SYDNEY, November 20. Although the title of distributor M Tech’s recent security conference was ‘Big thinking’, most presenters warned of the need for perpetual vigilance in protecting solutions, networks and data . There were seven presenters from leading industry players.
The in-house event at Dockside, Darling Park, Sydney, targeted the end user market, focusing on CIO, CTO, CSO, CFO, decision-makers from sectors including IT, Banking Finance and Government. The event drew 40 delegates.
Keynote speaker Ralph Pisani, Senior VP Worldwide Sales at Imperva, discussed ‘The compromised insider’ - the employee who unknowingly has a machine infected with targeted Trojans which is used to steal sensitive data. The trend to BYOD – bring your own device - deepens this problem, as does the consumerisation of IT, reference to the growth in finances and sophistication of hacking.
Dung Hua, Senior Sales Engineer from Websense, cautioned that a single breach can change a company’s future. He says CISOs are losing control of platforms and channels; end-points are becoming user-owned mobile devices; cloud applications now deliver data to uncontrolled locations and networks; and perimeters are open to social networking, social media, and the cybercrime that comes with them. He said: “Security has evolved - the bad guys’ modus operandi has changed, and the enemy is in your blind spots seeking your valuable data.”
Nathan Godsall, Riverbed’s Technical Account Manage Channels, said enterprises can successfully and intelligently implement strategic initiatives such as virtualisation, consolidation, cloud computing, and disaster recovery without fear of compromising performance.
Lawrence Loh, Regional Director Asia Pacific for Tufin, noted that little has changed in the way firewalls are managed since they were invented over 20 years ago - security experts still define individual rules on every firewall to grant or deny access. What has changed dramatically is the complexity of the operation. In today’s complex environment most policy rules/ACLs are related to application connectivity requirements, while most firewall policy changes are application-related. A great deal of time is spent on application deployment and decommissioning - and many organisations experience application connectivity disruptions as a result of network configuration changes.
Lawrence commented: “It’s clear that in order to meet the changing demands of the business and the increasing complexity of the infrastructure, a paradigm shift is needed in the way that firewall policies are managed.”
Anthony Mahoney, Sales Engineer ANZ for SolarWinds, presented on ‘Unexpected simplicity in IT management’, while Jason Ha, National Manager for Security at Dimension Data, discussed ‘Selective automated protection – putting visibility, awareness and protection into practice. Rick Choo, Regional Sales Director at BT, presented on IP address management for the new Internet.
About M.Tech Group
The M.Tech Group of companies is part of the Singapore Exchange-listed Multi-Chem Group. Established in May 2002, M.Tech is a leading regional distributor of IT security, application delivery, network and video communication solutions, with operations in 30 cities in 15 countries across APAC. M.Tech is also an authorised training centre for security and network certified courses.
For more details about M.Tech and its full spectrum of integrated products and solutions, please visit www.mtechpro.com For more information
Monica Chong, M.Tech Australia Phone: +61.2.8987 0400 Email: email@example.com
David Frost PR Deadlines, for M.Tech Australia Phone: +61.2.4341 5021 Email: firstname.lastname@example.org
Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint
Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.
Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation
CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)
Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana