Skip to main content
Cookies Policy
Detailed information on the use of cookies on this website is provided in our Privacy Policy. By closing this message and proceeding, you consent to our use of cookies in accordance with our Cookies Policy.
x

We have implemented new login procedure. Learn More

  • CONTACT US
  • icon-facebook
  • icon-linkedin
  • icon-twitter

ACS Half Day Summit: What's new in Cyber Security?

The Cyber Security Summit is a half day multi speaker event aimed at providing ICT professionals with contemporary, industry leading knowledge and skills on how to implement best practice cyber security.

Event Start: Wed 26 Feb 08:30 AM AWST
Event Finish: Wed 26 Feb 12:00 PM AWST

Completed

Registration End Date: Wed 26 Feb 08:30 AM


<img alt="Cyber Security Pic" src="https://acsau.file.force.com/servlet/rtaImage?eid=7010o000001ezsx&amp;feoid=00N9000000EVCh7&amp;refid=0EM0o000001g3CW" style="height: 333px; width: 500px;"></img><br><br><u><b>SPECIAL OFFER</b></u><br>Join as a new full fee member and receive a complementary registration for this event. <a href="https://www.acs.org.au/membership-application.html?q=1" target="_blank">Click here to join as member.</a><br>Email <a href="mailto:acs.wa@acs.org.au" target="_blank">acs.wa@acs.org.au</a> to claim your free registration.<br><br>The half day summit will provide delegates with an update on the latest tools, technology and practices in Cyber Security. There will be three sessions covering the following topics: -<br><br><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><b>Session 1:  Latest development in ISMS (Information Security Management System) - Presented by Terry Walsh</b></span></span> <ul><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">What makes up a security program (ISMS)?</span></span></li><li><font face="Calibri, sans-serif"><span style="font-size: 11pt;">What is needed to have a true </span><span style="font-size: 14.6667px;">defence</span><span style="font-size: 11pt;"> in depth strategy?</span></font></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Information security management system (ISMS)</span></span></li></ul> <span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><b>Session 2: Securing our Digital Future - Presented by Tony Marceddo and Mike Johnstone</b></span></span> <ul><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Cyber Security – concerns, trends and facts (the last 12 months) </span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Changing shape of research </span></span> <ul><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Critical infrastructure</span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Digital Forensics</span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Secure Systems </span></span></li></ul> </li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Case studies </span></span> <ul><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Shipping</span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Drones</span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Anti-Machine Learning</span></span></li></ul> </li></ul> <span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;"><b>Session 3: SOAR as a service (Protect, Detect, Respond) - Presented by Adam Bennett</b></span></span> <ul><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">Does your organisation need it?</span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">SOAR as a service - how it’s not just about protection but detection and response</span></span></li><li><span style="font-size: 11pt;"><span style="font-family: Calibri,sans-serif;">How do end customers put this into practice?</span></span></li></ul> <br><b>PROUDLY SUPPORTED BY</b><br><a href="https://redpiranha.net/" target="_blank"><img alt="User-added image" src="https://acsau.file.force.com/servlet/rtaImage?eid=7010o000001ezsx&amp;feoid=00N9000000EVCh7&amp;refid=0EM0o000001gt7I"></img></a><br><br><img alt="User-added image" src="https://acsau.file.force.com/servlet/rtaImage?eid=7010o000001ezsx&amp;feoid=00N9000000EVCh7&amp;refid=0EM0o000001gt7c"></img>

AGENDA

 SCHEDULE  ACTIVITY
 08:30 AM - 09:00 AM  Registration Open                          
 09:00 AM - 09:15 AM  Opening Address                          
 09:15 AM - 09:50 AM  Session 1 - Latest development in ISMS (Information Security Management System)                          
 09:50 AM - 10:15 AM  Morning Tea                          
 10:15 AM - 11:00 AM  Session 2 - Securing our Digital Future                          
 11:00 AM - 11:45 AM  Session 3 - SOAR as a service (Protect, Detect, Respond)                          
 11:45 AM - 12:00 PM  Event Close                          

Contact Details

Share this event:

CPD HOURS

3

SKILL

Speaker

Adam Bennett

Adam Bennett

Adam Bennett, CEO at Red Piranha
Both a professional project manager and ethical hacker, Adam has studied Computer Science and Information Security at AMTC, MIT, and Charles Sturt University. With over 20 years in professional management – a decade of those spent in the security and risk management industry – Adam has previously held positions on the board of Australian listed public companies and is the chair of the business development committee of Electronic Frontiers Australia; he is also a member of the Linux Foundation, ISACA. Adam now sits at the helm of Red Piranha, Australia’s only dedicated next-generation firewall manufacturer (United Threat Management solutions).

