Nov 15
Ways to convince Your Boss Ways to Save Submit Your Talk

Submit Your Talk

Overview of the event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.

Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Our Past Speakers

Eghbal Ghazizadeh

Cloud Computing Advisor

AUT University

Abhishek Dubey

Privacy Business Analyst


Amar Trivedi


Keeping Madness Alive

Hanif Deylami

Programme Developer

Nelson Marlborough Institute of Technology

Feroze Ashraff




CCNA CyberOps


Maxwell Francis

Cyber Security Consultant


Conference Schedule

Cyber Security Summit, Auckland


X Topic Abstract

One day, you will have a breach of security, be it in progress now, or in the future. I will present a real-world scenario, the lessons learned, and the approaches taken to prevent it from happening again. I will highlight the importance of analysing an attacker's payload and how this led to a more nuanced response to the compromise. Finally, this scenario illustrates a more modern attack technique, known as "living off the land". I will cover how this can be mitigated, logged, and combatted both in situ and at the source.

X Topic Abstract

X Topic Abstract

Most of the audit findings occur because of flaws in identity management, leading to remedial programs stretching over the years. Organisations often fail to make identity and access management a repeatable process for the business, thus reducing the visibility. Most of the times, they struggle to answer the critical question “Who has Access to What in my organisation?” The line between the employees’ work and personal lives, along with their increasing use of cloud services, BYOD devices, and social media, is getting more and more blurred. Also, due to the increased complexity of systems, specialists are frequently brought in to help. These specialists range from managed service providers (MSPs), partners, suppliers, vendors to people with specialist skills. Organisations are seeking more efficient ways to manage access and to be in control of all the provisioned identities and related access privileges. This includes automating the periodic user access review process by stakeholders like HR, Procurement, Projects Office, Business/Information Systems, line of business (LOB) managers and employees/contractors.

An Identity and Access Governance Platform (IAGP) tries to solve this problem for organisations. This talk is going to focus on panacea provided by a complete vs. an MVP IAGP with some scenarios. We will briefly touch upon the criteria matrix for a fit-for-purpose IAGP.

X Topic Abstract

New Zealand is not immune to cyber-attacks. It is common and a growing menace across the world. According to media reports, a recent cyber-attack on the New Zealand’s department of Health, records of millions of patients had been compromised. These attacks will continue to happen. But what innovative strategies organisations should adopt?

Traditionally, information/cyber security was the responsibility of the CIO. According to the size of the organisation, an information security officer was assigned, reporting to the CIO. Their focus was purely technological. Moreover, information security was given a lower priority, compared to other operational or marketing projects.

As we know, attackers are smarter today and strategically they penetrate to organisations’ networks or IT systems through the weakest link in the chain - People! The smarter way to address this is to create a robust cyber/information security culture. Every employee should know the essentials of cyber security and be aware of escalating promptly to the right people with the organisation, when they see anything abnormal. Education is the answer. Organisational reluctance to upskill staff on cyber awareness is no doubt is a big risk.

Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at,

Our Sponsors

Media Partners


Association partner

Digital Marketing Partner

Marketing Partner

Promotional & Media Partners


Our Past Sponsors

Media Partner


Our Speakers

David Keenleyside

Head Computer Technician

Glenfield College and Computer & Network Security Consultant

Andy Simpson

Head of Infrastructure & Security Netlogix, Cyber Security Principal


Nalin Wijetilleke

Managing Director


David Eaton

Associate Director, Cybersecurity Services ANZ


Jatinder Oberoi

founder and CEO

SeCompAss Limited

Our Pricing

Group of 3 or more(Early Bird)
NZD 362 Till October 15
Group of 3 or more(Standard)
NZD 434 Till November 15
Individual(Early Bird)

NZD 577 Till October 15
Individual (Standard)

NZD 722 Till November 15

Our Testimonial


Who can attend Cyber Security Summit in Auckland?

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

Board members
Information technology staff
PR departments
In-house and general counsels
Insurance and risk managers
Security Systems Integrators
IT and Cybersecurity Leaders
Integration Engineers
Product Developers and Manufacturers
Senior Technology Business Executives
Security Specifiers and Engineers
Security Consultants
Anyone who is responsible for the cybersecurity of integrated security systems!

Why to attend Cyber Security Summit in Auckland?

Following are the three key questions you and your cyber security organization or cyber security department and cyber security center of excellence should be solving for now: How do we as testers and cyber security company evolve and thrive in SMAC & IoT world?
From tooling to skilling and from strategies to fundamental values what needs to change and how? What are solutions and services available in market which I can leverage? Cyber Security Summit 2019 is an attempt to seek and share answers to these basic questions.

What will you learn about?

Learn latest techniques and skills required to test disruptive technologies from industry stalwarts themselves Latest trends, concepts, processes and tools for cyber security in SMAC & IoT Recognize, understand and acknowledge challenges in cyber security emerging technologies. Meet and network with fellow cyber security experts from leading companies.Learn how to adapt and adopt these changes quickly and swiftly within a team and also across the enterprise.

Are there any prerequisites to attend this program?


Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.