers, bad actors and anyone trying to exploit individual and organisational vulnerabilities. Which is why we need to band together and create trust with our peers. However, sharing our own mistakes and acknowledging organisational vulnerabilities is not always ...

Presentation Type: Panel Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, ICT Technical

Martin Buckland

General Manager - APAC, Huntsman Security

  • linkedin

ACSC Essential 8 – If you can measure it, you can manage it

By 2020, it is expected that 100% of large enterprises will be asked to report to their senior executives on cybersecurity and technology risk. The challenge for many organisations is identifying what metrics to report on and how to translate an assumed technical problem into the traditional bus...

Presentation Type: Session Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, Government, ICT Technical

Nicholas Cairns

Principal, Enterprise Security Intelligence, National Australia Bank

Data is the new war. How can we win one of the information battles of the century?

The increased size and quality of our data brings many new vulnerabilities into play. From the added potential for human error to more risk for our businesses and clients. Privacy challenges around the loss of personal anonymity as well as the integrity of the data also come into play. We will deta...

Presentation Type: Session Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, ICT Technical, Security

Fang Chen

Executive Director Data Science/Distinguished Professor, University of Technology Sydney

AI in classrooms

In recent years, we have observed large advances in algorithms, data proliferation, and computing infrastructure. This convergence has made big data analytics a leading-edge, disruptive power to the economy and society. Some people described the current technological disruptions the “Fourth Indust...

Presentation Type: Session Theme: Data privacy & trust Industry: Business Strategy Leaders, ICT Technical

Angela Coble

Director Business Technology, Johnson and Johnson

  • linkedin

How do we create a collaborative industry based on trust?

It’s us against them. Them being hackers, bad actors and anyone trying to exploit individual and organisational vulnerabilities. Which is why we need to band together and create trust with our peers. However, sharing our own mistakes and acknowledging organisational vulnerabilities is not always ...

Presentation Type: Panel Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, ICT Technical, Security

Steven Dujin

Managing Director & Co-founder, Cyber Risk Assurance

  • linkedin

How do we create a collaborative industry based on trust?

It’s us against them. Them being hackers, bad actors and anyone trying to exploit individual and organisational vulnerabilities. Which is why we need to band together and create trust with our peers. However, sharing our own mistakes and acknowledging organisational vulnerabilities is not always ...

Presentation Type: Panel Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, ICT Technical

Lesley Honeyman

Director Cyber Security Operations, Cyber Security NSW

How do we create a collaborative industry based on trust?

It’s us against them. Them being hackers, bad actors and anyone trying to exploit individual and organisational vulnerabilities. Which is why we need to band together and create trust with our peers. However, sharing our own mistakes and acknowledging organisational vulnerabilities is not always ...

Presentation Type: Panel Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, ICT Technical

Mikko Hypponen

Chief Research Officer, F-Secure

  • linkedin

Cyber arms race

The way we typically think about computer security is that it's the part of our business that always slows things down or restricts us from doing what we want to do; basically, it's the part of our business that always says 'no'. This is backwards and it's time to change this. We're faced with v...

Presentation Type: Central stage keynote Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, ICT Technical

John Kouroutzoglou

Information Security & Compliance Manager, Domain Group

It's a breach - now what?! How leadership should be prepping for the inevitable.

It’s not a matter of if anymore. It’s when. With increasing threats, more access points and more potential for human error, a cyber breach is increasingly likely. Whilst you should be implementing strategies to hedge your risk, you should also be planning for the inevitable. - What bre...

Presentation Type: Session Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, ICT Technical, Security

Rachael Leighton

Information Security Awareness Specialist, VIC Department of Economic Development, Jobs, Transport and Resources

  • linkedin

How do we create a collaborative industry based on trust?

It’s us against them. Them being hackers, bad actors and anyone trying to exploit individual and organisational vulnerabilities. Which is why we need to band together and create trust with our peers. However, sharing our own mistakes and acknowledging organisational vulnerabilities is not always ...

