SlideShare a Scribd company logo
1 of 3
Download to read offline
Australian experts to address cybersecurity challenges and solutions at Canberra
event
 ISACA Canberra Chapter celebrates 30th
anniversary with panel on 30 March
 Public- and private-sector representatives to discuss ‘Bridging the Gap’ between business and
ICT risk management departments
Canberra, AUSTRALIA (26 February 2015) – With recent cyberattacks resulting in IT governance and
security issues coming to the forefront, global IT association ISACA celebrates its Canberra Chapter’s 30th
year anniversary with a panel featuring local and international ICT experts.
Held in Canberra on Monday 30th
March, representatives from both the public and private sector will
come together to discuss ‘Bridging the Divide’, how business and ICT risk management professionals can
come together to ensure risk management practices are aligned to mitigate key risks, including
cybersecurity skill shortages and mounting cyberattacks globally.
Facilitated by Robert E Stroud, CGEIT, CRISC, international president of ISACA and vice president of
strategy and innovation at CA Technologies, and attended by ISACA CEO Matt Loeb, the discussion will
involve:
 David Diment, Deputy Commissioner Service Delivery, Australian Taxation Office
 Matthew Yannopoulos, Chief Information Officer, Department of Immigration and Border
Protection
 Anthony Willis, Partner Head of Government Sector, DLA Piper Australia
 Garry Barnes, ISACA International Vice President & Practice Lead, Governance Advisory, Vital
Interacts
The panel breakfast follows recent research* from ISACA that shows close to half (46 per cent) of global
respondents expect their organisation to face a cyberattack in 2015. Locally, in Australia/New Zealand
(ANZ), respondents feel that attack is even more likely with 61 per cent expecting a cyberattack this
year. Furthermore, less than half of ANZ IT professionals (43 per cent) say they are prepared, in part
attributed to a global shortage of skilled cybersecurity personnel.
As panellist Garry Barnes, ISACA International Vice President and Governance Advisory Practice Lead at
Vital Interacts, explains: “Cybersecurity is an issue that unites all sectors of the industry. As the Internet
of Things becomes more prevalent, we need to be prepared for the increase in potentially vulnerable
connected devices.
“Cybersecurity is essential for all organisations and the discussion needs to focus around how to deal
with attacks, not the potential for an attack to occur. Data can be a company’s biggest asset, and
likewise a government’s largest priority to protect, so uniting the industry to discuss items such as the
chronic security skills shortage are imperative.”
The ISACA Canberra Chapter was founded in 1985 and now has over 330 members. The chapter was
recently awarded the 2014 K. Wayne Snipes award for the Best Large ISACA Chapter in Oceania.
Joining the panel will be Chief Information Officer for the Department of Immigration and Border
Protection Matthew Yannopoulos. “I’m looking forward to discussing and hearing how other senior
leaders are managing complex operating environments and still innovating for change,” said Matthew.
As Canberra Chapter President David Berkelmans adds: “We have a very active chapter in Canberra,
which is partly due to the immense security needs of the Australian government and business
organisations that support it. Discussions such as the upcoming panel breakfast are essential to promote
debate and inspire action to ensure our vital information systems are protected and prepared should
they come under attack. In Canberra the attitude in the past has been IT security is IT’s problem. This
attitude has changed in recent years with acknowledgement that IT security is everyone’s problem.
“We’re honoured to have the ISACA CEO and International President contribute to this important
discussion during their visit from the US, as well as the Australian-based International Vice President to
provide a local perspective.”
The 30th
Anniversary Panel Breakfast is sponsored by BAE Systems Allied Intelligence and will take place
from 7-11am on Monday 30th
March 2015 at Hotel Realm Canberra. More information and tickets
are available at: www.isaca.org/canberra-breakfast.
ISACA’s Support in Cybersecurity
ISACA is a global leader in cybersecurity. The association assisted the North American-based National
Institute of Standards and Technology (NIST) in the development of the U.S. Cybersecurity Framework,
ISACA is responding to the Department of Prime Minister and Cabinet’s Cyber Security Review with a
demonstration of the association’s proven track record in providing certifications, research and
education materials in Information Technology Governance and Risk. It is through effective governance
and risk that the value of investment in technology can be realised whilst managing the risks, including
cyber security risks. ISACA’s Cybersecurity Nexus (CSX) addresses the cyber security skills shortage being
assessed by the review.
In late 2014, ISACA launched the Cybersecurity Fundamentals Certificate, designed for university
students and recent graduates, entry-level security professionals and those seeking a career change. The
certificate addresses the global skills shortage by helping organisations quickly identify candidates with a
foundational level of cybersecurity knowledge, while helping the most qualified job seekers distinguish
themselves. In October 2015, ISACA will host the first CSX conference in Washington DC to bring
together global thought leaders in cybersecurity.
*The 2015 Global Cybersecurity Status Report, conducted January 13-15, 2015, is based on online
polling of 3,439 ISACA members in 129 countries, with 121 respondents from Oceania (comprising
Australia, New Zealand and Papua New Guinea). The survey has +/- 1.7 per cent margin of error at a 95
per cent confidence level. For additional survey results, graphics and insights from cybersecurity experts,
visit www.isaca.org/cybersecurityreport . To learn about the credentials, guidance and resources offered
in ISACA’s CSX, visit www.isaca.org/cyber.
About ISACA
With more than 115,000 constituents in 180 countries, ISACA®
(www.isaca.org) helps business and IT
leaders build trust in, and value from, information and information systems. Established in 1969, ISACA
is the trusted source of knowledge, standards, networking, and career development for cybersecurity
and information systems audit, risk, privacy and governance professionals. ISACA offers the
Cybersecurity Nexus™
, a comprehensive set of resources for cybersecurity professionals, and COBIT®
, a
business framework that helps enterprises govern and manage their information and technology. ISACA
also advances and validates business-critical skills and knowledge through the globally respected
Certified Information Systems Auditor®
(CISA®
), Certified Information Security Manager®
(CISM®
),
Certified in the Governance of Enterprise IT®
(CGEIT®
) and Certified in Risk and Information Systems
Control™
(CRISC™
) credentials. The association has more than 200 chapters worldwide.
Follow ISACA on Twitter: https://twitter.com/ISACANews
Join ISACA on LinkedIn: ISACA (Official), http://linkd.in/ISACAOfficial
Like ISACA on Facebook: www.facebook.com/ISACAHQ
Cybersecurity Nexus Newsroom: www.isaca.org/cybersecurity-news
Media Contact:
Julie Fenwick, +61 468 901 655, Jfenwick@iconinternational.com.au

