Establishing a Cyber Security Centre

Marianne Cologon, Acting Chief Information Security Officer at Australian Digital Health Agency, presented a workshop on “Establishing a Cyber Security Centre”

Establishing a Cyber Security Centre is a complex and highly challenging process. Marianne shared the ADHA’s journey, lessons learned, and the challenges of creating a Cyber Security Operations Centre including:

  • Building Strategic Partnerships (Cyber is the ultimate team sport)
  • Defining Strategic Outcomes
  • Operationalizing the Security Operations Centre

About Marianne Cologon
Marianne started out her career working for ACT Health across a range of IT & risk related areas. She then moved into Federal Government, working with critical infrastructure organisations to improve the security of telecommunications & industrial control systems. Since then she has worked across a wide range of organisations in operational and non-operational security roles, prior to commencing with the Australian Digital Health Agency in 2015. She is currently the Acting General Manager and CISO for the Agency’s Cyber Security Centre, and also Director of Cyber Security Operations.

Critical infrastructure and risk

Garry Bentlin, Chief Security Officer at TransGrid, presented a workshop around “Critical infrastructure and risk”

How we work with risk in critical infrastructure? Garry discussed the risk equation versus the threat actors that are faced – defining an event horizon or sweet spot where intelligent investments can balance the risk/threat equitation versus the investment in counter-measures.

About Garry Bentlin
Garry Bentlin has over two decades of experience in mission-critical IT environments, ranging from energy, mining financial services, airlines and transport, the Sydney Olympic Games, and the Australian Government. He has eighteen years’ experience in IT Security in roles such as CISO, Deloitte’s National Director for Cyber Security, IBM Delivery Project Executive, line manager and client security adviser and have delivered numerous cybersecurity transformation programmes.

Case study on third party risk assessment – Practical approach

Lakshmana Ganugapati, APAC Information Security Director at Aon, presented a “Case study on third-party risk assessment – Practical approach” during his workshop at the CIO Leaders Summit.

This session aimed to promote discussion around third-party risk assessments depending on the scope of services.

About Lakshmana Ganugapati
His role is to lead and enable Aon business to pro-actively and proportionately manage security risk. He is a dedicated IT risk and security management professional with more than 12 years’ experience across various domains (IT operations, infrastructure and security).

Implementing a risk-based approach to privacy and data protection

Fred Thiele, Chief Information Security Officer at Velocity Frequent Flyer, presented a workshop around “Implementing a risk-based approach to privacy and data protection”

This session covered practical implementation of a risk-based approach to help map risks back to control frameworks for information security and privacy.

About Fred Thiele
Fred Thiele is a career-long information security professional that was fortunate enough to discover the field in 1998. Fred takes a pragmatic, risk-based approach to bring successful information security programs to both greenfields and established enterprises.  He currently protects the data of over 9 million Australian’s as the CISO and Transformation Program Director of Velocity Frequent Flyer.

New Zealand’s cyber security strategy

Paul Blowers —Chief Information Security Officer, New Zealand Police Force, Special Advisor National Cyber Policy Office, Department of Prime Minister & Cabinet, New Zealand— presented the session New Zealand’s cyber security strategy.

As CISO’s we wear many hats: advising the board, setting the strategic direction, managing policy, interpreting legal requirements, ensuring systems are safe to operate, overseeing risk and compliance, managing disparate teams of multi-skilled experts. In short: enabling the business but all too often we are embroiled in day-to-day operational matters.

However, our role is changing as businesses face a host of new digital challenges including: risks generated by the ubiquity of emerging technologies, globalisation of information assets, the ever-changing threat landscape and increasing sophistication of cyber-criminals.

I am currently completing my SABSA Masters degree on the topic of Offender Identity Management. I am an experienced executive manager and strategist with expert knowledge of Data and Information Governance. Developing associated security (including Cyber), compliance and assurance related strategies are key themes. I have extensive experience in the industry and cyber environment and formally qualified as a security management professional with a comprehensive business-centric IT security architecture and engineering background. My business knowledge has largely focused on organisations dealing with Law Enforcement, Border Security, Defence, Intelligence and critical infrastructure related matters in both the private and public service sectors. I have a first class record of achievement and considered an innovative thinker who advocates the use of the Sherwood Applied Business Security Architecture (SABSA) approach to deliver business facing solutions that balance governance, risk, compliance and assurance with business continuity, reliability and value. I have extensive knowledge of a wide range of data and international information, security and risk standard. My current areas of research include progressing mobility as a business enabler (where supported the secure implementation of the single largest deployment of law enforcement mobile devices worldwide), identity management, business intelligence, digital evidence, content management and information loss protection associated with the threat of systemic insider behaviors. Internationally respected, I have been invited to speak at many security-related conferences both as a presenter and expert panelist in Washington DC (Protect Conference), Melbourne (Connect 2014), Dublin (COSAC) and New Zealand.

