intelligence summit 2018...the cyber threat intelligence 2018 summit is bringing together top...
TRANSCRIPT
www.cyberthreatsummit.com.au [email protected] +61 481 367 399 1
P A R T N E R S H I P P R O S P E C T U S
INTELLIGENCE SUMMIT 2018
CYBER INTELLIGENCE STRATEGY AND TECHNOLOGY TO STAY AHEAD OF EVOLVING THREATS
2-4 MAY 2018 | GRACE HOTEL | SYDNEY | AUSTRALIA
www.cyberthreatsummit.com.au
www.cyberthreatsummit.com.au [email protected] +61 481 367 399 2
Table of conTenTs
About The Cyber Threat Intelligence Summit
Themes
Event at a glance
Who will attend and why
Who should sponsor & exhibit
Why sponsor
Ways to engage
Packages
About Quest Ignite
www.cyberthreatsummit.com.au [email protected] +61 481 367 399 3
The digital universe is expanding at an accelerating pace. Thanks to the internet of things (IoT), broadband communications,
cheaper cloud storage, and computation power, every organisation, company, and government is generating reams of data about
anything and everything.
While this deluge of digital information provides unprecedented opportunities to improve the speed, accuracy, and efficiency
of tasks, it also raises some distinct challenges. With so much traffic and a shorthanded cybersecurity industry, organisations are
finding it harder and harder to secure their networks and data against cybercriminals.
Today’s adversaries are able to achieve their aims using increasingly advanced tools and techniques designed to get around most
network defences, go undetected during the intrusion, and then remain hidden on networks over long periods of time.
As such, it is essential for organisations to understand how they can effectively utilise threat intelligence to influence their cyber
security strategies.
Cyber threat intelligence provides defenders an advantage, using information superiority to prepare and respond, reducing
adversarial success rates.
Consequently, intelligence feeds provide a vitally important method for organisations to update their response and detection
programs, whilst simultaneously creating tailor made strategies for incident management to limit damage, increase the confidence
of external stakeholders, and reduce recovery time and costs.
The Cyber Threat Intelligence 2018 Summit is bringing together top experts and practitioners for in-depth threat intelligence
talks, and exclusive networking opportunities.
It’s a forum for the development of partnerships and strategies and highlight the latest technologies that are ensuring the safety
and security of government, industry and individuals.
The Summit mixes high-level keynotes, cross industry case studies from local and global leaders and deep dive roundtables
moderated by experts.
CybEr ThrEAT InTEllIgEnCE SummIT – ThE bIg IdEA
What makes the Cyber Threat Intelligence Summit unique?
Only dedicated “Threat Intelligence” focused event in Australia
With focus on tools and technologies for identifying and responding to threats early
International and local case studies focusing on “real world” example and best practice
EXPO featuring world leading threat intelligence companies
Networking Programme - Extensive networking programme where business leaders and key decision
makers from across all industry sectors can build relationships
www.cyberthreatsummit.com.au [email protected] +61 481 367 399 4
ThEmES
A vision for the future of Australia’s cybersecurity
The Cyber Threat Intelligence Summit is where cyber security and threat intelligence leaders,
technology leaders, incident response and risk & compliance leaders will come to:
Understand the need for enhanced threat detection and prioritised incident investigation
Learn how to keep ahead of attackers by leveraging threat intelligence
Assess how to enable an intelligence-led approach to their cyber security operations
Establish threat intelligence as a viable addition to their security strategy
Maximise the potential of threat intelligence platforms to protect their organisation
Develop plans to operationalise cyber threat intelligence
Connect with others in their industry and other sectors to share information
www.cyberthreatsummit.com.au [email protected] +61 481 367 399 5
EvEnT AT A glAnCE
DAY 1 3 MAY 2018
DAY 2 4 MAY 2018
Registration
Networking break & showcase viewing
Lunch & Showcase viewing
Networking break & showcase viewing
Networking drinks
Afternoon roundtable sessionAttendees will have the option of attending 3 of 6 concurrent sessions (25 min per session).Roundtables are interactively moderated group discussions where delegates get the chance to debate and discover common issues, challenges and solutions. Delegates can select to participate in 3 of the 5 roundtable sessions.
