Agenda
Tuesday, 5 April 2022
Registration & Check-in
Secure your seat in the keynote room for the day.
Welcome to the 4th Security Edge: Risk, Visibility & Protection in a Distributed World
Jim Berry - CEO at ADAPT
Australia is experiencing rebounds in business and consumer confidence, helping maintain our V-shaped recovery, but we have evolved new hybrid and distributed ways of working.
The silver linings of the pandemic include accelerated digital projects and maturity, alongside the reduction of several pre-existing barriers to transformation – and we must adapt to doing business in this higher risk landscape.
Security Edge will take you and your peers on a practical journey to overcome the key challenges around your role in managing people, delivering digital resilience and protection, while maintaining visibility over a blurring domain.
ADAPT Research: The Collective Intelligence: Insights from CIO, CFO & Security Edge Surveys
Matt Boon - Director of Strategic Research at ADAPT
ADAPT’s research and advisory leadership team reveal the latest local fact-based insights, based upon 10,000 conversations and over 1,000 detailed surveys of our region’s executive digital and IT leaders.
Matt reveals the core findings distilled from your aggregated pre-event surveys and those of your executive CFO, Digital and CIO peers on their drivers, aims and opinions on security strategy. Also comparing the investment priorities, resource allocation and unique challenges of the Australian CISO for you to benchmark and validate your thinking.
Architecting the Safety and Security of Customer Data
Exclusive Q&A with Assaf Keren - CISO & VP, Enterprise Cyber Security at PayPal
Assaf Keren
- CISO & VP, Enterprise Cyber Security at PayPal
Aparna Sundararajan
- Senior Research Strategist at ADAPT


ADAPT Analyst Aparna Sundararajan interviews Assaf as he joins us live from San Jose.
We are honoured to welcome live from the USA one of the world’s foremost security leaders.
Assaf is the CISO & VP, Enterprise Cyber Security organisation in PayPal, in charge of delivery of PayPal’s security strategy by designing, building, and operating security products and services. He has been working in the security field for the last 19 years and has been an entrepreneur, vendor, operator, and leader in large corporations.
This includes a former role securing and protecting the Israeli governments networks and systems.
We will debate modern security architecture to protect customer data at PayPal, where ‘good’ yesterday is not good enough today:
- Challenges of safety and security of customer data
- Zero trust architectures
- Privacy and balancing GRC
- Fraud engines to ensure customer protection
This exclusive session will allow time for audience live Q&A under the Chatham House Rule.
The Modern CISO Mindset: Shifting from Accountability to Action
Ben de Bont - CISO at ServiceNow
The threat landscape continues to evolve at a record pace. As a modern CISO in an increasingly complex cybersecurity environment, you’re being called to do the same. In this keynote, Ben de Bont, ServiceNow CISO, will discuss the critical mindset shift he has made to drive maximum impact for his organisation.
He’ll offer recommendations on how global CISOs can transform from being accountable for policy, architecture, and guidelines to actively driving and implementing proactive change across the enterprise. You’ll walk away with an understanding of how to effectively know and report on the true state of your exposure so you can minimise your organisation’s risk and maximise its innovation and productivity.
Refreshments Break
Served to your table.
Operational Empathy: How to Create and Retain a High Performing Team?
Liz Kreuger - Associate Principal at NOBL Collective
In today’s increasingly competitive market, facing fatigue and retention challenges, leaders need to create and foster high-performing teams if they’re going to achieve their goals. But what actually makes for a high-performing team? And how do leaders accomplish this monumental undertaking while juggling their daily demands?
While there’s no one recipe for success, there are core elements that Security leaders can leverage to help teams perform at their best.
Liz is an Associate Principle at NOBL, a global organisational design firm born in the US with a new office in Sydney. At Security Edge 2021, she’ll break down what leaders can do to create and retain a high-performing team, drawing on her experience in operations, human resources, and organisational strategy to drive meaningful and lasting change.