Cyber Crime, the changing landscape, insider threats

Jennifer Stockwell, National Cyber Security Advisor at Telstra, moderated the panel: Cyber Crime, the changing landscape, insider threats

Panellists included:
– Liam Connelly, Head of Cyber Security, SEEK
– Sandra Barns, Chief Technology Officer, Vic Super
– Detective Sergeant Spiros Drossos, Team Leader, Cybercrime Operations, Melbourne

The session covered:

– What are our security leaders’ priorities in the current cyber threat landscape?
– What does the next generation of cybercrime threats look like and how should industry/law enforcement engagement evolve to address this?
– With limited resources, how much can/should businesses focus on the insider vs. external threats?
– We increasingly learn of hybrid threats e.g. influencing/information operations combined with espionage – what do we need to change to minimise the impact? And whose responsibility is it?

Jennifer is a Cyber Intelligence and Security specialist who has led cybercrime and intelligence projects in the UK, Middle East and Australia. As a trusted advisor to Telstra’s CISO Asia Pacific, Jen currently oversees Telstra’s partnerships and engagement with government on all things cyber security and cyber policy.

Liam Connolly is Head of Cyber Security for SEEK, where he is responsible for all aspects of cyber security. He has more than 15 years of progressive information security experience in a wide range of disciplines, including incident response and forensic investigations, security operations, application security, threat intelligence, security training, governance, risk management and compliance.
Prior to coming to SEEK, Liam was the CISO for Zynga and has held security leadership and technical roles at HSBC, AT&T, and University of California, Berkeley. Connolly’s expertise is in working with organisations to assess their information security risk posture to better understand their security-related risks and then designing, implementing and managing a security program – often from the ground-up – that is aligned to the organisations culture, vision and strategic initiatives.

Sandra was appointed Chief Technology Officer and CISO of VicSuper in January 2018. Sandra is responsible for Technology Strategy, Operational Systems, and Information Security across the Fund, supporting and enabling business growth and retention, delivering transformational change to achieve our strategic and operational goals, and enabling business efficiency to deliver value for Members. Sandra is a seasoned technology professional with extensive experience in financial services, superannuation, technology and technology- enabled transformational change. Most recently she was the Chief Technology and Security Officer at AustralianSuper, and previously held senior roles at NAB, Goldman Sachs and Tabcorp.

Detective Sergeant Spiros DROSSOS is the Team Leader of the AFP Cyber Crime Operations Team in Melbourne. He recently commenced leading the team after over 12 years investigative experience in Counter Terrorism. He has contributed over 25 years in Australian policing, across a number of jurisdictions, with deployments in community State policing and country policing with Victoria Police. Internationally, as the Counter Terrorism Liaison Officer in Washington and as a Senior Investigating Officer in Joint Counter Terrorism Team investigations. Most recently, he executed leadership roles on a number of domestic terrorism plot cases, including, Operations Rising, Amberd and Kastleholm in Melbourne and the resolution of Operation Middleham in Far North Queensland. He has a Bachelor of Science with Honours in Geology, but gave up looking for clues in rocks and now looks for clues in computers.


Working with suppliers to uplift their cyber security maturity

Wouter Veugelen, Chief Information Security Officer at Primary Health Care Limited presented the case study: Working with suppliers to uplift their cyber security maturity.

The security maturity of key suppliers for a number of industries is lower than desired, often leaving CISO’s with no other option than to work with vendors that do not meet their desired security requirements. This session explored some common challenges and learnings from recent vendor engagements.

– The challenges associated with considering security as an afterthought

– Selling security to your business executives as a key business enabler, to make sure security is a key decision maker during the supplier evaluation process

– How to educate and influence vendors to uplift their security maturity.

Wouter is a Chief Information Security Officer with 15+ years of professional experience in technology and cyber security. His industry experience spans different sectors including Financial Services, Health, and Energy, Utilities and Mining sectors both in industry roles as well as within professional services. Wouter obtained a master of science degree in information & communication security from KTH Royal Institute of Technology, Scandinavia’s largest technical university and conducted his thesis project for Microsoft, where he was involved with the integration of the Belgian electronic identity card middle-ware with Microsoft’s identity management system Windows CardSpace.

Context, Collaboration, and Culture

Richard Addiscott, Director of IT Planning and Security at Curtin University presented the session “Three C’s of an effective information security program in the age of digital disruption: Context, Collaboration, and Culture.”

To ensure information security teams are really keeping in step with their organisations – as they’re being disrupted or if they’re the disruptor – these three elements provide the critical underpinnings of an effective information security program.  This presentation provided an insight into the high-level approach Richard and his team have adopted to deliver high-quality information security outcomes, including certification to the ISO 27001:2013 standard, at Curtin University.