8.30am
10:30am
12:45pm
3:30pm
5:30pm
2:00pm
Morning Plenary SessionEstablishing threat intelligence as a viable addition to your security strategy Collecting threat intelligence from internal and external sources Methods for producing Cyber Threat IntelligenceThe role of threat intelligence in supporting effective cybersecurity strategy Steps enterprises must take before they can integrate threat intelligence into their overall cybersecurity strategiesDeveloping ‘actionable’ cyber threat intelligence How real-time intelligence can help organisations prevent and contain the impact of cyber attacks
Plenary continuedOperationalising threat intelligence Rapidly and effectively translating large volumes of threat information into intelligence to help detect threats and protect the business Supporting analysts through platforms that analyse, correlate, and prioritise threat intelligence Harnessing the power of threat intelligence and translating threat intelligence into action
Afternoon PlenaryArtificial Intelligence & Machine Learning: Cyber Security Risk Vs Opportunity? Leveraging disruptive technologies to provide supporting capability to organisations’ threat intelligence platforms
9:00am
11:15am
4:30pm
Networking break & showcase viewing
Lunch & Showcase viewing
End of Conference
10:30am
12:45pm
3.40pm
Morning Plenary SessionUnderstanding the intelligence cycle and its role in the private sector How classic intelligence approaches are applied to CTI analysis and productionCyber security, terrorism, and beyond: addressing evolving threats to national security Working with counterparts to predict and prevent attacks, rather than focusing on response Promoting interaction and sharing between law enforcement and the private sector
Plenary continuedBuilding threat intelligence capacity Training and hiring the correct personnel for threat intelligence teams Educating the organisation as to how threat intelligence can supplement a cyber security team Understanding the difference between cyber security teams and the roles Threat Analysts playIncident response Leveraging raw threat intelligence date to risk detection Proactive response strategies to potential breaches How threat intelligence data can accelerate and improve incident response after a breach
Plenary continuedAdopting a continuous response model through automation Reducing incident response times and mitigating the impact of attackAfter the fall - learning from incidents Definingwhoisresponsibleforanalysinganattackandsharinglessonslearned Creating a cyclical security strategy by feeding data back to the threat intelligence teams Sharing information both within and outside the organisation
9:00am
11:15am
1.45pm
Roundtable 1 Methods for producing Cyber Threat Intelligence
Roundtable 2 Implementing and making decisions based off of intelligence
Roundtable 3 Intelligent Hunting: Using Threat Intelligence to guide your hunts
Roundtable 6 Legal Implications of Threat Intelligence Sharing
Roundtable 4 New tools developed to support or enable CTI
Roundtable 5 Event Threat Assessment: Using strategic CTI to improve security
www.cyberthreatsummit.com.au [email protected] +61 481 367 399 6
Who WIll ATTEnd?
CSO
CISO
CIO
Information Security Manager
Threat Intelligence Director/ Manager/Analyst
Incident Response Manager
Security Analyst
IT Operations
Regulatory Compliance
Critical Infrastructure
Government
Banking & Finance
Insurance
Energy & Utilities
Operational Risk
Security Architecture
Aerospace & Defence
Media & Entertainment
Telecoms
Manufacturing
Healthcare
Compliance
Business Continuity
FMCG & Retail
Transport & Logistics
Education
Research and Consulting
And more..
