SlideShare a Scribd company logo
Australian experts to address cybersecurity challenges and solutions at Canberra
event
 ISACA Canberra Chapter celebrates 30th
anniversary with panel on 30 March
 Public- and private-sector representatives to discuss ‘Bridging the Gap’ between business and
ICT risk management departments
Canberra, AUSTRALIA (xx February 2015) – With recent cyberattacks resulting in IT governance and
security issues coming to the forefront, global IT association ISACA celebrates its Canberra Chapter’s 30th
year anniversary with a panel featuring local and international ICT experts.
Held in Canberra on Monday 30th
March, representatives from both the public and private sector will
come together to discuss ‘Bridging the Divide’, how business and ICT risk management professionals can
come together to ensure risk management practices are aligned to mitigate key risks, including
cybersecurity skill shortages and mounting cyberattacks globally.
Facilitated by Robert E Stroud, CGEIT, CRISC, international president of ISACA and vice president of
strategy and innovation at CA Technologies, and attended by ISACA CEO Matt Loeb, the discussion will
involve:
 David Diment, Deputy Commissioner Service Delivery, Australian Taxation Office
 Matthew Yannopoulos, Chief Information Officer, Department of Immigration and Border
Protection
 Anthony Willis, Partner Head of Government Sector, DLA Piper Australia
 Garry Barnes, ISACA International Vice President & Practice Lead, Governance Advisory, Vital
Interacts
The panel breakfast follows recent research* from ISACA that shows close to half (46 per cent) of global
respondents expect their organisation to face a cyberattack in 2015. Locally, in Australia/New Zealand
(ANZ), respondents feel that attack is even more likely with 61 per cent expecting a cyberattack this
year. Furthermore, less than half of ANZ IT professionals (43 per cent) say they are prepared, in part
attributed to a global shortage of skilled cybersecurity personnel.
As panellist Garry Barnes, ISACA International Vice President and Governance Advisory Practice Lead at
Vital Interacts, explains: “Cybersecurity is an issue that unites all sectors of the industry. As the Internet
of Things becomes more prevalent, we need to be prepared for the increase in potentially vulnerable
connected devices.
“Cybersecurity is essential for all organisations and the discussion needs to focus around how to deal
with attacks, not the potential for an attack to occur. Data can be a company’s biggest asset, and
likewise a government’s largest priority to protect, so uniting the industry to discuss items such as the
chronic security skills shortage are imperative.”
The ISACA Canberra Chapter was founded in 1985 and now has over 330 members. The chapter was
recently awarded the 2014 K. Wayne Snipes award for the Best Large ISACA Chapter in Oceania.
Joining the panel will be Chief Information Officer for the Department of Immigration and Border
Protection Matthew Yannopoulos. “I’m looking forward to discussing and hearing how other senior
leaders are managing complex operating environments and still innovating for change,” said Matthew.
As Canberra Chapter President David Berkelmans adds: “We have a very active chapter in Canberra,
which is partly due to the immense security needs of the Australian government and business
organisations that support it. Discussions such as the upcoming panel breakfast are essential to promote
debate and inspire action to ensure our vital information systems are protected and prepared should
they come under attack. In Canberra the attitude in the past has been IT security is IT’s problem. This
attitude has changed in recent years with acknowledgement that IT security is everyone’s problem.
“We’re honoured to have the ISACA CEO and International President contribute to this important
discussion during their visit from the US, as well as the Australian-based International Vice President to
provide a local perspective.”
The 30th
Anniversary Panel Breakfast is sponsored by BAE Systems Allied Intelligence and will take place
from 7-11am on Monday 30th
March 2015 at Hotel Realm Canberra. More information and tickets
are available at: www.isaca.org/canberra-breakfast.
ISACA’s Support in Cybersecurity
ISACA is a global leader in cybersecurity. The association assisted the North American-based National
Institute of Standards and Technology (NIST) in the development of the U.S. Cybersecurity Framework,
ISACA is responding to the Department of Prime Minister and Cabinet’s Cyber Security Review with a
demonstration of the association’s proven track record in providing certifications, research and
education materials in Information Technology Governance and Risk. It is through effective governance
and risk that the value of investment in technology can be realised whilst managing the risks, including
cyber security risks. ISACA’s Cybersecurity Nexus (CSX) addresses the cyber security skills shortage being
assessed by the review.
In late 2014, ISACA launched the Cybersecurity Fundamentals Certificate, designed for university
students and recent graduates, entry-level security professionals and those seeking a career change. The
certificate addresses the global skills shortage by helping organisations quickly identify candidates with a
foundational level of cybersecurity knowledge, while helping the most qualified job seekers distinguish
themselves. In October 2015, ISACA will host the first CSX conference in Washington DC to bring
together global thought leaders in cybersecurity.
*The 2015 Global Cybersecurity Status Report, conducted January 13-15, 2015, is based on online
polling of 3,439 ISACA members in 129 countries, with 121 respondents from Oceania (comprising
Australia, New Zealand and Papua New Guinea). The survey has +/- 1.7 per cent margin of error at a 95
per cent confidence level. For additional survey results, graphics and insights from cybersecurity experts,
visit www.isaca.org/cybersecurityreport . To learn about the credentials, guidance and resources offered
in ISACA’s CSX, visit www.isaca.org/cyber.
About ISACA
With more than 115,000 constituents in 180 countries, ISACA®
(www.isaca.org) helps business and IT
leaders build trust in, and value from, information and information systems. Established in 1969, ISACA
is the trusted source of knowledge, standards, networking, and career development for cybersecurity
and information systems audit, risk, privacy and governance professionals. ISACA offers the
Cybersecurity Nexus™
, a comprehensive set of resources for cybersecurity professionals, and COBIT®
, a
business framework that helps enterprises govern and manage their information and technology. ISACA
also advances and validates business-critical skills and knowledge through the globally respected
Certified Information Systems Auditor®
(CISA®
), Certified Information Security Manager®
(CISM®
),
Certified in the Governance of Enterprise IT®
(CGEIT®
) and Certified in Risk and Information Systems
Control™
(CRISC™
) credentials. The association has more than 200 chapters worldwide.
Follow ISACA on Twitter: https://twitter.com/ISACANews
Join ISACA on LinkedIn: ISACA (Official), http://linkd.in/ISACAOfficial
Like ISACA on Facebook: www.facebook.com/ISACAHQ
Cybersecurity Nexus Newsroom: www.isaca.org/cybersecurity-news
Media Contact:
Julie Fenwick, +61 468 901 655, Jfenwick@iconinternational.com.au

