top of page

Agenda

Day One - Wednesday, 22 May 2024

7:50

Registration and Morning Refreshments

8:20

Opening Karakia

8:40

Chairperson’s Opening Address

Ann Babuji,.jpg

Ann Babuji, Senior Information Security Specialist, Ministry of Justice 

NEXT GEN THREAT INTELLIGENCE & ANALYTICS

8:50

Keynote: NCSC insight into current cyber threat landscape 

  • An overview of todays current threat landscape (domestic and international). 

  • Promoting continuous adaptation and mitigating risk through cyber threat intelligence pooling.  

  • An update on cyber-incident reporting functions through the integration of CERT NZ and NCSC. 

  • Best practices to raise cyber resilience across government agencies. 

Mike Jagusch.jpg

Mike Jagusch, Manager Mission Enablement, National Cyber Security Centre

9:20

Securing the Future: Embracing zero trust and identity – Safeguarding agency’s digital assets in an age of cyber threats 

Securing the Future: Embracing Zero Trust and Identity" delves into the transformative power of adopting a Zero Trust security model coupled with robust identity management practices while considering key aspects of visibility, compliance, and control. 

  • Cybersecurity threats are constantly advancing, posing significant risks to organizations of all sizes and industries. To address these challenges, a paradigm shift is required. 

  • Explore the symbiotic relationship between the NIST Cybersecurity Framework, Zero Trust and identity. Discover how these concepts intersect to create a resilient security architecture that adapts to the dynamic nature of today's threat landscape. 

  • Call to action; embrace a proactive, holistic approach to cybersecurity. By adopting Zero Trust and identity principles, agencies can safeguard their digital assets, protect sensitive data, and mitigate the risks posed by evolving cyber threats, thereby securing the future of their operations, and ensuring long-term resilience in an increasingly digital world. 

Frank Briguglio.jpg

Frank J. Briguglio, Federal CTO, Sailpoint 

9:50

Keynote Panel: Building a resilient and responsive Aotearoa New Zealand in a rapidly evolving cyber threat landscape

  • Staying abreast of emerging threats fuelled by a growth in the Internet of Things  

  • Unpacking the risk of AI developed threats in Aotearoa 

  • Addressing the threat of cyber-espionage, cyber-terrorism, and state-sponsored cyber-crime in a time of geopolitical turmoil 

  • Adopting adaptive approaches to cyber security and protecting New Zealand’s critical infrastructure, sensitive information, and communications systems

Raymond Dickinson.png

Moderator: Raymond Dickinson, Country Manager, New Zealand, SailPoint   

Phil Ross_edited.jpg

Phil Ross, Chief Information Security Officer, Air New Zealand

John-Paul Sikking TEMP.jpg

John-Paul Sikking, Head of Cyber Protection, Bank of New Zealand

Freisi Alfonseca.jpeg

Freisi Alfonseca, Principal Information Security Advisor, National Cyber Security Centre

10:30

Networking Bingo 

10:50

Morning Tea

AI, ML & CLOUD SECURITY 

11:20

Mitigating advance threats in today’s complex digital environment 

  • How the threat landscape is evolving on home soil in 2024 

  • What these could mean to cyber defenders in New Zealand government  

  • Latest intelligence from FortiGuard Labs in enhancing your cybersecurity posture  

  • Developing holistic cyber governance strategies that align with organisational goals 

Joshua Alcock.jpg

Joshua Alcock, Principal Security Strategist, Fortinet

11:50

Introduction to Interactive Breakout Sessions 

11:55

Interactive Breakout Sessions

Frank Briguglio.jpg
Adrian Covich.jpg
Phil Ross headshot.jpg
Joshua Alcock.jpg
Chris Hockings.jpg

Breakout A: Practical insights to the implementation of NIST zero trust architecture from the trenches 

Through real-world examples and practical insights, this discussion will go deeper in understanding of how Identity Security concepts intersect and provide the foundation for Zero Trust and the NIST Cybersecurity Framework.  

  • Implementation challenges organizations may encounter and offer strategies for overcoming resistance to change.  

  • Fostering a security-conscious culture and empowering stakeholders through education and awareness.  

  • How Identity Security lays the foundation for the NIST Cybersecurity Framework and successful Zero Trust initiatives. 

Frank J. Briguglio, Federal CTO Sailpoint 

 

Breakout B: How to leverage threat insights to identify & defend your most vulnerable people 

  • How to effectively utilise threat intelligence as part of your overall program to pinpoint and safeguard individuals at the highest risk within your organisation, enhancing overall security measures and minimising potential breaches. 
     

Adrian Covich, Senior Director, Technical Sales, Proofpoint Asia Pacific and Japan 

Phil Ross, Chief Information Security Officer, Air New Zealand

Breakout C: Strategies to combat sophisticated cybercrime and state-sponsored threats for NZ Government 

Joshua Alcock, Principal Security Strategist, Fortinet 

 

Breakout D: Leaving the keys under the doormat – why going passwordless has become unavoidable in 2024 

  • How many digital identities does a person have on average? How do individuals choose their passwords? 

