Loading...

The Australian Cyber Security Strategy looks to create a more secure online world for Australia. However, the accelerated pace of digital transformation that organisations have had to undertake in the last year along with the expedited move to the Cloud has placed pressure on existing security infrastructures. It is critical that security leaders are developing strategies that are driving continued security resilience and leverage the latest best practice such as Zero Trust environments to protect against the far-reaching and fast evolving cyber security threats.

Watch this exclusive virtual roundtable, where global and local security experts provide guidance on how organisations can bolster their security posture.

Hear from our international speaker - Ann Johnson, Microsoft’s Corporate Vice President, Security, Compliance and Identity will provide her perspective on just how organisations are meeting today’s unique challenge with latest best practice from around the globe. Together with a panel of experts including:

  • Rachael Falk, Cyber Security Cooperative Research Centre CEO
  • Jax Fong, Cyber Security Strategy, Governance, Risk and Compliance Lead, Avanade

Watch Now

Speakers

ann-johnson 

Ann Johnson
Corporate Vice President of SCI Business Development at Microsoft

She oversees the investment and strategic partner strategy roadmap for security, compliance, and identity for one of the largest tech companies on our planet to help organisations become operationally resilient on their digital transformation journey and unlock capabilities of Microsoft’s intelligent cloud and next generation AI. She is a member of the board of advisors for FS-ISAC (The Financial Services Information Sharing and Analysis Center), an advisory board member for EWF (Executive Women’s Forum on Information Security, Risk Management & Privacy), and an advisory board member for HYPR Corp. Ann recently joined the board of advisors for Cybersecurity Ventures. For more about Microsoft’s Cybersecurity Solutions, visit the Microsoft Security Site, or follow Microsoft Security on Twitter at Msft Security Twitter or Msft WDSecurity Twitter. You can also hear her talk with some of the biggest influencers in cybersecurity each week on Afternoon Cyber Tea with Ann Johnson.

LinkedIn

rachael-falk 

Rachael Falk
Australia’s foremost cyber security experts and commentators

As Chief Executive Officer of the Cyber Security Cooperative Research Centre, Rachael leads a cutting-edge program of cyber security research collaboration between government, industry and research institutions. The aim is impact, lifting Australia’s cyber security capacity and capability and creating innovative solutions for the ever-evolving problems of our interconnected world.

Rachael was recently appointed to the Federal Government’s Industry Advisory Committee, which will help guide the implementation of Australia’s Cyber Security Strategy 2020, and was Telstra’s first General Manager of Cyber Influence. She has a background in commercial law and cyber security, practising as a lawyer at top-tier firms in Australia and the UK and in-house for Telstra.

She holds an Advanced Masters in National Security Policy (Hons) from the National Security College (ANU), Bachelor of Laws (Hons) (UTS) and Bachelor of Arts (ANU).

LinkedIn

jax-fong 

Jax Fong
Cybersecurity Strategy, Governance, Risk and Compliance Lead

With more than 17 years of experience throughout the Asia-Pacific region across multiple industries including NSW state government, Jax Fong is an experienced IT governance, assurance, risk, compliance, and security professional with a proven track record of supporting businesses in meeting their business outcomes whilst effectively managing risks. Her passion lies in making a difference by helping organisations with their process and controls maturity journey whilst working towards their common goals and navigating through complexities, organisational culture and solutioning commercially viable means.”

LinkedIn

Insights

Security

Keep your data and IP safe and accessible to unleash growth, cut costs and drive collaboration.

Rethink your cybersecurity strategy

Download our guide for 5 practical steps to build a resilient and scalable operation.

Share this page
CLOSE
Modal window
Contract