Cybersecurity Architect
Cyber Response Manager
Enterprise Architect
The Cyber Threat Intelligence Summit will bring together:
Heads of:
From:
www.cyberthreatsummit.com.au [email protected] +61 481 367 399 7
Threat intelligence services
Threat intelligence platforms
AI & machine learning security
Detection and response solutions
Managed Security Service Providers
Consultants/Advisory firms
The Cyber Threat Intelligence Summit is a showcase of the world’s most innovative providers of:
User and entity behavioural analytics
Automated incident and breach response
Data privacy compliance
Cyber-risk consulting and insurance
IP & Technology lawyers
Compliance solutions
Meet with 150+ qualified, senior people - share your knowledge and grow your network of contacts
Hear from and meet industry leaders that are developing and implementing major cyber threat intelligence strategies and projects
Where will the next cybsesecurity innovation and great idea come from? Join the representatives from the whole eco-system and be part of the conversation
Enjoy the best of formal and informal networking, and continue the conversation at the networking drinks.
Debates, End-User Case Studies, Hosted Round Tables, and more
MAKE VALUABLE CONTACTS
HAND-PICKED SPEAKER FACULTY
SPARK INNOVATION
INTERACTIVE FORMATS
NETWORKING
Sponsoring or exhibiting at the Cyber Threat Intelligence Summit gives you the opportunity to showcase your products, services and solutions.
You will get the chance to make face to face contact with business leaders and key decision makers who want to be at the forefront of cybersecurity.
Who Should SPonSor & ExhIbIT?
Why SPonSor or ExhIbIT?
www.cyberthreatsummit.com.au [email protected] +61 481 367 399 8
The Cyber Threat Intelligence Summit is a unique opportunity to showcase new products and services, establish brand leadership and meet decision-makers.
Sponsorship and exhibition packages can be tailored to meet your specific objectives, whether that is thought leadership, profile, leads or sales.
KEYNOTE & PLENARY SESSION SPONSORSHIP
DRINKS/DINNER SPONSORSHIP
ROUNDTABLE SPONSORSHIP
SOLUTIONS SHOWCASE
The keynote & plenary session sets the tone for the entire event. Leaders and influencers from government, industry and related sectors will deliver a series of visionary talks and participate in panels that will explore how businesses can benefit from Cyberthreat Intelligence.
These are the only sessions where the entire delegate audience can be engaged at one time, providing sponsors with a “big bang” platform for the demonstration of thought leadership and brand enhancement.
Roundtables are small group discussions focused on a particular topic and directed by a central table host (a representative of the sponsor) who will guide the conversation and facilitate the questions and answers from the participants. Running in 25 minute rotations, delegates will have the opportunity to pre-select which tables they would like to attend ahead of the event.
Roundtable sponsorship is a cost effective way to form relationships and demonstrate capability with a pre-qualified audience.
This is a great opportunity to exclusively present your solutions and have your team work the room as our conference delegates enjoy dinner or drinks. This is an exclusive sponsorship and includes an exhibition booth and branding benefits.
No one company is the same, and as a consequence no one partnership we build is the same. We take the time to learn what makes our partners tick. We’re keen to learn about your goals and targets, and discover what’s possible.
The exhibition area will be a showcase of the latest technologies and solutions. With extended networking breaks scheduled to take place in the exhibition area, this is a great opportunity to engage with a captive audience, create awareness around your solutions and generate leads.
WAyS To EngAgE
www.cyberthreatsummit.com.au [email protected] +61 481 367 399 9
Company logo carried on all event promotional material as “Diamond Sponsor”
25 minute keynote presentation within morning plenary session
The right to participate on plenary panel discussion
The right to host 1 x roundtable
5 facilitated face to face meetings with pre-selected attendees
12m2 exhibition booth in prime location in exhibition showcase area
10 full access Summit passes
Company banners to be displayed at registration desk and on plenary stage
Company logo carried on all event promotional material as “Platinum Sponsor”
25 minute “case study” presentation
The right to participate on a panel discussion
The right to host 1 x Roundtable
3 facilitated face to face meetings with pre-selected attendees
6m2 exhibition booth in prime location in exhibition showcase area
7 full access Summit passes
Company banners to be displayed on plenary stage
Company logo carried on all event promotional material as “Gold Sponsor”
The right to host 1 x Roundtable
6m2 exhibition booth in prime location in exhibition showcase area
4 full access Summit passes
Company banners to be displayed on plenary stage
Right to host networking reception (catering included) immediately following the first day sessions
Opportunity to make short 10 minute presentation to gathering at reception
Exclusive branding opportunities at reception
6m2 exhibition booth in exhibition showcase area
DiamonDsponsor
(exclusive)
investment:auD 40,000
platinumsponsor
(2 available)
investment:auD30,000
GolD sponsor
(3 available)
investment:auD 15,000
Drinks sponsor
investment:auD 15,000
SPonSorShIP & ExhIbITIon PACKAgE oPTIonS
www.cyberthreatsummit.com.au [email protected] +61 481 367 399 10
Fitted booth of 6m2 providing the essential material required for your stand.
Includes:
Carpeting
Electricity plug points
Walling up to 3 sides
Fascia board with your
company name
Spot lights
Logo and link on website
NOTE: furniture is not included
exhibitionbooth
investment:auD 7,000
SPonSorShIP & ExhIbITIon PACKAgE SummAry
BENEFIT DIAMOND PLATINUM GOLD DRINKS EXHIBIT
Plenary Keynote Yes
Plenary “case study” Yes
Plenary Panel Yes
Breakout Panel Yes
Host Function Yes
Pre-arranged meetings Yes X 5 Yes x 3
Banners Yes x 2 Yes x 1 Yes x 1 Yes @ Function venue
Logo on event promotion Yes Yes Yes Yes Yes
Exhibition booth 12m2 6m2 6m2 6m2 6m2
gET InvolvEd
If you’d like to become a sponsor, exhibitor or speaker atthe Cyber Threat Intelliigence Summit, contact:
Nischal AryalSponsorship and Exhibition Manager - Quest Ignite
+61 481 367 399
www.cyberthreatsummit.com.au [email protected] +61 481 367 399 11
Quest Ignite is a division of leading
business events company Quest Events.
Quest Ignite specialises in emerging
technology and innovation events.
Our events showcase how exponentially
accelerating technologies are disrupting
industry and society and provide a forum
where future-oriented leaders can plot a
course of action for their organisation.
We are focused on creating environments where technologists, entrepreneurs, developers, designers, marketers, growth hackers, creative minds and industry leaders can share ideas and collaborate in seemingly impossible ways – to explore new forms of innovation - and unlock economic, societal and cultural value.
AREAS OF FOCUS:
Industrial Internet
Industry 4.0
Internet of Things
Smart Cities
Deep Learning
Machine Intelligence
Analytics
UX/CX
Artificial Intelligence
Augmented Reality
Virtual Reality
Cyber-security &
cyber-risk
Robotics
UAVs/Drones
Where technology and big ideas converge to light the fire of innovationAs technology and the online world continue to evolve at lightning speed, our events provide access to the people, the products and the insights required to succeed.
If you are involved or interested in any of the following areas, then we’ll provide the platform for you to reach your goals whether they are professional, personal, strategic or commercial.
PArTnerShIPSWe believe that design is the intermediary between information and understanding. This is why Quest Ignite events are genuinely different from others in the market.
Our events are designed to curate genuine networks and foster opportunities at every interaction. What’s more is that we’ll help you to build and develop these relationships.
We know that no one company is the same, and as a consequence no partnership we build is the same. We take the time to learn what makes our partners tick. We’re keen to learn about your goals and targets, and discover what’s possible.
Ignite the future!
www.cyberthreatsummit.com.au [email protected] +61 481 367 399 12
www.cyberthreatsummit.com.au
CybER intElligEnCE StRAtEgy And tEChnOlOgy tO StAy AhEAd OF EvOlving thREAtS