ASIAL Security Conference

With a theme of 'Intelligence and Applications to Mitigate Risk and Vulnerability' the ASIAL Security Conference hosts a compelling program of renowned local and international experts and academics with case study evidence on how to protect your business, brand reputation and vital assets along with mitigating risk and vulnerability.

 

The ASIAL Security Conference is your annual opportunity to receive fundamental updates from the organisations shaping today’s security landscape in a program carefully curated by the industry’s peak body. The format and content has been updated to reflect critical industry updates on the first day, followed by your choice of streamed sessions on the second and third day of the program.

Learn proven strategies to tackle your security challenges with crucial intelligence on the ever-changing landscape. Your pass also gives you access to network with your peers on Day 1 at an ‘exclusive’ catered lunch held in the VIP Lounge on the Exhibition floor.

Secure your pass early to this industry leading educational event – both 2016 and 2017 sold out!

 ASIAL SECURITY CONFERENCE PROGRAM

 

 

Conference,  Wednesday 25 July 

Join Kevin McDonald as he officially opens the 2018 ASIAL Security Conference.


Australia’s national security landscape and challenges continue to evolve. To meet these challenges, we need to have new ways to coordinate and develop our capability to shape the national security environment. With Australia's national terrorism threat remaining elevated it has never been a more important time to strengthen our approach to security to help make Australians safer.


Decision makers face relentless pressure to take action to protect assets from the evolving threats of global terror to ensuring business continuity. In the context of these constantly changing threats, in many cases, the demand to take action, whether from the public, the media or the authorities, pushes us to make quick and uninformed decisions based on the current threat trend and the need to be seen to be taking action. To compound the problem, the current regulated risk assessment tools do not always provide the desired tailored directives that lead us to design an accurate, prioritized and cost effective threat mitigation plan. When creating such a plan, it is imperative to not only base it on realistic threat scenarios to ensure its long term relevance, but also to ensure that it is cost effective with the correct prioritization. This presentation will take the global threat context and show how we use it to build a long term relevant and easy to understand threat scenario derived risk assessment.


In today’s world, crisis management must do more than help respond to a crisis effectively. Having the ability to detect, prevent, mitigate and recover from a crisis is the only way to build resilience in your organization successfully. Taking an integrated approach by connecting the dots between risk management, crisis management and business continuity will help you build a robust contingency framework in your organization.


The term insider threat is typically focused on current or former employees who pose a malicious threat to the organisation by stealing IP or hacking computer systems. This presentation takes a broader perspective and examines the range of behavioural threats that can be posed by current and former employees, from harassment to aggression to persistent legal action that embitters everyone involved, occasionally raising the physical risk level of those complaining. Participants are provided psychological insights into those who pose a risk to the health and safety of organisations with practical takeaways to support management, containment and risk reduction.


The largest sporting event to be staged in Australia this decade, the Gold Coast 2018 Commonwealth Games features the largest integrated sports program in Commonwealth Games history, comprising 18 sports and seven para-sports. Danny Baade, Head of Security, Gold Coast 2018 Commonwealth Games Corporation will give a post games analysis and share his learnings for future event organisers


The presentation explores the dynamic and constantly shifting threat environment and the particular challenges faced by government and business, in the public transport context: An exploration of some of the initiatives currently being explored by organisations and agencies in developing security culture and embracing national strategies. The presentation will also touch on the challenges in recovering from a terrorist attack.


Cyber Resilience is about risk management. Organisations that are cyber resilient, are able to prevent material impact and recover quickly from a successful cyberattack. Eliminating all risks is impossible, because it impedes business agility. There needs to be an environment where an acceptable level of risk is supported and is viewed to foster innovation. Have you worked out what your organisations risk appetite is? This session will give you the opportunity to learn how:

• To develop a Cybersecurity Capability Framework, outline common challenges and solutions
• To build a cyber resilient organisation
• To identify resilience requirements and how to build them into your corporate
• To identify and rehearse scenarios that are most effective in preparing


Intelligent Buildings (Building Automation and Control Systems - BACS) have become embedded into today’s contemporary building, extending across all types and sizes for the purpose of automation and information flow. However, there remains limited organisational awareness and practitioner understanding of threats and vulnerabilities, and importantly, potentially business impacts.
This non-technical presentation showcases a funded BACS research project which investigated BACS vulnerabilities, and surveyed security and facility professional’s current understanding and security practices. Findings indicated a limited understanding of BACS risks and importantly, suitability in resulting mitigation strategies. The outcome - a BACS Security Guidance document was created to inform professionals on how to address and mitigate the many and changing BACS threats and risks to your organisation.


Executive Briefings, Thursday 26 July

This briefing will drill down into the approach to mitigating risk in a cost effective manner. It will address the importance of creating an unbiased risk assessment to ensure a long term cost effective threat mitigation plan.


This briefing will cover the steps required to develop practical CCTV policy and guidelines for large companies, national organisations, local government and critical infrastructure. It includes standardisation of purchasing and procurement procedures.


When faced with a cyber crisis, it is critical to demonstrate strong leadership and communicate credibly with all stakeholders to avoid a reputation meltdown. Learning to steer your way through the web of stakeholders and thinking of the worst are must-have crisis skills for the communicator. In this dynamic scenario-based session, participants will have the opportunity to practice skills and define their strategy to prevent a crisis from turning into a reputation train wreck.


This briefing will provide insights into the steps required to plan and implement a phased migration from multiple standalone systems into an enterprise video management system.


Executive Briefings, Friday 27 July 

This briefing considers an approach that can be taken and a methodology applied in designing secure buildings; specifically tall buildings. These are different in both the needs of security, and how the design solution is applied, regardless of where they are located in the world. The impact of incidents like 9/11 will be with us for decades to come, and although one cannot protect against that type of attack, one must be able to countenance the impact in both realistic and perception terms. Types of incidents that the world has experienced in the last two years will also be discussed.


The term ‘high risk environments’ requires definition to explain what constitutes appropriate and proportionate security arrangements. These settings and their inherent threats and risks are in security terms viewed as complex and therefore difficult to manage. High risk environments may include major events. The challenge is to prescribe a security solution that captures a range of security elements in order to achieve a cohesive, reliable and sustainable security overlay including physical form, security infrastructure, policy and operating procedures, and people.


The world is getting more complex every day, the diversity of threats that we face at bot a personal and an organisational level continues to evolve. From Cyber security to the threat of terrorist attacks at crowded places the need for effective identification, measurement and reasonably practicable management of security risk has never been more important than it is now.


Over the past 20 years crowd and event management has changed due to the failures and learnings gained from incidents that have resulted in loss of life. The need for increased security practices for crowded places in the current security climate throws new issues for event management. Stakeholder consultation and realistic mitigation can resolve potential issues. Best practice in crowd management has been driven by countries such as the United Kingdom based around the learnings gained from the ‘Hillsborough Disaster’ and implementation of the ‘Purple Guide’. Australia has followed these best practices and in its own right has the ability to lead in the future.


Pricing

Don’t miss your chance to purchase your Conference Pass today – Conference Passes sold out in both 2016 and 2017.

Full Conference Package

$1295

Wednesday Conference plus Thursday and Friday Executive Briefings. Also includes Gala Dinner Ticket

Purchase
Two Day Pass

$1195

Wednesday Conference plus one day of Executive Briefings – choice of either Thursday or Friday Executive Briefings.

Purchase
One Day Pass

$795

Wednesday Conference Only

Purchase

Where To Next

What’s On

Read More

Gala Dinner

Read More

Networking Drinks

Read More