More Related Content

What's hot

Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016
ColloqueRISQ
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
Dr David Probert
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
James Nesbitt
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
Camilo do Carmo Pinto
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
siswarren
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
PwC France
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
Paige Rasid
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
Marc Vael
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
William McBorrough
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
Indian Air Force
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Yudhistira Nugraha
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
Gareth Niblett
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
at MicroFocus Italy ❖✔
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
 
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
Assespro Nacional
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
Ideba
 

What's hot (16)

Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 

Viewers also liked

Sales staff
Sales staffSales staff
Sales staff
grantcrowell166
 
Funcionario, ¿qué le pides tú a la administración electrónica?
Funcionario, ¿qué le pides tú a la administración electrónica?Funcionario, ¿qué le pides tú a la administración electrónica?
Funcionario, ¿qué le pides tú a la administración electrónica?
Alberto Ortiz de Zarate
 
Create a skit!
Create a skit!Create a skit!
Create a skit!
apotropaicspirit
 
Contents step by step
Contents step by stepContents step by step
Contents step by stepAmyGharibian
 
Development portfolio
Development portfolioDevelopment portfolio
Development portfolio
DGWilkin
 
Historia del internet
Historia del internetHistoria del internet
Historia del internet
GuiJosue4
 
Teaching and learning less used languages through OER and OEP, LINQ Conferenc...
Teaching and learning less used languages through OER and OEP, LINQ Conferenc...Teaching and learning less used languages through OER and OEP, LINQ Conferenc...
Teaching and learning less used languages through OER and OEP, LINQ Conferenc...
LangOER
 
Montaje de la torre eiffel
Montaje de la torre eiffelMontaje de la torre eiffel
Montaje de la torre eiffel
Agostinho.Gouveia
 