More Related Content

What's hot

The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) PwC France
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesPaige Rasid
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionGareth Niblett
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security PresentationIdeba
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...at MicroFocus Italy ❖✔
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaYudhistira Nugraha
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)Gopal Choudhary
 

What's hot (16)

The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 

Viewers also liked

As media half term project
As media half term projectAs media half term project
As media half term projectCraig Osborne
 
Dễ bị đột quỵ, tai biến mạch máu não vào mùa đông
Dễ bị đột quỵ, tai biến mạch máu não vào mùa đôngDễ bị đột quỵ, tai biến mạch máu não vào mùa đông
Dễ bị đột quỵ, tai biến mạch máu não vào mùa đôngbrendan353
 
Públicos do gauchão 2015
Públicos do gauchão 2015Públicos do gauchão 2015
Públicos do gauchão 2015Rafael Passos
 
Balu and the Bully
Balu and the BullyBalu and the Bully
Balu and the BullyKustomKomix
 
How smart lipo can easily help you lose weight
How smart lipo can easily help you lose weightHow smart lipo can easily help you lose weight
How smart lipo can easily help you lose weightrida habib chorfa
 
Correspondencia1
Correspondencia1Correspondencia1
Correspondencia1royertrejo
 
El mundo de las figuras imposibles.acevedo
El mundo de las figuras imposibles.acevedoEl mundo de las figuras imposibles.acevedo
El mundo de las figuras imposibles.acevedocanoenamorada
 
Python danismani
Python danismaniPython danismani
Python danismanisersld98
 
Kịch bản sử dụng mô phỏng
Kịch bản sử dụng mô phỏngKịch bản sử dụng mô phỏng
Kịch bản sử dụng mô phỏngHuong Nguyen
 
presentacion
presentacionpresentacion
presentacionedithm
 
Village at Leesburg Adds Four Specialty Merchants
Village at Leesburg Adds Four Specialty MerchantsVillage at Leesburg Adds Four Specialty Merchants
Village at Leesburg Adds Four Specialty MerchantsVillage at Leesburg
 