  • How difficult is it today to guess someone’s password(s)? What is credential stuffing? 

  • How can individuals protect themselves against credential theft? What is multi-factor authentication? 

  • What are the limitations of biometric authentication? How can individuals protect themselves against credential theft? 

  • How can enterprises protect staff and contractors against credential theft? Where does threat detection and response fit into your identity use cases? 

  • What are their thoughts on digital credentials (e.g. issuing/verification) for citizens? How many different username/passwords/2FA do each of you have in your enterprise? 

Chris Hockings, CTO Security Asia Pacific, IBM 
 

Joerg Micheel, Head of Security Practice, OSS Group Ltd 

Joerg Micheel.jpg

1:00

Networking Lunch - brought to you by

Picture1.png
INCIDENT RESPONSE & CYBER CRISIS MANAGEMENT  

2:00

Digital identity in the era of cyber threats 

  • Digital Identity's Role: Explore its pivotal role in organisational enablement and security, reducing dependence on personal identifiers. 

  • Combatting Security Threats: Address the ongoing risk of attackers exploiting lost or stolen credentials to breach secure environments. 

  • Harnessing Identity Fabric: Examine core components and capabilities, shaping the roadmap for robust digital identity solutions in deployed environments. 

Chris Hockings.jpg

Chris Hockings, CTO Security Asia Pacific, IBM

2:30

Taryn Murphy TEMP_edited.jpg

Mini Table-Top Exercise

Cyber breaches are on the rise, and the importance of effective incident response strategies cannot be understated. Further develop your incident declaration processes in our immersive mini table-top exercise. Learn how to effectively communicate with the board, the media, and internal teams during and after a security incident. Groups will brainstorm a solution to a mini simulated incident in a risk-free environment, later returning to share their key actions and learnings

Taryn Murphy, Cyber Security Manager, Worksafe New Zealand  

3:10

Sharing of Learnings  

3:20

Afternoon Tea

CYBERSECURITY CULTURE  
Picture2.png

3:50

Panel: Heightening vigilance and safeguarding your organisation with proactive awareness and leadership excellence 

  • Fostering and sustaining a government-wide culture of cyber vigilance through individualised awareness training 

  • Elevating cybersecurity awareness and strengthening digital defence through gamification 

  • Educating diverse teams on the impacts of cyber-attacks and setting expectations to improve cyber vigilance 

  • Effective cyber leadership: making organisation-wide impact and demystifying cyber threats through clear communication 

Ann Babuji,.jpg

Moderator: Ann Babuji, Senior Information Security Specialist, Ministry of Justice 

Jay Nowitz_edited.jpg

Jay Nowitz, Senior Information Security Advisor, Oranga Tamariki – Ministry for Children

Sabine Scholl.jpg

Sabine Scholl, Technology Risk Lead, ACC

Andrew Hood TEMP_edited.png

Andrew Hood, Chief Advisor – Cybersecurity, Ministry of Education  

Hassham Idris TEMP.jpg

Hassham Idris, Manager Security Risk and Assurance, Ministry of Justice  

4:30

Chairperson’s Closing Address

4:40

End of Summit Day One and Networking Drinks brought to you by

Day 2

Day Two - Thursday, 23 May 2024

8:30

Registration and Morning Refreshments

9:00

Chairperson’s Opening Address

Tamara Al-Salim.jpg

Tamara Al Salim, Head of Business Risk Assurance, New Zealand Defence Force, Ambassador, New Zealand Network for Women in Security

FUTURE OF WORK

9:10

International Keynote

Dominic Chan_edited.jpg

Dominic Chan, Chief Information Officer | Assistant Chief Executive, Product Management, GovTech Singapore 

9:40

Keynote Panel: Strengthening cybersecurity and digital infrastructures for the future of work 

  • Addressing privacy challenges in GovTech: Data governance and supply chain resilience 

  • Transitioning to cloud and hybrid infrastructures: Departing from legacy systems and elevating visibility on the cloud  

  • Building an adaptable, resilient, and scalable digital infrastructure 

  • How to best prepare for the future of work within budget constraints? 

Jo Batchelor profile photo.jpg
Richard.Ashworth.jpg
Jonathan-Wilkins_edited.jpg
Joshua Alcock.jpg

Moderator: Jo Batchelor, Head of Product Engineering, University of Auckland  
 

Richard Ashworth, GM All of Government Services Delivery, Te Tari Taiwhenua Department of Internal Affairs  


Jonathan Wilkins, Chief Information Security Officer, Ministry for Primary Industries   
 

Joshua Alcock, Principal Security Strategist, Fortinet 

10:30

Morning Tea - brought to you by

IDENTITY, DATA & COMMUNITY TRUST

11:00

The secret life of the networked factory

  • Industrial Evolution: OT systems across industries, including critical infrastructures, have transitioned to Ethernet and IP-based communications, rendering them vulnerable to IT-like cyberthreats. 

