Articulating Cyber Security Risk to the Board – Jason Anderson


Jason Anderson, Head of Information Security, QSuper

This session will look at how to go about articulating cyber security risk to the board in a way they understand.  It will focus on utilising the FAIR ontology to have appropriate conversations with the Board and business stakeholders.


Jason has been working in Information Security for more than 20 years and has a wealth of experience in Security, Risk Management, IT Governance and Compliance. He joined QSuper in June 2017 as the Head of Information Security.
Prior to this Jason was employed in similar roles across a wide range of industries both in Australia and the UK including Suncorp and SABMiller. Jason is a transformational security leader who has experience in delivering large security improvement programs and discussing issues at Board level. Jason holds various industry certifications including CISSP and an MBA from Southern Cross University.

Protecting the 3rd Largest City in WA – Gary Hale


Gary Hale, Chief Information Security Officer, Curtin University

During Gary’s workshop he shared his views and challenges involed in his role to create an agile, collaborative and resilient environment that enables learning, teaching and importantly fast tracks innovation while noting the increasing level of attacks on these institutions.


Curtin is an internationally focused research and teaching university based in Perth, Western Australia. We have campuses in Dubai, Malaysia, Mauritius and Singapore with strong connections to businesses, industries and over 90 universities worldwide.

With an emphasis on real-world issues, our students graduate job-ready with the skills to make tomorrow better.

AI & Machine Learning: Friend or Foe – Rhys MacFarlane


Rhys MacFarlane, Chief Security Officer, Luxury Escapes

Rhys held a workshop that addressed the rapidly escalating threat of AI/ML; assisting threat factor’s in target selection; scanning for enterprise vulnerabilities; and potentially covering all trace of an attack.

This workshop explored how AI/ML could also become a great ally to IT and security professionals – allowing for more advanced threat scanning and to enhance security teams’ efficiency by flagging and prioritizing issues in real time. Any improvements will undoubtedly be used by threat actors and it’s the duty of Security Officers to stay prepared and ahead of this coming wave.


Experienced Chief Security Officer – skilled in Physical Security, Loss Prevention, Risk Management, Internal Investigations, Leadership and Network Security. Strong military and protective services professional with a Bachelor of Arts – BA focused in Security, Terrorism and Counterterrorism from Murdoch University.

A CISO’s Playbook: Defence – Dynamic Security Strategies for an Uncertain Future – John Kouroutzoglou


John Kouroutzoglou, Information Security & Compliance Manager, Domain Group 

This interactive roundtable discussion provided a high level look at the following list of threats and how they’re addressed while including Q&A opportunities as the presentation covered these various topics:

  • Insiders & Outsiders
  • 3rd Parties
  • Competitors
  • Personal security risks
  • Physical security


John Kouroutzoglou has been involved in physical and cyber security operations and consulting for over 15 years. He has worked for large global organisations which include: Alcatel-Lucent, HP and EY. John is currently the Information Security & Compliance Manager at leading real estate tech company – Domain Group.




Converged Security (Physical and Virtual Security) – Nitin Singh


Nitin Singh, Director of Cyber Security, Victoria University 

Nitin’s roundtable discussion questioned whether the convergence of physical and cybersecurity makes sense.

Physical and cybersecurity are traditionally two distinct functions with similarities and synergies that are not leveraged most often. Everything across physical and cybersecurity systems, process and capabilities is converging which can have significant impact on safety and security of an organisation.


Experienced, certified (CISA/CRISC), results-driven and qualified Technology Risk, Audit and Compliance professional with 9 years of experience to strategise, execute and manage complex risk and compliance assessments across technology, security, business operations and large transformation programs.

Possess expert communication skills across diverse groups and all levels of management hierarchy with proven track record to work with senior executives and business unit leaders across Audit, Technology, Risk and Compliance Divisions of ANZ, NAB and various boutique insurance organisations.