Xep phong thi toeic dau vao 22 9-12 nv1&nv2-ca 2
Xep phong thi toeic dau vao 22 9-12 nv1&nv2-ca 2Xep phong thi toeic dau vao 22 9-12 nv1&nv2-ca 2
Xep phong thi toeic dau vao 22 9-12 nv1&nv2-ca 2caphuphat
 
nahel tubbeh - juntos es mejor
nahel tubbeh - juntos es mejornahel tubbeh - juntos es mejor
nahel tubbeh - juntos es mejorNahel Tubbeh
 

Viewers also liked (20)

As media half term project
As media half term projectAs media half term project
As media half term project
 
Sitesshape
SitesshapeSitesshape
Sitesshape
 
Dễ bị đột quỵ, tai biến mạch máu não vào mùa đông
Dễ bị đột quỵ, tai biến mạch máu não vào mùa đôngDễ bị đột quỵ, tai biến mạch máu não vào mùa đông
Dễ bị đột quỵ, tai biến mạch máu não vào mùa đông
 
Públicos do gauchão 2015
Públicos do gauchão 2015Públicos do gauchão 2015
Públicos do gauchão 2015
 
Balu and the Bully
Balu and the BullyBalu and the Bully
Balu and the Bully
 
How smart lipo can easily help you lose weight
How smart lipo can easily help you lose weightHow smart lipo can easily help you lose weight
How smart lipo can easily help you lose weight
 
Provigoro 14WA Bee Care
Provigoro 14WA Bee CareProvigoro 14WA Bee Care
Provigoro 14WA Bee Care
 
Correspondencia1
Correspondencia1Correspondencia1
Correspondencia1
 
El mundo de las figuras imposibles.acevedo
El mundo de las figuras imposibles.acevedoEl mundo de las figuras imposibles.acevedo
El mundo de las figuras imposibles.acevedo
 
Python danismani
Python danismaniPython danismani
Python danismani
 
Kịch bản sử dụng mô phỏng
Kịch bản sử dụng mô phỏngKịch bản sử dụng mô phỏng
Kịch bản sử dụng mô phỏng
 
presentacion
presentacionpresentacion
presentacion
 
Village at Leesburg Adds Four Specialty Merchants
Village at Leesburg Adds Four Specialty MerchantsVillage at Leesburg Adds Four Specialty Merchants
Village at Leesburg Adds Four Specialty Merchants
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Edits
EditsEdits
Edits
 
Xep phong thi toeic dau vao 22 9-12 nv1&nv2-ca 2
Xep phong thi toeic dau vao 22 9-12 nv1&nv2-ca 2Xep phong thi toeic dau vao 22 9-12 nv1&nv2-ca 2
Xep phong thi toeic dau vao 22 9-12 nv1&nv2-ca 2
 
Basuki
BasukiBasuki
Basuki
 
H1n1
H1n1H1n1
H1n1
 
Facebook
FacebookFacebook
Facebook
 
nahel tubbeh - juntos es mejor
nahel tubbeh - juntos es mejornahel tubbeh - juntos es mejor
nahel tubbeh - juntos es mejor
 

Similar to ISACA Canberra 30th annivesary press release

Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conferenceJames Nesbitt
 
BCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofBCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofDominic Vogel
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation baipgroup
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 publishedDSCI_Connect
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksMighty Guides, Inc.
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfChinatu Uzuegbu
 

Similar to ISACA Canberra 30th annivesary press release (20)

Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
BCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofBCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_Proof
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
Cloud computing advances in 2020
Cloud computing advances in 2020Cloud computing advances in 2020
Cloud computing advances in 2020
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 published
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
625 -ESECURITY
625 -ESECURITY625 -ESECURITY
625 -ESECURITY
 

More from David Berkelmans

ISACA Oceania CACS 2017 Sponsorship Prospectus
ISACA Oceania CACS 2017 Sponsorship ProspectusISACA Oceania CACS 2017 Sponsorship Prospectus
ISACA Oceania CACS 2017 Sponsorship ProspectusDavid Berkelmans
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseDavid Berkelmans
 