  • Data-Driven Prevention: Offer recent empirical insights into OT cyberattacks, along with proactive prevention measures and essential tools to minimize potential damage. 

  • Case in Point: Showcase a specific cyberattack incident and detail successful mitigation strategies, providing tangible examples for safeguarding industrial systems. 

Klaus Mochalski_edited.png

Klaus Mochalski, CEO, Rhebo 

11:20

Virtual International Case Study: Future Proofing Citizen’s Identity & Access Management 

  • The significance of implementing secure digital identity services to increase citizen engagement and trust 

  • Strategies for addressing ethical considerations in digital identity solutions  

  • The value of interoperability in the delivery of user-centric services

San Chander.jpg

San Chander, Director, Digital Identity, digital.nsw

11:50

Malcolm Mersham.jpg

Virtual Case Study: Enhancing public service delivery through community data collaboration 

  • Understanding the value of transparency in data to build citizen trust  

  • Community Voice: What role can community partnerships play in capturing meaningful, quality data? 

  • Utilising community generated data sources, to optimise decision making and enhance public service delivery 

Malcom Mersham, Data and Information Lead, Trust Tairāwhiti

12:20

Tamāra Al-Salim.jpg
Donna Bennett.jpg

Fireside Chat: The interplay of geopolitical tensions and cyber threats – insights from the US Department of State 

  • Understanding the impact of geopolitical tensions on the international threat landscape

Moderator: Tamara Al Salim, Head of Business Risk Assurance, New Zealand Defence Force, Ambassador, New Zealand Network for Women in Security   

Donna S Bennett, Chief Information Security Officer, U.S. Department of State 

12:50

Networking Lunch

1:50

Prize Draw 

CHANGE MANAGEMENT & DIGITAL ADOPTION 

2:00

Lightning Talk: Exploring how to facilitate cross-department sharing in cybersecurity, data, and digital transformation  

Steve James.jpg

Steve James, General Manager of Technology, Woolworths NZ

2:10

Challenge Room 

Steve James.jpg
Chhandak Bandopadhyaya TEMP_edited.jpg
Arsalan Ellahi.jpg
Paul Stone_edited.jpg

In this interactive session, delegates will choose one group to participate in, focusing on key challenges in the IT public sector such as digital transformation, cybersecurity, and data. Discussions will follow Chatham House rules, enabling delegates to gain insights from other industry experts. 

  

Group A: How can we innovate and accelerate projects for the benefit of multiple departments?  

Steve James, General Manager of Technology, Woolworths NZ  

  

Group B: Breaking through compliance complexity and improving your organisation’s security posture

 

Chhandak Bandopadhyaya, Principal Advisor – Digital Assurance and Compliance, Ministry of Education  

  

Group C: How to accelerate the pace and increase the odds of success in Digital Transformations

According to most large consulting firms two thirds of the digital transformation programmes fail to deliver their expected business value. Let’s take this opportunity to brainstorm the possible levers we can pull to improve our odds of success.

Arsalan Ellahi, Principal Architect, Kiwibank

  

Group D: Next steps to achieving data collaboration and interoperability

Paul Stone, Principal Advisor Information and Data Governance, Kāinga Ora - Homes and Communities 

  

WORKFORCE TRANSFORMATION

3:10

Keynote Panel: Transforming IT Culture: Strategies for building a strong and diverse IT workforce to overcome industry challenges  

  • Reimagining public perceptions to spark greater interest in the IT sector and increase the profile of cyber careers 

  • Building a diverse talent pipeline and developing baseline skills through graduate programs, internships and industry partnerships 

  • Developing a training pathway for rangatahi Maori in the technology industry 

  • Transforming from within: How can leaders effectively support their teams while managing organizational turmoil and resistance? 

Katie Brown TEMP_edited.jpg

Moderator: Katie Brown, Chief Executive Officer, Te Ao Matihiko; Founder and Director, Te Hapori Mathiko, Founder and Director, Social Good

Nancy Ford TEMP.jpg

Nancy Ford, Programme Lead – GovTech Talent (Digital Graduate Programme for Public Sector), Department of Internal Affairs 

Nancy Taneja TEMP.jpg

Nancy Taneja, Group Manager - Security Capability and Partnerships Te Whatu Ora Health 

Kari Jones.jpg

Kari Jones, Chief Data Officer, Te Whatu Ora Health New Zealand; Expert Member, International Institute for Analytics

3:50

Chairperson’s Closing Address

4:00

Closing Karakia, Networking Drinks and Refreshments & End of Summit 

bottom of page