Nov 15
Ways to convince Your Boss Ways to Save Submit Your Talk

Submit Your Talk

Overview of the event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.

Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Our Past Speakers

Eghbal Ghazizadeh

Cloud Computing Advisor

AUT University

Abhishek Dubey

Privacy Business Analyst


Amar Trivedi


Keeping Madness Alive

Hanif Deylami

Programme Developer

Nelson Marlborough Institute of Technology

Feroze Ashraff




CCNA CyberOps


Maxwell Francis

Cyber Security Consultant


Conference Schedule

Cyber Security Summit, Auckland

X Topic Abstract

I personally have witnessed PWC Cyber Security reviews (won’t name PWC) where the entire process was simply an interview session with the company’s IT team.
Following a high ranking I discovered 7 of 9 firewalls were under brute force attack, and had been for some time, from a bot in Korea.
Unless you lift the lid and know what to look for these reviews can fall short of the mark Security by design, (this also fits into Securely Moving Forward with Serverless Architecture and Cyber-Security is Everyone's Job. Not Just IT), with the uptake to cloud a WAF is not all you need to protect your investment in Cloud.
If you don’t know how your data is getting into your cloud you won’t know when it is leaving and by who. Branch and geo connectivity to cloud need to be seriously considered before adoption How to Overcome the Complexities of Cybersecurity Compliance.
I am trained in AlienVault and have implemented the free OSSIM appliance to look for software vulnerabilities and risks at a network level.
All to often I am encountering applications that are running services or middleware with clear text passwords stored in config files.
You need to be looking at your legacy applications and vulnerabilities because nobody else will. If a user can locate a config file which contains a username and password with write access to your databases so can a hacker which could result in a catastrophic outage and data corruption.

X Topic Abstract

One day, you will have a breach of security, be it in progress now, or in the future. I will present a real-world scenario, the lessons learned, and the approaches taken to prevent it from happening again. I will highlight the importance of analysing an attacker's payload and how this led to a more nuanced response to the compromise. Finally, this scenario illustrates a more modern attack technique, known as "living off the land". I will cover how this can be mitigated, logged, and combatted both in situ and at the source.

Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at,

Our Sponsors

Media Partners


Digital Marketing Partner

Marketing Partner

Promotional & Media Partners


Our Past Sponsors

Media Partner


Our Speakers

David Keenleyside

Head Computer Technician

Glenfield College and Computer & Network Security Consultant

Andy Simpson

Head of Infrastructure & Security Netlogix, Cyber Security Principal


Speaker Name


Company name

Speaker Name


Company name

Our Pricing

Group of 3 or more(Early Bird)
NZD 362 Till October 15
Group of 3 or more(Standard)
NZD 434 Till November 15
Individual(Early Bird)

NZD 577 Till October 15
Individual (Standard)

NZD 722 Till November 15

Our Testimonial


Who can attend Cyber Security Summit in Auckland?

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

Board members
Information technology staff
PR departments
In-house and general counsels
Insurance and risk managers
Security Systems Integrators
IT and Cybersecurity Leaders
Integration Engineers
Product Developers and Manufacturers
Senior Technology Business Executives
Security Specifiers and Engineers
Security Consultants
Anyone who is responsible for the cybersecurity of integrated security systems!

Why to attend Cyber Security Summit in Auckland?

Following are the three key questions you and your cyber security organization or cyber security department and cyber security center of excellence should be solving for now: How do we as testers and cyber security company evolve and thrive in SMAC & IoT world?
From tooling to skilling and from strategies to fundamental values what needs to change and how? What are solutions and services available in market which I can leverage? Cyber Security Summit 2019 is an attempt to seek and share answers to these basic questions.

What will you learn about?

Learn latest techniques and skills required to test disruptive technologies from industry stalwarts themselves Latest trends, concepts, processes and tools for cyber security in SMAC & IoT Recognize, understand and acknowledge challenges in cyber security emerging technologies. Meet and network with fellow cyber security experts from leading companies.Learn how to adapt and adopt these changes quickly and swiftly within a team and also across the enterprise.

Are there any prerequisites to attend this program?


Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.