Canberra Chapter Certification Information Session
Canberra Chapter Certification Information SessionCanberra Chapter Certification Information Session
Canberra Chapter Certification Information SessionDavid Berkelmans
 
ISACA Canberra 2014 Financial Statements
ISACA Canberra 2014 Financial StatementsISACA Canberra 2014 Financial Statements
ISACA Canberra 2014 Financial StatementsDavid Berkelmans
 
ISACA Canberra 30th anniversary panel breakfast
ISACA Canberra 30th anniversary panel breakfastISACA Canberra 30th anniversary panel breakfast
ISACA Canberra 30th anniversary panel breakfastDavid Berkelmans
 
Value creation through optimising risk
Value creation through optimising riskValue creation through optimising risk
Value creation through optimising riskDavid Berkelmans
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014David Berkelmans
 

More from David Berkelmans (7)

ISACA Oceania CACS 2017 Sponsorship Prospectus
ISACA Oceania CACS 2017 Sponsorship ProspectusISACA Oceania CACS 2017 Sponsorship Prospectus
ISACA Oceania CACS 2017 Sponsorship Prospectus
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Canberra Chapter Certification Information Session
Canberra Chapter Certification Information SessionCanberra Chapter Certification Information Session
Canberra Chapter Certification Information Session
 
ISACA Canberra 2014 Financial Statements
ISACA Canberra 2014 Financial StatementsISACA Canberra 2014 Financial Statements
ISACA Canberra 2014 Financial Statements
 
ISACA Canberra 30th anniversary panel breakfast
ISACA Canberra 30th anniversary panel breakfastISACA Canberra 30th anniversary panel breakfast
ISACA Canberra 30th anniversary panel breakfast
 
Value creation through optimising risk
Value creation through optimising riskValue creation through optimising risk
Value creation through optimising risk
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 