Cuadro tercer periodo 301
Cuadro tercer periodo 301Cuadro tercer periodo 301
Cuadro tercer periodo 301
ANAJULIHER
 
New testament lesson 9
New testament lesson 9New testament lesson 9
New testament lesson 9
Cassandra Dawn Bushman
 
Capitolization contest
Capitolization contestCapitolization contest
Capitolization contest
apotropaicspirit
 
Makalah bahaya-narkoba2
Makalah bahaya-narkoba2Makalah bahaya-narkoba2
Makalah bahaya-narkoba2Rifza1
 

Viewers also liked (16)

Sales staff
Sales staffSales staff
Sales staff
 
Funcionario, ¿qué le pides tú a la administración electrónica?
Funcionario, ¿qué le pides tú a la administración electrónica?Funcionario, ¿qué le pides tú a la administración electrónica?
Funcionario, ¿qué le pides tú a la administración electrónica?
 
Create a skit!
Create a skit!Create a skit!
Create a skit!
 
Contents step by step
Contents step by stepContents step by step
Contents step by step
 
Development portfolio
Development portfolioDevelopment portfolio
Development portfolio
 
Functia mid
Functia midFunctia mid
Functia mid
 
Historia del internet
Historia del internetHistoria del internet
Historia del internet
 
Kriket
KriketKriket
Kriket
 
Cubito word
Cubito wordCubito word
Cubito word
 
Teaching and learning less used languages through OER and OEP, LINQ Conferenc...
Teaching and learning less used languages through OER and OEP, LINQ Conferenc...Teaching and learning less used languages through OER and OEP, LINQ Conferenc...
Teaching and learning less used languages through OER and OEP, LINQ Conferenc...
 
Montaje de la torre eiffel
Montaje de la torre eiffelMontaje de la torre eiffel
Montaje de la torre eiffel
 
Cuadro tercer periodo 301
Cuadro tercer periodo 301Cuadro tercer periodo 301
Cuadro tercer periodo 301
 
11º domingo tob 2015
11º domingo tob 201511º domingo tob 2015
11º domingo tob 2015
 
New testament lesson 9
New testament lesson 9New testament lesson 9
New testament lesson 9
 
Capitolization contest
Capitolization contestCapitolization contest
Capitolization contest
 
Makalah bahaya-narkoba2
Makalah bahaya-narkoba2Makalah bahaya-narkoba2
Makalah bahaya-narkoba2
 

Similar to ISACA Canberra 30th annivesary press release

Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
James Nesbitt
 
BCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofBCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_Proof
Dominic Vogel
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
Vinoth Sivasubramanan
 
Cloud computing advances in 2020
Cloud computing advances in 2020Cloud computing advances in 2020
Cloud computing advances in 2020
AIRCC Publishing Corporation
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation
baipgroup
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
Dominic Vogel
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
Asad Zaman
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 published
DSCI_Connect
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
mariaidga
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
Dominic Vogel
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
Alia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
Alia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
Alia Malick
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
BlackBerry
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
Signals Defense, LLC
 
625 -ESECURITY
625 -ESECURITY625 -ESECURITY
625 -ESECURITY
Mohamad Faizal
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Mighty Guides, Inc.
 
CIO Digest_July 2013 Issue
CIO Digest_July 2013 IssueCIO Digest_July 2013 Issue
CIO Digest_July 2013 Issue
Patrick Spencer
 

Similar to ISACA Canberra 30th annivesary press release (20)

Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
BCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofBCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_Proof
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
Cloud computing advances in 2020
Cloud computing advances in 2020Cloud computing advances in 2020
Cloud computing advances in 2020
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 published
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
 
625 -ESECURITY
625 -ESECURITY625 -ESECURITY
625 -ESECURITY
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
CIO Digest_July 2013 Issue
CIO Digest_July 2013 IssueCIO Digest_July 2013 Issue
CIO Digest_July 2013 Issue
 

More from David Berkelmans

ISACA Oceania CACS 2017 Sponsorship Prospectus
ISACA Oceania CACS 2017 Sponsorship ProspectusISACA Oceania CACS 2017 Sponsorship Prospectus
ISACA Oceania CACS 2017 Sponsorship Prospectus
David Berkelmans
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
David Berkelmans
 
