Keynote Speakers:

Peter Coroneos

International Vice President, Cybersecurity Advisors Network

 

Peter is an internationally recognised authority on cyber policy. In 2019 he was appointed as the International Vice President at Cybersecurity Advisors Network (CyAN), where he works to promote a culture of cybersecurity across industries and jurisdictions. His appointment is recognition of the hard work he put in to building a strong, successful Asia Pacific CyAN community.

 

Click here to view Peter's full bio.

 

How does the risk behaviour need to change to keep pace with a hyper connected world?

What can the last 200 million years of evolution tell us about the way humans respond to cyber threats?
In this fascinating, thought provoking and highly original presentation, international cybersecurity thought leader Peter Coroneos will guide us down a path rarely trodden by traditional cyber risk analysis.

This presentation will radically transform the way you think about cyber risk and will open the way to a more sophisticated approach to a problem that shows no signs of abating.

Dr Andrew Dowse
Director, Defence Research and Engagement, Edith Cowan University
Andrew Dowse served as an electronic engineer with the Royal Australian Air Force over a 37 year career in areas such as air defence, IT, communications and electronic warfare. His senior appointments included oversight of Defence capability planning, Air Force strategy and his final posting as Head of ICT Operations and Defence strategic J6. Andrew retired from active military service at the rank of Air Vice-Marshal in early 2018 and now works at Edith Cowan University, where he advises on research and education programs to support Defence. He is also the Chair of the Advisory Board for Sapien Cyber and a board member for the Pawsey Supercomputing Centre.
 

Information warfare - control and hyper connectivity, and their implications for cyber security:

Dr Dowse will briefly recount his views on the evolution of cyber security in Defence. He will then consider the changes in information system technologies associated with the Fourth Industrial Revolution, with two key aspects – information control and connectivity – combining to fundamentally change the future threat landscape. With these changes, traditional approaches to cyber security will be ineffective and we need to think about how we can adjust our protective capabilities in response to this looming information warfare threat.
 

 

Featured Speakers:

avatar
Benny Song
Field Marketing specialist

테스트용 입니다

 

테스트 1용 고객



Nicolas Aragnou
Nicolas Aragnou
IT Infrastructure Lead, Kennards Hire
Nicolas is IT Infrastructure Lead at Kennards Hire, one of the biggest players in the trans-Tasman equipment hire market. With more than 162 branches and 1,100 employees, Kennards Hire is a family-owned business founded more than 70 years ago in Bathurst. Nicolas, who graduated from the University of Technology, Sydney with a Bachelor of Engineering, has been with Kennards Hire since 2012.

Nicolas has been instrumental in a number of digital transformation projects at Kennards Hire. He is currently spearheading Kennard Hire’s current Fortinet-based initiative. His presentation will focus on the challenges faced by Kennards Hire and how they have harnessed Fortinet’s Security Fabric to embrace digital technology.

Scott La Franchie
Scott La Franchie
Head of Cybersecurity, Kordia
Scott has more than 12 years’ experience in cyber security, software & telecommunications. During this time he has held multiple marketing and product development roles across various organisations, including NZ Police, Orcon, Yellow and GEO (formally GeoOp).

As Head of Cybersecurity at Kordia, a leading provider of mission-critical technology to businesses in New Zealand, Australia and the Pacific, Scott is in charge of the strategic leadership of this key portfolio. His key responsibilities include ensuring that any products and services launched as part of Kordia’s security offering are both leading-edge in approach, and that they help ease our customers’ pain points when it comes to improving their overall security posture.

Scott is also the subject matter expert internally for Kordia’s Advice, Protect and Insight & Response Portfolio, which is NZ's most comprehensive cyber security offering. It comprises a range of solutions for Kordia’s customers, from managed security products through to expert consultancy services, provided by Kordia’s independent, award-winning cyber consultancy, Aura Information Security.

Glenn Veen
Glenn Veen
Director of Infrastructure, Government of Western Australia - Department of Education
In this role, Glenn has overall responsibility for designing, developing, implementing, monitoring and managing the Department’s technology and telecommunications infrastructure.

The components of the ICT strategy that Glenn is responsible for include the telecommunications (voice and data) deployment, Internet Service Provision, as well as the Standard Operating Environment for schools. The SOE has been implemented in 791 of the Department’s 799 schools.

Frank Phillis
Frank Phillis
Specialist Technical Account Manager, Amazon Web Services
Focused on Security within AWS, Frank regularly travels within the ASEAN region, providing guidance, best practice and technical deep dives for AWS customers on implementing security best practices for their AWS accounts and workloads. Prior to this role, Frank was a Senior Engineer in the AWS Support organisation, and prior to that, he led the Cloud Support (Security) team in Sydney within AWS. Before AWS, Frank has worked in various technical roles in Telstra, The Seven Network and Bloomberg, to name a few. Frank’s main areas of discipline within AWS are Authentication/Authorisation, cryptography, incident response/monitoring and Denial of Service.

Stepehn Watkins
Stepehn Watkins
Senior Director Offer Development

Stephen serves as Senior Director Offer Development within Fortinet’s US Channel Sales Organization. Applying his formal education, practical experience, and advisory expertise, Stephen leads a team of seasoned practitioners who have established a proven framework to shepherd managed services providers through the offer creation and services delivery journey. Stephen draws upon more than 30 years residence in the Information Technology and Cybersecurity trenches. He is a Trusted Security Advisor to managed services providers (SP/MSSP) around the world, co-developing strategic vision and operational cadence using a standard, repeatable framework for managed services profitability.



Aamir Lakhani
Aamir Lakhani
Global Security Strategist and Researcher

Aamir Lakhani is a cyber-security researcher and practitioner with Fortinet and FortiGuard Labs, with over 15 years of experience in the security industry. He is responsible for providing IT security solutions to major commercial and federal enterprise organizations. Lakhani is considered an industry leader in support of detailed architectural engagement and projects on topics related to cyber deference, mobile application threats, malware and advanced persistent threat (APT) research. Previously, Lakhani designed cyber solutions for defense intelligence agencies, and has assisted organizations in defending themselves from active strive-back perpetrated by underground cyber groups. Lakhani's area of expertise include FortiGuard, fundamentals of network protection, cyber defense, mobile application threats, malware and advances threat (APT) research. 

 



Cornelius Mare
Cornelius Mare
CISO

Corne has more than 20 years experience in network security and delivering cyber-resilient solutions. He has a focus on hybrid cloud environments and artificial intelligence to ensure organisations are enabled while also safeguarding their data and applications.

In his role as a CISO, Corne acts as the evangelist for Fortinet activities across Australia and the advanced technology that underpins its success. His role is to provide leadership and strategy for technical, pre-sales and support initiatives. He works closely with partners and customers to understand their business drivers and risk posture and to reduce their risk to an acceptable level.