Register Now
Sep 29 - Oct 2, 2020
Virtual Event

Black Hat Asia Executive Summit

Wednesday, September 30, 2020

Black Hat is pleased to announce the return of the Executive Summit to Black Hat Asia 2020. The Black Hat Executive Summit offers CISOs and other cybersecurity executives an opportunity to hear from a variety of industry experts who are helping to shape this next generation of information security strategy.

Apply to attend

All applications will be reviewed by Black Hat management, and notifications will be sent to applicants by September 18. Attendee guidelines are located within the application form.

*Please note: In order to create an open and candid environment that promotes the sharing of ideas, thoughts, and discussion, the Executive Summit will follow Chatham House Rule; neither media nor event coverage is permitted. This program is designed for executive security practitioners; solution providers and vendor attendees are limited to event sponsors.


Advisory Board

Magda Lilia Chelly
Shao Fei
Lidia Giuliano
Tobias Gondrom
Theo Nassiokas

Agenda

Click/press a title below to learn more.

12:30 - 12:50 PM Introductory Remarks
  • Jeff Moss, Founder, Black Hat + DEF CON
  • Steve Wylie, General Manager, Black Hat
12:50 - 1:20 PM

Cybersecurity Futures 2025

This session explores, via four alternate scenarios, the new and different ways in which technology will intersect with society in 2025, and the resulting cybersecurity problem sets faced by businesses, governments, and societies. The session begins with an introduction to the scenario methodology and a description of the four ‘alternate future worlds' we used as the basis for the work. We will then present the top challenges and opportunities that emerged from our research, and how those challenges are viewed differently around the world. Next, we will present overall results to date, and discuss the implications of those results - and what CISOs might be grappling with in the future. Finally, we will walk participants through examples of the types of criminals, black markets, and threats that might result from the new security environment, and how our view of this has changed (or not changed) in the pandemic.

  • Ann Cleaveland, Executive Director, Center for Long-Term Cybersecurity, UC Berkeley
  • Steve Weber, Faculty Director at the Center for Long-Term Cybersecurity and Professor in the School of Information
1:20 - 1:40 PM Networking Break
1:40 - 2:10 PM

Cyber Hygiene: Dull but Critical

While the new and exciting security tools are fun it is my contention that without solid cyber hygiene practices in place they are as effective as building a skyscraper on a sand foundation. In this session I’ll walk through what I mean by cyber hygiene and the practices we’ve established at Ramsay Australia to build the a solid cybersecurity foundation for our digital future.

  • Christopher Neal, CISO, Ramsey Health
2:10 - 2:30 PM Networking Break
2:30 - 3:00 PM

How to Guarantee Failure When Working with Start-ups

"If you want something new, you have to stop doing something old" — Peter Drucker.
It's no secret that cybersecurity start-ups are at the forefront of innovation, yet businesses are delaying plans to work with them and sticking instead with tried-and-tested solutions by major vendors. Join Linda Nguyen Schindler, Programme Head of cybersecurity start-up incubator ICE71, as she shares about the latest cybersecurity trends and innovations, and how businesses can get the best results when working with start-ups.

  • Linda Schindler, Programme Head, Innovation Cybersecurity Ecosystem (ICE71)
3:00 - 3:20 PM Networking Break
3:20 - 3:50 PM Communicating with the Board: What They Really Want to Know
  • Magda Chelly, Managing Director and CISO-On-Demand
  • Catherine Buhler, CISO, Energy Australia
  • Christopher Neal, CISO, Ramsey Health
  • Steve Ng, Vice President, Digital Platform Operations
3:50 - 4:10 PM Networking Break
4:10 - 4:40 PM

Black Hat Briefings Preview

Lidia Giuliano, a member of the Black Hat Review Board, will provide a review of the hottest topics being covered during the Black Hat Briefings to give summit attendees a leg up on what to attend and what to look for during the conference. This conversation will set the premise for audience conversation and offer a framework for post-event action items for attendees.

  • Lidia Giuliano, Black Hat Review Board Member

Sponsors

Google Cloud provides a modern security infrastructure from the user, to the device, to application, to platform. Chronicle is a global security analytics platform that makes investigation + threat hunting instant, easy, and cost-effective. reCAPTCHA Enterprise, a frictionless fraud detection service, leverages our experience defending more than 4 million sites.


At Microsoft, we enable organizations to digitally transform their security with Zero Trust controls. We deliver built-in experiences so users can work from anywhere without interruptions; empower teams to do more by using AI and automated capabilities; and cut through complexity with integrated, comprehensive coverage across identities, endpoints, apps, emails, docs and clouds. www.microsoft.com/security