Sound understanding of COBIT, ITIL, ISO/IEC 27001, AS/NZS ISO 31000:2009, Regulatory Risk landscape across Oceania and Asia-Pacific countries such as APRA (AU), RBNZ (NZ), MAS (Singapore), HKMA (Hong Kong) and BOI (Indonesia).

Specialties: IT Program Risk Management, IT Risk Transformation, Internal Audit, IT General and Application Controls Assessments, Regulatory and Compliance Assessment, Technology Governance, Identity Management, Project Management, Project Risk, IT Service Management.





Security in a Digital First Age – Chary Chigurala


Chary Chigurala, Head of IT, Laminex


Berys Amor – Director of Technology, Corrs Chambers Westgarth

Damien Scalzo – Chief Information Officer, Mercedes-Benz Financial Services AU/NZ

David McGrath, Chief Digital Officer, Clubs Australia

Chary hosted a panel discussion that shared insights and knowledge on how we can ensure security in a digital first age. The cyber threat landscape that is evolving at a phenomenal rate is not just new modes of attack or increased points of vulnerability that are proving problematic for security professionals it is also attitudes towards security are changing, too. Comfort levels with sharing information, transacting online and trusting third parties have never been higher.


A proven leader with 25 years industry experience in Fortune 100 and ASX 100 companies. He is incredibly passionate about designing and implementing future focused IT organisation strategies to succeed in the digital markets. His core skills include:

  • Providing vision and strategic leadership
  • Digital strategy
  • IT strategy & architecture
  • Leading high performance teams
  • Business engagement
  • IT enabled business transformation
  • Consulting
  • Large deal creation
  • P&L and budget management
  • Large projects management
  • Vendor management
  • IT service delivery and reporting






Berys Amor has worked in the legal sector for more than 25 years, starting in finance administration and then moving into information technology. She has worked for a number of top ten law firms and managed a range of areas within technology, including service delivery, training, system administration and project management. Berys has extensive experience in project management, having been a part of several large office moves and fit outs, major systems implementations and upgrades as well as the change management processes for implementing new systems.

Berys’ current role as Director of Technology at Corrs Chambers Westgarth involves collaborating with key business stakeholders to understand the business objectives and factors of success in the industry, and developing and implementing the IS strategy in line with the overall business strategy. She manages a national team which includes client technology solutions, IT project delivery, IT training, helpdesk and service delivery, and infrastructure and applications support. Berys is also a Knowledge Advisor for the International Legal Technology Association and was selected for CIO Australia’s top 50 CIOs for 2016.






As a technology leader I am responsible for:
– creating an IT vision and delivering the IT Strategy in alignment with the business strategy
– instilling structure, discipline and prioritisation across IT activities
– planning and governance of all IT Plan, Build and Run activities
– building and coaching a highly effective team across Australia and New Zealand
– make or buy decisions
– contract negotiations
– supplier management
– IT risk and security management.

From 2014 to present I have extensively scaled the size of the team, IT landscape and delivery velocity.

With many years of experience with custom development implementations, I often support my team during detailed technical decisions in relation to architecture, integration, code, databases and infrastructure. This supports the best decision for the business, gains respect from my technical staff and leads to the creation of a culture of collaboration and best practice sharing within the team.





David is a globally credentialed technology executive, specialising in data-driven digital transformation across corporations of various sizes and locations. Successfully developing and implementing large scale company-wide change, David’s recent projects include the technical coordination and build of large scale data assets, importantly including its protection through security, governance, and data regulatory compliance.

Complementary to this approach is also the ability to successfully craft an operational structure for “all of business”, including educational change at a departmental level endorsed through Executive / Board buy-in.

David’s career background also includes digital product monetization, customer / audience growth, plus extensive digital marketing (programmatic) utilising data intelligence. David has successfully built teams from scratch as well as taken on established corporate units, leading both content, development & sales across APAC (including Japan), UK and the US.

