CybersecCon 2022 – Event Details

Venue - Hilton Auckland

NZ's Largest Cybersecurity Event

UPDATE: Due to the Covid-19 situation within Australia and New Zealand, we are pleased to announce that we now have a confirmed rescheduled date of Wednesday, 19th October 2022 at the original venue – The Hilton Hotel, Auckland.  

Cybersecurity has been taking centre stage around the world, with cyber-attacks becoming more prominent and their complexity more and more difficult to protect against. Thus, it’s imperative for cybersecurity experts to share their knowledge and experience with NZ businesses.

After a 2 year break due to Covid restrictions, NZ’s largest Cybersecurity event is back on. CybersecCon promises to be a must do event for all cyber security professionals. This free to attend event focusses on being educational and informative with key notes from Xero, Tower Insurance, Kordia and ESET already confirmed. 

CybersecCon 2022 starts with simultaneous technical workshops run by industry giants LogRhythm, ESET, CyberArk, Extrahop, Imperva and Mimecast. An exciting plenary agenda can now be seen below. This year a special awards gala dinner sponsored by Cyberark following our days agenda will see us run late into the wee hours of the night.

Keynotes, panel discussions, technical workshops, networking, and more

8:30ARRIVAL, workshop registration & welcome coffee
9:00TECHNICAL WORKSHOPS – ESET, LogRhythm, CyberArk, Extrahop, Imperva and Mimecast
11:30CybersecCon Entry Registration, Networking and Lunch
12:15Welcome note from Dr David Gadnyx – Chillisoft Marketing Manager
12:20How Geo-political issues will effect the landscape of cybersecurity – Alex Teh – CEO of Chilliosft.
12:45Key note 1 – Global Threat Report by ESET – Tony Anscombe – ESET Global Evangelist 
13:15Key note 2 – David Higgins – CISO Kiwibank – Building resilience in Cyber Security.
13:45Panel 1: Supply chain attacks Feat: Eli Hirschauge, Garrett O’Hara, Michael Bovalino, Rohan Langdon and Dr Stephanie Andal (CyberArk, ESET, ExtraHop, LogRhythm, Mimecast).
14:30Key note 3 – The Journey Of Managing Cyber Risk – “its not instant coffee” – Eli Hirschauge – Tower Insurance Director of Technology and Acting CIO. 
15:00BREAK
15:15Key note 4 – CISO’s As Digital Leaders With Security Culture as Their Top Priority. – Hillary Walton – Kordia CISO.
15:45Panel 2: The Importance of securing the cloud. Feat. Anirudh Chand, Brian Zerafa, David Aviv, Mark Knowles and Reinhart Hansen.(Imperva, Netskope, Radware, Tripwire, Xero) 
16:30Key note 5 – Security Education and Risk – Protecting Your Business – Mark Knowles – Xero GM of Security Assurance. 
17:00Closing Remarks
17:10Imperva cocktail hour + Networking + raffle draw
19:00Gala dinner start and welcome note by Alex Teh
19:10Entree + CyberArk Welcome note by Thomas Fikentscher, Regional Director ANZ, CyberArk
19:20Buffet dinner + All Black Star Piri Weepu as Guest speaker
21:00Awards – ESET, LogRhythm, Imperva, CyberArk, Mimecast, Chillisoft
22:00Networking Drinks & After party 
24:00Event end 
  

Whilst ESET end point security is known for its effectiveness and strength in blocking Malicious code, ESET XDR provides an additional layer of defence where we are able to detect malicious actors performing malicious behaviour on the network without initially deploying malware. For example common everyday tools like “Powershell” can be used in a compromised end point to port scan the whole network for other vulnerable devices on the network and from there plan an attack to attain the domain password. Come to this workshop to learn how ESET XDR can be used to do threat hunting and a MDR analyst is able to do an investigation and remediate that threat quickly. Come and see how global leader in attack simulation Attack IQ can be used to perform a sandworm attack on ESET XDR and how we track those techniques against the Mitre Attack framework. The workshop will include a panel discussion with leading experts from Advantage, Chillisoft and Attack IQ discussing how important it is to continuously validate your security posture using the most virulent attack techniques known to the industry.

AGENDA

9.00 – 9.10
Welcome note from Anthony Rowell (Chillisoft ESET security specialist)

9.10 to 9.30
XDR presentation from Anthony Rowell (Chillisoft ESET security specialist)

9.30 to 10.15
Demonstration of a simulated sandworm attack on ESET EDR underpinned by LogRhythm SIEM using Attack IQ – Pierro Liebenberg (Chillisoft Technical director) and Lukesh Sadh (Chillisoft Security consultant)

10.15 – 11.00 
Fireside chat – The importance of XDR and security posture validation – Brad Pearpoint (Advantage Managing Director), Simon Howe (Attack IQ APAC VP) and Pierro Liebenberg (Chillisoft Technical Director) – hosted by Anthony Rowell

ExtraHop shaking things up for CyberSecCon2022.

9am-9.45am Hear from David Letele, founder of Buttabean Motivation. David is well known within the south Auckland (and wider) communities for his work with families in need. In 2022 he was awarded the Kiwibank Local Hero of the Year award.

David will share his story on his life journey, it’s quite the rollercoaster. He’s learnt through his business and his own life that there are unexpected intrusions everywhere. He learned hard lessons about developing the right frameworks and systems to support and build on.

9.45am -10am Hear from Ivan Reutskiy, General Manager of Security at 2Degrees.  Ivan will sit down with Rohan Langdon and they’ll have a chat about the role Extrahop plays within their environment.