Richard Addiscott’s IT career spans 15 years and, since April 2015, has led Curtin University’s information security, IT planning and governance team. He has worked as an IT leader in some of Australia’s most secure environments across the National Security Community and was a Technical Advisor to the first Australian National Security Chief Information Officer. In the highly dynamic and competitive higher education sector, Richard’s primary focus is developing business aligned and risk-appropriate information security capabilities to assist generate business value in Curtin’s innovation fuelled digital environment. Richard holds a Bachelor of Science in Software Engineering from ECU, a Graduate Certificate in Public Sector Management, and a Master of Strategic Studies from the ANU Strategic and Defence Studies Centre.

The human element in a strong cyber risk framework

Steven York, Chief Security Officer, Bank of Queensland, discussed around the topic The human element in a strong cyber risk framework.

Cyber incidents have been increasing around the world and particularly more focus is being placed on data security.  In Australia, the Office of the Australian Information Commissioner – (OAIC) has new powers in respect for this risk.  The NIST framework gives some guidance in how to organise cyber risk management for an organisation, however organisations often overlook the human element in the framework elements (Prepare, Prevention, Detect, Respond and Recover). This session covered the human element in a strong cyber risk framework.

Steven York has had a unique career commencing as a clerk at AMP, then joining the NSW Police force, working there for 20 years, leaving in 1996 as the Commander of the Hostage Negotiation Team. From 1996 he has been involved in risk management and contributed to the first risk management standard AS/NZ 4360. He built up his own risk consulting company with many high profile clients. In 2000 he sold his share and commenced work as an Executive Manager, Operational Risk at the CBA. At that time he was involved in the introduction of the Basel I across the CBA Group. Since then he has worked as a senior consultant (Partner, Deloitte Central Europe, Enterprise Risk, and Marsh McLennan, General Manager, Risk Consulting) and senior internal corporate roles (CBA, General Manager, Security and Financial Crime). He is currently the General Manger Group Compliance and Chief Security Officer (CSO) at the Bank of Queensland. Steve has been awarded the National Medal and received several commendations for bravery and police work up to counter terrorism level. In addition he is a sought after speaker in risk, security and negotiation.  He has co-authored a book, ‘Negotiation Evolved’ and is currently completing his second in the area of high risk negotiation, tentatively titled ‘Crisis Negotiation Evolved’.. He was a member of the Education Committee, Operational Risk Management for the Governance Institute of Australia from 2014 to 2017.  He was a member of the Information Technology Security Techniques at Standards Australia between 2013 and 2016 and is currently a mentor for the students at QUT in the Masters of Business Administration degree. He has a Master of Science (Risk) and a Master of Dispute Resolution and lectured in that area at UTS for 16 years particularly in the area of negotiation and crisis negotiation.

Cyber Security and Innovation: Protecting business IoT, cloud and mobile systems

Jonathan Jackson –  Head of Technical Solutions, Asia Pacific & Japan at BlackBerry has engaged the audience on Cyber Security and Innovation: Protecting business IoT, cloud and mobile systems

During his session, Jonathan has addressed a number of questions:

  • Business today needs to embrace innovative technology such as Enterprise of Things, cloud and enterprise mobility to remain competitive. But what is the price of this innovation?
  • In a world when cyber attacks are increasing in frequency and severity, how do you ensure your innovation and company data is protected?
  • How can security, cloud and mobile vendors work together to ensure systems are secure?
  • With increasing compliance and regulatory requirements being enforced, how can companies ready themselves for topics like GDPR and Mandatory Breach Notifications in 2018?
  • With employee risk to cyber security increasing on mobile devices, how should companies prepare for these threats?

Jonathan brings over two decades of tactical experience in the development and management of secure, scalable systems. He has been with BlackBerry for 5 years and was the Head of Security Advisory for ANZ before assuming his current role. Jonathan advises customers navigating the world of enterprise mobility and cyber threats, working with them to develop a mobile strategy that satisfies both the demands of IT and end users now and in the future.


Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed a leo quis purus feugiat facilisis. Interdum et malesuada fames ac ante ipsum primis in faucibus. Aliquam quis elit tristique, efficitur enim viverra, consequat odio. Duis porta ipsum ut magna dignissim vestibulum. Ut finibus augue nec mi maximus, nec laoreet arcu sagittis. Fusce pellentesque ipsum non lobortis bibendum. Sed consectetur dolor et ligula venenatis facilisis.


Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed a leo quis purus feugiat facilisis. Interdum et malesuada fames ac ante ipsum primis in faucibus. Aliquam quis elit tristique, efficitur enim viverra, consequat odio. Duis porta ipsum ut magna dignissim vestibulum. Ut finibus augue nec mi maximus, nec laoreet arcu sagittis. Fusce pellentesque ipsum non lobortis bibendum. Sed consectetur dolor et ligula venenatis facilisis.

Top of Page