Show More

Speaker

Mike Johnstone

Mike Johnstone

Mike Johnstone, Associate Professor at ECU
Mike is an Associate Professor at the School of Science at Edith Cowan University where he teaches secure programming and advanced software engineering.  As a senior member of the Security Research Institute at ECU his work on resilient systems covers secure development methodologies, wireless sensor networks and the security of IoT devices with a focus on critical infrastructure. With over 30 years of experience in ICT, he provides consultancy services in cyber security for private industry, government and research organisations and has held various IT roles including programmer, systems analyst, project manager and network manager before moving to academia.

Mike serves on various cyber-related conference committees and is the current chair of the Australian Information Security Management conference.  He is also the theme lead for Network Forensics-Response to Emerging Threats in the Industry-driven, Federally-funded Cyber Security Co-operative Research Centre.

Show More

Speaker

Tony Marceddo

Tony Marceddo

Tony Marceddo, Director at Institute for Securing Digital Futures

Tony Marceddo as the Director leads the strategy and development of the Institute for Securing Digital Futures (ISDF), a new whole-of-institution interdisciplinary research institute that builds on ECU’s existing strengths in cyber security, digital forensics, network security, information warfare, and physical and infrastructure security. Tony has demonstrated his skills as a trusted business manager, and program director through over 30-years leadership experience spanning numerous industries including the Defence, Intelligence, Space, Cyber and Communication sectors. In his previous role, Tony served as General Manager of Vault Cloud, leading the development and implementation of Vault’s’ operational strategy and ensuring the smooth running of the governance of the company. Previously, Tony was General Manager of Australian Intelligence and Cyber Security at Northrop Grumman. He was responsible for the incorporation of M5 Network Security into Northrop Grumman operations. The integration included the delivery of key projects to the Defence industry.  Previously, Tony spent over 25 years working for Government in range of management roles in Defence Intelligence.
Tony’s achievements in the Defence and Intelligence sectors have been recognised by the Australian and United States Intelligence communities. Tony has been awarded a United States Intelligence Medallion and an Australian Intelligence Community Medallion.

Show More

Speaker

Terry Walsh

Terry Walsh

2 Brodie-Hall Drive,Bentley,WA,Australia

  • where

  • Technology Park Function Centre (Seminar Room 2)
    2 Brodie-Hall Drive
    Bentley WA 6102
  • when

  • Event Start:
    Wed 26 Feb 08:30 AM AWST

    Event Finish:
    Wed 26 Feb 12:00 PM AWST
  • event price

  • -

Recommended Events

Event Terms and Conditions

Disclaimer

  • ACS reserves the right to change the program at any time. Every effort will be made to ensure a program of equivalent standard and members are updated with changes.
  • All dietary requirements are considered, however we cannot guarantee a 100% allergen free environment.
  • ACS reserves the right to prohibit entry or eject any person from an ACS event based on behaviour deemed inappropriate by ACS staff, its agents and/or others working under its authority.
  • Filming or streaming by attendees is not permitted. If an attendee is found to be doing so they will be asked to leave the event immediately and further action may be taken.
  • Photography and/or filming may take place during this event, by accepting these terms you consent to this. Please let a member of ACS know if you do not want your picture taken.

COVID-19 Event Attendance Compliance

By registering to attend an ACS in person event you are agreeing to the below terms and conditions

  • If an attendee is displaying flu or cold like symptoms in the days leading up to the event and therefore is not able to attend, ACS will refund the registration fee.
  • If an attendee comes to an event and is displaying flu or cold like symptoms they will be asked to leave
  • We ask all ACS members to respect the social distancing guidelines, if an attendee repeatedly disregards these guidelines, they may be asked to leave
  • ACS reserves the right to cancel the event within 24 hours' notice if either the speaker or the event host has advised us that they are exhibiting flu or cold like symptoms
  • All attendees must provide a valid phone number and email address to be contacted on if there is reason to notify about a possible COVID-19 exposure

Personal information collection notice

By registering for this event, you are providing personal information to the Australian Computer Society. In accordance with the ACS Privacy Policy, ACS collects personal information through registrations and attendances at its events for the purposes of:

  • organising and providing the various professional development events held by the ACS (including for example, courses, conferences, seminars, workshops, launches);
  • processing and managing event registrations (including catering for dietary requirements);
  • maintaining event attendance records;
  • contacting registered event guests with information in regard to the event and seeking post-event feedback;
  • communicating with you to in relation to future events or ACS products, courses, services, promotions or other products or services that ACS reasonably thinks may be of interest to attendees;
  • processing and responding to attendee inquiries; and
  • conducting research to improve its events and better understanding needs. 

If the required information is not provided, we or any involved third parties, may not be able to respond to you, update you, or provide appropriate services or events to you.

We may obtain personal information directly from you or from someone who registers for the event on your behalf. If you provide us with personal information about another person, you must do so only with their consent and agree to make them aware of this privacy notice.

ACS may share your personal information with third parties for the collection purposes noted above or as set out in our Privacy Policy, where it is reasonably necessary for, or directly related to, one or more of our activities, or required by law.

When you register to participate in an overseas event, we may send personal information we collect overseas.

See our Privacy Policy at https://www.acs.org.au/privacy-policy.html for more information about our privacy practices.