Glass Half Full – Optimism in the Face of Cyber Security’s Existential Threat
Alastair MacGibbon - Chief Strategy Officer at CyberCX
The increasingly sophisticated and dynamic nature of cybercrime makes it an existential threat to our economy and our way of life. But there is cause for optimism, with government reshaping the regulatory landscape to make it fit for purpose, boards and executives improving their understanding of cyber risk and resilience, and more appetite for meaningful collaboration across the public and private sectors.
Australia has a bright future ahead, but to realise our potential in the post-Covid, digitally accelerated world, we need both the government and private sectors stepping up to their respective roles in ensuring we have the cyber capability and resilience to protect our critical assets and safeguard our economic prosperity.
Alastair is Australia’s most recognised cyber security leader, and is the Chief Strategy Officer at CyberCX. His leadership experience includes serving in senior cyber roles across government, as National Cyber Security Adviser, head of the Australian Cyber Security Centre and Special Adviser to the Prime Minister on Cyber Security, as well as serving as Australia’s inaugural eSafety Commissioner. Alastair has also held senior roles across the private sector, including head of eBay’s Asia Pacific Trust & Safety operations, and previously served in the Australian Federal Police for 15 years.
1-1 meetings with qualified Strategic Partners
Intelligently matched opportunities connecting the right people at the right time for the right reasons.
ADAPT Executive Insight Roundtables
Attend your pre-selected roundtable to participate in a peer discussion with confidence under Chatham House Rules moderated by an ADAPT analyst with subject matter experts.
Best Practices for Managing Cyber Risk and Building Operational Resilience for Critical Infrastructure
Rizwan Zaidi - ServiceNow Risk Solutions for Australia and New Zealand Brian Spring - ServiceNow Security Solutions for Australia and New Zealand

As the pressured business environment continues to evolve globally, many of us are adjusting our security strategy to ensure forward progress in a time of crisis. During times like this, we think sharing collective security wisdom is invaluable.
ServiceNow will lead a discussion to explore how industry leaders are addressing the following key topics:
- Managing risk and the evolving threats to critical infrastructure
- Security incident response and vulnerability response strategies
- Measuring cyber security success through operational efficiency gains
Redesign Your Network and Security for a Dynamic Modern Business
Raymond Maisano - Head of Australia and New Zealand at Cloudflare
The rapid shift to a digital world and mobile workforce requires networks to remain global, distributed, and consistently connected — with no lapse in security or performance. However, networking and security are converging but everyone has a different perspective.
As old network security models failed to keep up with developing threats, and modern-day network architecture increased in complexity, many organisations already made significant investments in their shift to the cloud. The ultimate challenge is how to achieve a streamlined approach for network security in the pursuit of building a resilient business.
Join Cloudflare for an interactive discussion on how enterprise companies of the future architect and optimise a secure network environment for an agile world.
Discussion points will focus on how to:
- Get started on the journey to Secure Access Service Edge (SASE)
- Develop the business case and decide what to include
- Address the overlap with existing systems in the cloud and associated risks
- Align siloed teams across security and network functions
- Review skills and capabilities needed for the roll-out and maintenance
Driving Change at Scale: Security's New Path for CISOs
Stephen Gillies - Technology Evangelist APAC at Fastly
As nations around the world grappled with global health risks since the start of 2020, businesses responded to the emergency with ad-hoc work-at-home arrangements to keep employees both safe and productive. That abrupt shift put the added strain on CISOs, CTOs and CIOs to ensure that employees could access the full set of services and applications needed to do their jobs securely (from wherever they’re working).
Half way through 2021, companies now need to ensure that those improvised changes to infrastructure and process are both resilient and secure — while continuing to press forward on other transformation initiatives.
Join Stephen Gillies, Technology Evangelist APAC at Fastly, in the roundtable session to discuss your thoughts and how businesses are re-thinking workflow and re-architecting infrastructure.
Revealing the (Open) Secret to Closing IT Accountability Gaps
with TaniumThis closed door session with your peers will discuss the secrets to closing IT gaps in visibility, accountability and resilience.
There are many point tools that deliver critical tasks across the business, but this variety leaves IT Ops teams and Security teams working in silos. It also creates critical gaps in IT Visibility, Security & Accountability. So, what do these gaps mean for the business? Are they more critical for CISOs than they are for CIOs? Most importantly, how can different units work together to close these gaps? Join experts and your peers for this roundtable debate – moderated by an ADAPT analyst.
Peer Networking Seated Lunch
Exclusive MIT Workshop: The 4 Pathways to Transformation and Future Ready Security
Peter Weill - Chairman and Senior Research Scientist at MIT CISR
As Chair of CISR at the MIT Sloan School of Management, Peter’s work centres on the role, value, and governance of digitisation in enterprises. He regularly advises the CEOs, Boards and Top Management Teams of Australia’s largest organisations, and their global peers.
Peter was ranked by Ziff Davis as the 24th most influential person in IT and the highest ranking academic. MIT CISR undertakes practical research on how firms generate business value from digital.
To help Australian CISOs to perform in their role in enabling digital innovation and implementing the right digital foundations for an unpredictable world, this live workshop will share what Boards, Executive Committees, CIO and Digital leaders of more than a thousand enterprises globally are planning.
Wherever your enterprise is on its journey to transformation it will soon be accelerating – but is security an afterthought or embedded into the transformation process?
Using latest global MIT research, Peter will describe:
- The 4 pathways to transformation for Future-Ready enterprises
- The financial performance of companies at various stages of transformation
- The four explosion enterprises have to manage
Then we will workshop effective approaches for embedding security into transformation and role of the CISO leaders.
Question we will address: How do some companies outperform the rest? How do you compare?
ADAPT has worked with MIT to help gather data from the AU/NZ region on the effectiveness of local transformation programs. In this interactive live session, Peter will draw on this fresh research, with local perspective and global comparison for CISOs to assess, reflect and secure the next rounds of digital strategy for the post lockdown world.
Panel Debate: Visibility and Securing the Clouds?
Aparna Sundararajan - Senior Research Strategist at ADAPT Dave Cowan - CISO at Link Group Mitra Minai - CISO at Healthscope


2020 saw huge cloud scale and 2021 experienced more transitioning to multi and hybrid cloud environments. However, without visibility, control and clear risk assessment, many are struggling to manage, detect and investigate threats across multiple services.
ADAPT research shows all tech leaders concerned with cloud security, and to assess the best strategies to do so, we bring together a mix of these leaders for an open debate – conducted under the Chatham House Rule.
1-1 meetings with qualified Strategic Partners
Intelligently matched opportunities connecting the right people at the right time for the right reasons.
ADAPT Executive Insight Roundtables
Attend your pre-selected roundtable to participate in a peer discussion with confidence under Chatham House Rules moderated by an ADAPT analyst with subject matter experts.
Security: Tools – check! Processes – check! But what about the People?
Simon Perry - Security Strategist and Senior Product Marketing Manager at VMware
Enormous attention has been paid over the last few years to the cyber-skills shortage, but has enough been paid to the overwhelming burden of work those already in the industry are facing? Surveys of those on the front line from Incident Responders to SOC analysts find that staff burnout is a rapidly increasing problem; 67% of frontline cyber professionals report they are considering leaving the industry entirely due to the work levels, stress, and burnout.
In light of the increasing workload on SOC teams, and as IT/cyber teams deal with supporting remote workers, zero day vulnerabilities, and with increased supply chain attacks, it is vital that we tackle the problem of staff burnout.
Join Simon Perry, Security Strategist and Senior Product Marketing Manager at VMware, for a discussion on how industry leaders are helping to drive the change needed to ensure that our people are successful.
Managing and mitigating the downstream impact of security incidents
Mickey Perre - Head of Solution Engineering & Cyber Security Strategist APAC at Devo
In today’s digital enterprise a lack of visibility across interconnected and increasingly unknown technologies, landscapes and users has caused weaknesses and vulnerabilities to rise dramatically. However, many organisations are still operating with the mindsets and strategies that belong to a pre-digital world of flat sets of siloed and visible technologies.
This Roundtable will firstly discuss and then tackle this ever-increasing problem, equipping you with the answers when your leadership teams and boards ask the question “what does this impact?”. Amongst your peers we will discuss how practices such as AIOPS in the SOC can help you build-out interdependent and relationship views of your network to increase the accuracy of information provided, giving you more time to understand downstream impacts and make the right decisions faster, with less overhead.
Effective Multi-Layered Security: Why Security Needs to Start at the Edge
James Richmond - Regional Manager for Australia & New Zealand at Akamai Technologies
Making sense of new or complex cyber-attacks is a challenge, but it can be even harder to rapidly adapt or scale your security protections in response. Nobody is starting from scratch, so it’s important to consider best practices for layering and integrating security controls. Please join us for this round table to dive into some of the main complexities security leaders are faced with.
We’ll explore the following topics:
- Detecting and mitigating complex cyber threats targeting cloud environments, apps & APIs and users
- Improving visibility to your attack surface and security controls to assist with regulatory compliance
- Planning and implementing effective multi-layered security across your ecosystem
This session will be moderated by an ADAPT Analyst and James Richmond from Akamai.
Taking Security to the Board
John Powell - Principal Security Consultant at Telstra PurpleMany Australian boards still struggle to understand cyber resilience, incident preparedness and cyber risk management. This is problematic given directors can potentially be held liable if they are not exercising care and diligence in relation to cyber security. As a senior executive, how do you ensure your organisation’s security posture is right, resilient and ready for the Board?
Join this roundtable session hosted by John Powell, Principal Security Consultant at Telstra Purple, where we will discuss:
- Cyber risk management and the necessary evolution needed to meet your transformation, optimisation, and regulatory obligations
- How to help the Board understand and prioritise security
- Shared real-world experiences in advising to Boards – an open discussion amongst peers
Australia 2030. Where the Bloody Hell Are We?
Rocky Scopelliti - Futurologist | Author | Professor | Board Director | Chief Scientist
There are enough challenges today within the world of security, but what is coming tomorrow? Wondering what is on the ‘other side’ of COVID-19 and what Australia might look like in 2030? Rocky details predictions about the decade ahead.
By invitation, 673 Australian professionals (170 classified as CEOs, Chairman, Board Directors) participated in this ground-breaking and Australian-first quantitative and qualitative study conducted before and during the eye of the COVID-19 storm. It considered our attitudes towards the decade ahead and how those changed during the COVID lockdown.
Rocky Scopelliti is a world-renowned futurologist. His pioneering behavioural economics research on the confluence of demographic change and digital technology, have influenced the way we think about our social, cultural, economic and technological future.
Security Edge Panel: Risk, Visibility & Protection in a Distributed World
Peter Hind - Senior Analyst at ADAPT Imtiaz Khan - CISO at Roads and Maritime Services Celeste Lowe - Group Director IT Security at Nine Entertainment Co


Our panel of experts and peers will debate the best tactics to manage Risk, enable Visibility & ensure Protection in a Distributed World.
We’ll close with commentary on the day’s main findings.
- How to win allies and build trust through partnerships – then how to foster them?
- Why it matters to share lessons learned? Why should companies be open about their security strategy?
- Why a CISO must ask: ‘Is the organisation thinking deeply about risk? How do you build the right culture of risk?
- Culture? Does security have the right level of visibility in the org?
- What do you need to do to make sure security is baked in and not an afterthought?
Security Edge Peer Networking Opportunity
Based in our keynote room – an opportunity to stay, mingle and meet other attendees over drinks and food and discuss the day.