10am – 11am. Hear from Khurram Waheed (KW) of Extrahop. currently specializes in NDR (Network Detection and Response) and ITOA (IT Operations & Analytics) solutions, having architected them for a wide range of customers. KW holds a CCIE certification, and has a US patent in ‘Detection of DoS attacks’. He’ll take you through a demo of Extrahop, and you can see the magic for yourself.

  • Introduction to Imperva’s portfolio of Cybersecurity Controls from Application to Data Security.
  • Overview of current and evolving API Threat Landscape
  • Strategies for securing your API traffic and Endpoints
    • Addressing the 4 pillars of API Security 
      • Discovery & Classification
      • Audit & Verification
      • Detecting and Blocking Anomalies
      • Remediating Threats
    • The role of an API gateway.  Do API gateways provide sufficient protection?
    • What about east-west API traffic?
    • OWASP API top 10. Solving for tougher API Security threats. BOLA, Mass assignment, BOTs…..etc
    • Importance of being able to detect and block/prevent attacks in Realtime and how it is achieved.
    • Comparing the effectiveness of point solutions to a single stack approach
    • Shifting left – How ongoing observation drives enhanced API validation, testing, and governance.

 

  • Bringing it all together in a demonstration. 
  • Q&A.

Cyber threats can lurk in your network for a long time, waiting for the right time to take down your organisation. 


Equipping your SOC teams with the right tools to expand their visibility and identify true positives will ensure that you are ready to defend against threats, both external and internal.

In this workshop, we will cover: 
• How LogRhythm NDR uncovers blind spots in your network and decreases mean time to respond with its built-in MITRE ATT&CK Engine
• How LogRhythm UEBA spots dangerous user-based activity in real time, allowing your team to stop the attack before critical data is exfiltrated
In addition, we’ll also be giving a sneak preview of our latest SaaS security intelligence platform.

As a bonus, we will also have LogRhythm’s Michael Bovalino and Barfoot & Thompson’s Anil Anna share the real estate company’s journey towards improved security visibility, threat detection and response. We’ll discuss the strategy used to mitigate risk, and to ensure the wellbeing of the company’s overall security posture.

This workshop will cover:

  • Identity: The New Security Battleground
  • The role of Identity in Digital Transformation and the move to Cloud
  • A deeper look into recent data breaches and the use of compromised credentials  
  • Introduction to CyberArk Identity Security Platform
  • Implementing a Zero Trust Framework
  • How to secure Human Identities: Privileged, Workforce and 3rd Party Vendor
  • Demo: A day in the life of a HR Manager, and the challenge of access
  • Demo: A day in the life of an Infrastructure Admin, and the challenge of security
  • How to secure Non-human Identities: Applications, DevOps and Robots
  • Demo: Secrets Management in a DevOps Pipeline
  • Find Shadow Admins in Cloud native Identities
  • Demo: Scan my cloud
  • Quiz and Prize time!
  • Q & A

We now live in an era where attacks are becoming increasingly sophisticated, email continues to be the top attack vector and therefore, a place where the strongest possible protections must be applied. From dramatic spikes in ransomware to attacks that impact entire supply chains, the threat landscape isn’t what it was yesterday – nor will it be the same tomorrow.   In Mimecast sixth report on the State of Email Security – 86% of organization said email use has increased, with 70% expected an email-borne attack will damage their business.   This is up from 58% in 2020. Securing your organization is no longer just an ‘IT only problem’ but has now become the responsibility of all employees inside an organization.   Join Mimecast experts for this 2-hour workshop to ensure you are developing the best strategy for cyber defense in your organisation.

This workshop will cover:

  • The current and future state of email security
  • How to combat attacks early in the kill chain using the Mimecast portfolio
  • A technical overview of Mimecast Email Security for analysts and admins
  • The importance of your users in protecting your data
  • The role of user behaviour reporting in risk

 

The gala dinner culminates CybersecCon with cybersecurity awards to be presented by our platinum and gold sponsors.

Our guest speaker for the evening is Piri Weepu, a retired New Zealand rugby union player. He played most recently for Wairarapa Bush in the Heartland Championship. Weepu mostly played as a half-back but also played at first five-eighth on occasion.

*Note that the Gala Dinner is strictly invitation only.

GALA DINNER AGENDA 

6:50pm             Doors open & seating check-in

7:05pm             Welcome remarks

7:10pm              Opening remarks by CyberArk + Entrees

7:20pm              Piri Weepu

8:00pm             Mains

8:10pm              Emilie Hardwood first set performance 

9:00pm             Awards presented (ESET, LogRhythm, Imperva)

9:35pm              Dessert station opens

9:50pm              CyberArk and Chillisoft Awards

10pm                  Closing remarks & Emilie Hardwood second set performance       

11pm                   Pipe-in music played to wind the evening down

11:30pm             End (After Party)

 

AWARDS

The following awards will be given out on the evening

LogRhythm

NZ Partner of the year 

Best New Partner of the Year 

Imperva

Best New Partner 

Best NZ Partner of the year 

ESET

MDR Partner of the year 

Consumer Partner of the year

Pacific Island Partner of the year 

CyberArk

NZ Partner of the year 

Chillisoft

Project of the year

Hilton Auckland is nautical-style waterfront hotel in an idyllic location at the end of Princes Wharf.

CybersecCon 2021 takes up the whole event floor, level 1 of the hotel.

Previous event photos

Images from previous CybersecCon

Platinum Sponsor

Gold Sponsors

Silver Sponsors

WordPress Appliance - Powered by TurnKey Linux