ISACA Canberra 30th annivesary press release

  • 1. Australian experts to address cybersecurity challenges and solutions at Canberra event  ISACA Canberra Chapter celebrates 30th anniversary with panel on 30 March  Public- and private-sector representatives to discuss ‘Bridging the Gap’ between business and ICT risk management departments Canberra, AUSTRALIA (26 February 2015) – With recent cyberattacks resulting in IT governance and security issues coming to the forefront, global IT association ISACA celebrates its Canberra Chapter’s 30th year anniversary with a panel featuring local and international ICT experts. Held in Canberra on Monday 30th March, representatives from both the public and private sector will come together to discuss ‘Bridging the Divide’, how business and ICT risk management professionals can come together to ensure risk management practices are aligned to mitigate key risks, including cybersecurity skill shortages and mounting cyberattacks globally. Facilitated by Robert E Stroud, CGEIT, CRISC, international president of ISACA and vice president of strategy and innovation at CA Technologies, and attended by ISACA CEO Matt Loeb, the discussion will involve:  David Diment, Deputy Commissioner Service Delivery, Australian Taxation Office  Matthew Yannopoulos, Chief Information Officer, Department of Immigration and Border Protection  Anthony Willis, Partner Head of Government Sector, DLA Piper Australia  Garry Barnes, ISACA International Vice President & Practice Lead, Governance Advisory, Vital Interacts The panel breakfast follows recent research* from ISACA that shows close to half (46 per cent) of global respondents expect their organisation to face a cyberattack in 2015. Locally, in Australia/New Zealand (ANZ), respondents feel that attack is even more likely with 61 per cent expecting a cyberattack this year. Furthermore, less than half of ANZ IT professionals (43 per cent) say they are prepared, in part attributed to a global shortage of skilled cybersecurity personnel. As panellist Garry Barnes, ISACA International Vice President and Governance Advisory Practice Lead at Vital Interacts, explains: “Cybersecurity is an issue that unites all sectors of the industry. As the Internet of Things becomes more prevalent, we need to be prepared for the increase in potentially vulnerable connected devices. “Cybersecurity is essential for all organisations and the discussion needs to focus around how to deal with attacks, not the potential for an attack to occur. Data can be a company’s biggest asset, and likewise a government’s largest priority to protect, so uniting the industry to discuss items such as the chronic security skills shortage are imperative.”
  • 2. The ISACA Canberra Chapter was founded in 1985 and now has over 330 members. The chapter was recently awarded the 2014 K. Wayne Snipes award for the Best Large ISACA Chapter in Oceania. Joining the panel will be Chief Information Officer for the Department of Immigration and Border Protection Matthew Yannopoulos. “I’m looking forward to discussing and hearing how other senior leaders are managing complex operating environments and still innovating for change,” said Matthew. As Canberra Chapter President David Berkelmans adds: “We have a very active chapter in Canberra, which is partly due to the immense security needs of the Australian government and business organisations that support it. Discussions such as the upcoming panel breakfast are essential to promote debate and inspire action to ensure our vital information systems are protected and prepared should they come under attack. In Canberra the attitude in the past has been IT security is IT’s problem. This attitude has changed in recent years with acknowledgement that IT security is everyone’s problem. “We’re honoured to have the ISACA CEO and International President contribute to this important discussion during their visit from the US, as well as the Australian-based International Vice President to provide a local perspective.” The 30th Anniversary Panel Breakfast is sponsored by BAE Systems Allied Intelligence and will take place from 7-11am on Monday 30th March 2015 at Hotel Realm Canberra. More information and tickets are available at: www.isaca.org/canberra-breakfast. ISACA’s Support in Cybersecurity ISACA is a global leader in cybersecurity. The association assisted the North American-based National Institute of Standards and Technology (NIST) in the development of the U.S. Cybersecurity Framework, ISACA is responding to the Department of Prime Minister and Cabinet’s Cyber Security Review with a demonstration of the association’s proven track record in providing certifications, research and education materials in Information Technology Governance and Risk. It is through effective governance and risk that the value of investment in technology can be realised whilst managing the risks, including cyber security risks. ISACA’s Cybersecurity Nexus (CSX) addresses the cyber security skills shortage being assessed by the review. In late 2014, ISACA launched the Cybersecurity Fundamentals Certificate, designed for university students and recent graduates, entry-level security professionals and those seeking a career change. The certificate addresses the global skills shortage by helping organisations quickly identify candidates with a foundational level of cybersecurity knowledge, while helping the most qualified job seekers distinguish themselves. In October 2015, ISACA will host the first CSX conference in Washington DC to bring together global thought leaders in cybersecurity. *The 2015 Global Cybersecurity Status Report, conducted January 13-15, 2015, is based on online polling of 3,439 ISACA members in 129 countries, with 121 respondents from Oceania (comprising Australia, New Zealand and Papua New Guinea). The survey has +/- 1.7 per cent margin of error at a 95 per cent confidence level. For additional survey results, graphics and insights from cybersecurity experts, visit www.isaca.org/cybersecurityreport . To learn about the credentials, guidance and resources offered in ISACA’s CSX, visit www.isaca.org/cyber. About ISACA
  • 3. With more than 115,000 constituents in 180 countries, ISACA® (www.isaca.org) helps business and IT leaders build trust in, and value from, information and information systems. Established in 1969, ISACA is the trusted source of knowledge, standards, networking, and career development for cybersecurity and information systems audit, risk, privacy and governance professionals. ISACA offers the Cybersecurity Nexus™ , a comprehensive set of resources for cybersecurity professionals, and COBIT® , a business framework that helps enterprises govern and manage their information and technology. ISACA also advances and validates business-critical skills and knowledge through the globally respected Certified Information Systems Auditor® (CISA® ), Certified Information Security Manager® (CISM® ), Certified in the Governance of Enterprise IT® (CGEIT® ) and Certified in Risk and Information Systems Control™ (CRISC™ ) credentials. The association has more than 200 chapters worldwide. Follow ISACA on Twitter: https://twitter.com/ISACANews Join ISACA on LinkedIn: ISACA (Official), http://linkd.in/ISACAOfficial Like ISACA on Facebook: www.facebook.com/ISACAHQ Cybersecurity Nexus Newsroom: www.isaca.org/cybersecurity-news Media Contact: Julie Fenwick, +61 468 901 655, Jfenwick@iconinternational.com.au