Print Friendly and PDF

PROGRAMME

Here’s what we have prepared for our delegates over the two days of ANTICIPATE 2016.

18 May 2016 (Wednesday)

Time
Session Title / Topic
AM Arrival of Overseas Delegates
18:30 - 20:30 Welcome Reception & Dinner




19 May 2016 (Thursday)

Time
Session Title / Topic
08:15 - 09:00 Registration and Networking Breakfast
09:00 - 09:20 Welcome Address
09:20 - 09:50 Anticipate: Secure The Next
09:50 - 10:20

Analyst Keynote:
Anticipating the next Security Frontier - The 3 Cs, Conversation, Control and Convergence
Is your organization prepared for the convergence between the physical and cyber environments? Are you equipped with the right tools to make the right decisions?

With cyber attacks leading to ever greater consequences, cyber security is increasingly becoming a topic that is discussed at the board level. The onus has also fallen upon business leaders to take greater ownership over cyber security matters. Are you ready to have the right conversations with the right stakeholders across the organization?

The ongoing migration to the cloud computing paradigm, coupled with the emergence of IoT trends, have led to greater demand for threat intelligence and visibility tools. Organizations are looking to better manage environments characterized by dissolving perimeters, increasing threat vectors and growing problems of insider threats. Do you have the right tools to gain greater control and make better decisions regarding your organization’s IT footprint?

Cyber threats are leading to physical consequences. With more cyber attacks targeted at critical infrastructure and industrial control systems, the convergence between the physical and cyber aspects of security is happening sooner rather than later. As such, it has become more pertinent for organizations to develop more resilient systems to enhance their responsiveness towards cyber attacks. Is your organization resilient in the face of increased convergence between the physical and cyber environments?

10:20 - 10:40 Networking Morning Tea Break
10:40 - 11:00 An Industry Viewpoint: CIMB Bank
11:00 - 11:30 A Technology Perspective: FireEye
Assume you are breached. Now what? Changing the cyber security story from being a victim to being a hero.

Most organizations don’t detect they are breached, and when they do its usually because a 3rd party told them. How do you answer the questions the business needs answers to? How did this happen? Who did it? What did they take? What is the business impact? Is the attacker completely gone? We look at the questions the business asks, and how you can rewrite the story you tell them. Learn to use prevention, breach detection, threat intelligence, and forensics capabilities to change the story from “we don’t know” to “we saved the day!”

11:30 - 11:40 NWA's Enterprise Security Survey 2016: Top Security Concerns of the Digital Economy
11:40 - 12:20
In Conversation with Security Leaders: "The Future of Cyber Security in the World of Apps and Things"            
12:20 - 13:30 Networking Lunch and Security Solutions Showcase
13:30 - 13:50 An Industry Viewpoint: Directorate General of Taxes (DGT), Ministry of Finance of Republic of Indonesia
13:50 - 14:20

"Secure your Apps, Protect your Brand"
Protect your data, application wherever it lives, without operational complexity

Protect the lifeline to your business and ensure your business critical applications are constantly available, even in the face of the most sophisticated network and application-level DDoS attacks. Be the omni-present brand that your customers can turn to.
Keep security close to the app to safeguard your customers’ data and protect against data theft. Be the trustworthy brand that your customers can rely on.
Drive business agility without compromising security—extend consistent security controls and policies from the data center to the cloud with hybrid security solutions. Be the dynamic brand that your customers can look up to.
Find out why you need to protect your applications—and your data—to make your brand and your business more appealing to your customers.

14:20 - 14:40

An Industry Viewpoint: Catholic Education South Australia

14:40 - 15:10

Realize Increased Productivity with a Safe and Seamless user experience
Identify ways you can use application intelligence to apply consistent security policies across hybrid environments

‘Humans are often the weakest links when it comes to security’ - Mitigate the increased risks posed by employees by authenticating and authorizing the right people to the right information and by ensuring they connect to applications securely.
Cater to the increasingly dynamic workplace and multi-varied work styles by adopting a contextual and risk-based approach to access management that improves end-user experience without compromising security.
Find out how you can protect your users and their data by securing their access to your critical business assets – improving productivity without compromising security.

15:10 - 15:30
Networking Afternoon Tea Break and Security Solutions Showcase
15:30 - 16:00

A Technology Perspective: Cisco Systems
Security for the Digital Economy

Digitisation and the IoE have created unprecedented growth opportunities for both businesses and attackers.
With more than 50B connected devices estimated by 2020, everyone is focused on how digitization will impact or transform their business - from enabling innovation to protecting infrastructure to safeguarding critical data as the attack surface increases. Done right, security will be pervasive and integrated - from the network to the mobile user and from the cloud to every corner of operations - wherever employees work and data resides. Learn how security can help you protect and grow business.
 

16:00 - 16:30

Achieve peace of mind by stopping the “Cat & Mouse” game!
You can’t secure what you can’t see. Know your users, know your apps, Anticipate your business roadmap!

Given that it is no longer a case of if but a case of when your organization is faced with a cyber attack, it is important to gain greater intelligence and predictability regarding your threat environment.
Beyond threat prevention, it is becoming critical for organizations to build up greater responsiveness and resiliency towards cyber attacks.
At F5, we are committed to building greater threat intelligence, monitoring and incident response capabilities for our clients. Find out how we are constantly ahead of the bad guys by leveraging our intrinsic understanding of applications

16:30 - 16:50 Closing Address