Canberra Chapter Certification Information Session
Canberra Chapter Certification Information SessionCanberra Chapter Certification Information Session
Canberra Chapter Certification Information Session
David Berkelmans
 
ISACA Canberra 2014 Financial Statements
ISACA Canberra 2014 Financial StatementsISACA Canberra 2014 Financial Statements
ISACA Canberra 2014 Financial Statements
David Berkelmans
 
ISACA Canberra 30th anniversary panel breakfast
ISACA Canberra 30th anniversary panel breakfastISACA Canberra 30th anniversary panel breakfast
ISACA Canberra 30th anniversary panel breakfast
David Berkelmans
 
Value creation through optimising risk
Value creation through optimising riskValue creation through optimising risk
Value creation through optimising risk
David Berkelmans
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
David Berkelmans
 

More from David Berkelmans (7)

ISACA Oceania CACS 2017 Sponsorship Prospectus
ISACA Oceania CACS 2017 Sponsorship ProspectusISACA Oceania CACS 2017 Sponsorship Prospectus
ISACA Oceania CACS 2017 Sponsorship Prospectus
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Canberra Chapter Certification Information Session
Canberra Chapter Certification Information SessionCanberra Chapter Certification Information Session
Canberra Chapter Certification Information Session
 
ISACA Canberra 2014 Financial Statements
ISACA Canberra 2014 Financial StatementsISACA Canberra 2014 Financial Statements
ISACA Canberra 2014 Financial Statements
 
ISACA Canberra 30th anniversary panel breakfast
ISACA Canberra 30th anniversary panel breakfastISACA Canberra 30th anniversary panel breakfast
ISACA Canberra 30th anniversary panel breakfast
 
Value creation through optimising risk
Value creation through optimising riskValue creation through optimising risk
Value creation through optimising risk
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