Presentation Type: Panel Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, ICT Technical, Security

Alana Maurushat

Professor of Cybersecurity and Behaviour, Western Sydney University

  • linkedin

The economics of security vulnerability and bug bounty markets

Traditional financial transactions around hacks and threats are shifting and in particular the market for zero day vulnerabilities and bugs. A zero-day vulnerability is one that is unknown which means that security software will not detect it. Until this is patched, a criminal or other may export it...

Presentation Type: Session Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, ICT Technical, Security

Kirstin McIntosh

Head of Partnerships, CyRise

  • linkedin

How do we create a collaborative industry based on trust?

It’s us against them. Them being hackers, bad actors and anyone trying to exploit individual and organisational vulnerabilities. Which is why we need to band together and create trust with our peers. However, sharing our own mistakes and acknowledging organisational vulnerabilities is not alway...

Presentation Type: Panel Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, ICT Technical, Security

Ian Oppermann

CEO and Chief Data Scientist, NSW Data Analytics Centre

  • linkedin

Coming to grips with data, privacy and trust

Data is everywhere and it is increasingly being used to create personalised digital services. This creates opportunities and challenges. Two obvious challenges are privacy and trust. The rate of change of the digital world is however challenging what we mean by privacy and how we assess trust. This ...

Presentation Type: Session Theme: Data privacy & trust Industry: Business Strategy Leaders, ICT Technical

Agnes Panosian

Data and AI Sales Director, Microsoft

  • linkedin

Privacy, trust and the role of AI on Society

Imagine the world in 2039, 20 years from now what would it look like? how would we live our daily lives with the advancement of technology and what would the role of Artificial Intelligence be on Society? We know from experience the benefits of technology advancement but they also bring complex que...

Theme: Data privacy & trust Industry: Business Strategy Leaders, ICT Technical

Stephanie Salter

Director, Transport Digital Accelerator, Transport for NSW

  • linkedin

Office hours with mentors

Have your specific business questions answered and receive expert advice on your own pain points during private sessions with a subject matter expert. Additional mentors to be confirmed along with areas of specialities and booking times. Stephanie can advise on the following: 1. What is the ...

Presentation Type: Office hours Theme: Data privacy & trust Industry: Founder/Entrepreneurs/Start-up

Steven Scheurmann

Leader - Financial Crimes Insight, IBM Asia Pacific

  • twitter
  • linkedin

Faster payments, faster crime: Welcome to the digital world

The Digital Economy represents tectonic changes to the manner how all organizations are engaging with the customers: from a services standpoint; the customer experience; and how the associated economics and business supports these engagements, particularly as it relates to payments. The digital land...

Presentation Type: Session Theme: Data privacy & trust Industry: Business Strategy Leaders, Finance, ICT Technical

Wayne Tufek

Director, Cyberrisk

  • linkedin

Preparing your organisation for a cyber crisis – Rewriting the rule book

Your organisation's reputation and brand is its number one asset. A reputation is far easier to destroy than it is to build and in the event of a cyber crisis the quality of your response will determine the impact and cost to your organisation. Discover which strategies should be a part of your orga...

Presentation Type: Masterclass Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, Founder/Entrepreneurs/Start-up, ICT Technical

Wayne Tufek

Director, Cyberrisk

  • linkedin

The weakest link - Effective supplier and third-party risk management

Third party vendors and suppliers often have access to your network and your organisation's confidential information. The best way to prevent a data breach is to have robust program to assess how your third parties are managing their risk and protecting your data. Organisations must have a clear und...

Presentation Type: Masterclass Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, Founder/Entrepreneurs/Start-up, ICT Technical

Todd Williams

Director, NSW Cyber Security Network

  • linkedin

Amplifying your cyber efforts through automation and workforce up-skilling.

A hacker only needs to get things right once. A CSO needs to get things right all the time. However limited resourcing and a changing landscape makes the journey towards improved security tough. How can you amplify your resources to create a stronger defence program? • Changing the minds...

Presentation Type: Session Theme: Data privacy & trust Sub-theme: Security Industry: Business Strategy Leaders, Government, ICT Technical

© Hannover Fairs Australia Pty Ltd. Website by Permission