Other elements include being a member of various Boards, Advisory Boards, and Investor relationships across technology and Not-For-Profit organisations, as well as being a sought after speaker at industry conferences.

Establishing a Cyber Security Centre

Marianne Cologon, Acting Chief Information Security Officer at Australian Digital Health Agency, presented a workshop on “Establishing a Cyber Security Centre”

Establishing a Cyber Security Centre is a complex and highly challenging process. Marianne shared the ADHA’s journey, lessons learned, and the challenges of creating a Cyber Security Operations Centre including:

  • Building Strategic Partnerships (Cyber is the ultimate team sport)
  • Defining Strategic Outcomes
  • Operationalizing the Security Operations Centre

About Marianne Cologon
Marianne started out her career working for ACT Health across a range of IT & risk related areas. She then moved into Federal Government, working with critical infrastructure organisations to improve the security of telecommunications & industrial control systems. Since then she has worked across a wide range of organisations in operational and non-operational security roles, prior to commencing with the Australian Digital Health Agency in 2015. She is currently the Acting General Manager and CISO for the Agency’s Cyber Security Centre, and also Director of Cyber Security Operations.

Critical infrastructure and risk

Garry Bentlin, Chief Security Officer at TransGrid, presented a workshop around “Critical infrastructure and risk”

How we work with risk in critical infrastructure? Garry discussed the risk equation versus the threat actors that are faced – defining an event horizon or sweet spot where intelligent investments can balance the risk/threat equitation versus the investment in counter-measures.

About Garry Bentlin
Garry Bentlin has over two decades of experience in mission-critical IT environments, ranging from energy, mining financial services, airlines and transport, the Sydney Olympic Games, and the Australian Government. He has eighteen years’ experience in IT Security in roles such as CISO, Deloitte’s National Director for Cyber Security, IBM Delivery Project Executive, line manager and client security adviser and have delivered numerous cybersecurity transformation programmes.

Case study on third party risk assessment – Practical approach

Lakshmana Ganugapati, APAC Information Security Director at Aon, presented a “Case study on third-party risk assessment – Practical approach” during his workshop at the CIO Leaders Summit.

This session aimed to promote discussion around third-party risk assessments depending on the scope of services.

About Lakshmana Ganugapati
His role is to lead and enable Aon business to pro-actively and proportionately manage security risk. He is a dedicated IT risk and security management professional with more than 12 years’ experience across various domains (IT operations, infrastructure and security).

Implementing a risk-based approach to privacy and data protection

Fred Thiele, Chief Information Security Officer at Velocity Frequent Flyer, presented a workshop around “Implementing a risk-based approach to privacy and data protection”

This session covered practical implementation of a risk-based approach to help map risks back to control frameworks for information security and privacy.

About Fred Thiele
Fred Thiele is a career-long information security professional that was fortunate enough to discover the field in 1998. Fred takes a pragmatic, risk-based approach to bring successful information security programs to both greenfields and established enterprises.  He currently protects the data of over 9 million Australian’s as the CISO and Transformation Program Director of Velocity Frequent Flyer.


Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed a leo quis purus feugiat facilisis. Interdum et malesuada fames ac ante ipsum primis in faucibus. Aliquam quis elit tristique, efficitur enim viverra, consequat odio. Duis porta ipsum ut magna dignissim vestibulum. Ut finibus augue nec mi maximus, nec laoreet arcu sagittis. Fusce pellentesque ipsum non lobortis bibendum. Sed consectetur dolor et ligula venenatis facilisis.


Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed a leo quis purus feugiat facilisis. Interdum et malesuada fames ac ante ipsum primis in faucibus. Aliquam quis elit tristique, efficitur enim viverra, consequat odio. Duis porta ipsum ut magna dignissim vestibulum. Ut finibus augue nec mi maximus, nec laoreet arcu sagittis. Fusce pellentesque ipsum non lobortis bibendum. Sed consectetur dolor et ligula venenatis facilisis.

Top of Page