ISACA Canberra 30th annivesary press release

  • 1. Australian experts to address cybersecurity challenges and solutions at Canberra event  ISACA Canberra Chapter celebrates 30th anniversary with panel on 30 March  Public- and private-sector representatives to discuss ‘Bridging the Gap’ between business and ICT risk management departments Canberra, AUSTRALIA (xx February 2015) – With recent cyberattacks resulting in IT governance and security issues coming to the forefront, global IT association ISACA celebrates its Canberra Chapter’s 30th year anniversary with a panel featuring local and international ICT experts. Held in Canberra on Monday 30th March, representatives from both the public and private sector will come together to discuss ‘Bridging the Divide’, how business and ICT risk management professionals can come together to ensure risk management practices are aligned to mitigate key risks, including cybersecurity skill shortages and mounting cyberattacks globally. Facilitated by Robert E Stroud, CGEIT, CRISC, international president of ISACA and vice president of strategy and innovation at CA Technologies, and attended by ISACA CEO Matt Loeb, the discussion will involve:  David Diment, Deputy Commissioner Service Delivery, Australian Taxation Office  Matthew Yannopoulos, Chief Information Officer, Department of Immigration and Border Protection  Anthony Willis, Partner Head of Government Sector, DLA Piper Australia  Garry Barnes, ISACA International Vice President & Practice Lead, Governance Advisory, Vital Interacts The panel breakfast follows recent research* from ISACA that shows close to half (46 per cent) of global respondents expect their organisation to face a cyberattack in 2015. Locally, in Australia/New Zealand (ANZ), respondents feel that attack is even more likely with 61 per cent expecting a cyberattack this year. Furthermore, less than half of ANZ IT professionals (43 per cent) say they are prepared, in part attributed to a global shortage of skilled cybersecurity personnel. As panellist Garry Barnes, ISACA International Vice President and Governance Advisory Practice Lead at Vital Interacts, explains: “Cybersecurity is an issue that unites all sectors of the industry. As the Internet of Things becomes more prevalent, we need to be prepared for the increase in potentially vulnerable connected devices. “Cybersecurity is essential for all organisations and the discussion needs to focus around how to deal with attacks, not the potential for an attack to occur. Data can be a company’s biggest asset, and likewise a government’s largest priority to protect, so uniting the industry to discuss items such as the chronic security skills shortage are imperative.”
  • 2. The ISACA Canberra Chapter was founded in 1985 and now has over 330 members. The chapter was recently awarded the 2014 K. Wayne Snipes award for the Best Large ISACA Chapter in Oceania. Joining the panel will be Chief Information Officer for the Department of Immigration and Border Protection Matthew Yannopoulos. “I’m looking forward to discussing and hearing how other senior leaders are managing complex operating environments and still innovating for change,” said Matthew. As Canberra Chapter President David Berkelmans adds: “We have a very active chapter in Canberra, which is partly due to the immense security needs of the Australian government and business organisations that support it. Discussions such as the upcoming panel breakfast are essential to promote debate and inspire action to ensure our vital information systems are protected and prepared should they come under attack. In Canberra the attitude in the past has been IT security is IT’s problem. This attitude has changed in recent years with acknowledgement that IT security is everyone’s problem. “We’re honoured to have the ISACA CEO and International President contribute to this important discussion during their visit from the US, as well as the Australian-based International Vice President to provide a local perspective.” The 30th Anniversary Panel Breakfast is sponsored by BAE Systems Allied Intelligence and will take place from 7-11am on Monday 30th March 2015 at Hotel Realm Canberra. More information and tickets are available at: www.isaca.org/canberra-breakfast. ISACA’s Support in Cybersecurity ISACA is a global leader in cybersecurity. The association assisted the North American-based National Institute of Standards and Technology (NIST) in the development of the U.S. Cybersecurity Framework, ISACA is responding to the Department of Prime Minister and Cabinet’s Cyber Security Review with a demonstration of the association’s proven track record in providing certifications, research and education materials in Information Technology Governance and Risk. It is through effective governance and risk that the value of investment in technology can be realised whilst managing the risks, including cyber security risks. ISACA’s Cybersecurity Nexus (CSX) addresses the cyber security skills shortage being assessed by the review. In late 2014, ISACA launched the Cybersecurity Fundamentals Certificate, designed for university students and recent graduates, entry-level security professionals and those seeking a career change. The certificate addresses the global skills shortage by helping organisations quickly identify candidates with a foundational level of cybersecurity knowledge, while helping the most qualified job seekers distinguish themselves. In October 2015, ISACA will host the first CSX conference in Washington DC to bring together global thought leaders in cybersecurity. *The 2015 Global Cybersecurity Status Report, conducted January 13-15, 2015, is based on online polling of 3,439 ISACA members in 129 countries, with 121 respondents from Oceania (comprising Australia, New Zealand and Papua New Guinea). The survey has +/- 1.7 per cent margin of error at a 95 per cent confidence level. For additional survey results, graphics and insights from cybersecurity experts, visit www.isaca.org/cybersecurityreport . To learn about the credentials, guidance and resources offered in ISACA’s CSX, visit www.isaca.org/cyber.
  • 3. About ISACA With more than 115,000 constituents in 180 countries, ISACA® (www.isaca.org) helps business and IT leaders build trust in, and value from, information and information systems. Established in 1969, ISACA is the trusted source of knowledge, standards, networking, and career development for cybersecurity and information systems audit, risk, privacy and governance professionals. ISACA offers the Cybersecurity Nexus™ , a comprehensive set of resources for cybersecurity professionals, and COBIT® , a business framework that helps enterprises govern and manage their information and technology. ISACA also advances and validates business-critical skills and knowledge through the globally respected Certified Information Systems Auditor® (CISA® ), Certified Information Security Manager® (CISM® ), Certified in the Governance of Enterprise IT® (CGEIT® ) and Certified in Risk and Information Systems Control™ (CRISC™ ) credentials. The association has more than 200 chapters worldwide. Follow ISACA on Twitter: https://twitter.com/ISACANews Join ISACA on LinkedIn: ISACA (Official), http://linkd.in/ISACAOfficial Like ISACA on Facebook: www.facebook.com/ISACAHQ Cybersecurity Nexus Newsroom: www.isaca.org/cybersecurity-news Media Contact: Julie Fenwick, +61 468 901 655, Jfenwick@iconinternational.com.au