Sydney Forum

Sydney Forum

Copy of DLS Logo Template (4) Copy of DLS Logo Template (2) Copy of DLS Logo Template (3) SON_logo_main_200pxwide
Copy of DLF-location-image (2) (1)

Learn and network in an iconic heritage location

Join us for an afternoon of learning and networking at the Hotel CBD Dining and Fourth Floor in the Sydney CBD.

Copy of DLF-location-image (2) (1)

Learn and network in an iconic heritage location

Join us for an afternoon of learning and networking at the Hotel CBD Dining and Fourth Floor in the Sydney CBD.

Expert Talks From Thought Leaders in DevSecOps

Brendan Hopper
Brendan Hopper
CIO for Technology
Commonwealth Bank of Australia

Brendan Hopper is the Commonwealth Bank Group CIO for Technology, responsible for ensuring that the Bank has a world-leading IT engineering capability, and that we make the right technology investments and decisions so that technology becomes an accelerator, not a disruptor, for us and our customers.

Edwin Kwan
Edwin Kwan
Head of Application Security
Tyro Payments
Edwin Kwan is a DevSecOps advocate and strong believer in having a developer focused approach towards embedding security into the software development life cycle. Trained as a software engineer, he transitioned into security 7 years ago.
Cameron Townshend
Cameron Townshend
Solutions Architect
Sonatype
Cameron Townshend has extensive experience building large mission critical applications. He is both a hands-on developer and a skilled communicator and leader of project teams.
Brendan Hopper
CIO for Technology
Commonwealth Bank of Australia
Brendan Hopper

Brendan Hopper is the Commonwealth Bank Group CIO for Technology, responsible for ensuring that the Bank has a world-leading IT engineering capability, and that we make the right technology investments and decisions so that technology becomes an accelerator, not a disruptor, for us and our customers.

Edwin Kwan
Head of Application Security
Tyro Payments
Edwin Kwan
Edwin Kwan is a DevSecOps advocate and strong believer in having a developer focused approach towards embedding security into the software development life cycle. Trained as a software engineer, he transitioned into security 7 years ago.
Cameron Townshend
Solutions Architect
Sonatype
Cameron Townshend
Cameron Townshend has extensive experience building large mission critical applications. He is both a hands-on developer and a skilled communicator and leader of project teams.

Agenda

12:30 – 13:30

Networking Lunch

13:30 – 14:00

What do software supply chains look like in a post Log4j World?

Cameron Townshend, Sonatype

The Log4shell vulnerability found in the Log4j logging framework has been recognised as one of the most critical vulnerabilities ever, open source or otherwise. And, while the dangers of the Log4j vulnerability remain high, even 4 months out, the situation has highlighted an even bigger issue that is plaguing security professionals and developers: if you don’t know what’s in your software supply chain, you’re already behind.

When a flaw is disclosed, companies are instantly thrust into a race against time to fix it before it can be exploited by an attacker, meaning every minute counts. If you don’t know what’s in your software, you’re effectively giving hackers a huge head start.

While this outlook might seem bleak, Adam will easy steps you can take to significantly mitigate risk.

14:00 – 14:30

Fireside chat: shifting security left, developers as a front line for security

Brendan Hopper, CBA

In this fireside chat, we speak with CBA’s CIO for Technology, Brendan Hopper on the importance of shifting security left. We’ll explore ways to inject security earlier into the development process, how to scale security as development scales and the role of culture in innovation.
14:30 – 14:50

Coffee Break

14:50 – 15:20

Mind the gap… Third Party Management is the new appsec blindspot

Edwin Kwan, Tyro Payments

Third party open-source libraries make up the bulk of most modern applications. Leveraging them allows us to build faster by providing functionality which we would otherwise have to write ourselves. However, not all open-source libraries are created equal, and poor third-party management can result in vulnerabilities being introduced into our applications.

In this session, we will look at just how much open source our applications are using and review some common third-party management gaps in most typical AppSec programs. We will also look at several AppSec best practice approaches for better third-party management.

15:20 - 15:50

Moving from reactive to proactive vulnerability management

15:50 - 16:30

Networking Drinks

Agenda

12:30 – 13:30

Networking Lunch

13:30 – 14:00

What do software supply chains look like in a post Log4j World?

Cameron Townshend, Sonatype

The Log4shell vulnerability found in the Log4j logging framework has been recognised as one of the most critical vulnerabilities ever, open source or otherwise. And, while the dangers of the Log4j vulnerability remain high, even 4 months out, the situation has highlighted an even bigger issue that is plaguing security professionals and developers: if you don’t know what’s in your software supply chain, you’re already behind.

When a flaw is disclosed, companies are instantly thrust into a race against time to fix it before it can be exploited by an attacker, meaning every minute counts. If you don’t know what’s in your software, you’re effectively giving hackers a huge head start.

While this outlook might seem bleak, Adam will easy steps you can take to significantly mitigate risk.

14:00 – 14:30

Fireside chat: shifting security left, developers as a front line for security

Brendan Hopper, CBA

In this fireside chat, we speak with CBA’s CIO for Technology, Brendan Hopper on the importance of shifting security left. We’ll explore ways to inject security earlier into the development process, how to scale security as development scales and the role of culture in innovation.
14:30 – 14:50

Coffee Break

14:50 – 15:20

Mind the gap… Third Party Management is the new appsec blindspot

Edwin Kwan, Tyro Payments

Third party open-source libraries make up the bulk of most modern applications. Leveraging them allows us to build faster by providing functionality which we would otherwise have to write ourselves. However, not all open-source libraries are created equal, and poor third-party management can result in vulnerabilities being introduced into our applications.

In this session, we will look at just how much open source our applications are using and review some common third-party management gaps in most typical AppSec programs. We will also look at several AppSec best practice approaches for better third-party management.

15:20 - 15:50

Moving from reactive to proactive vulnerability management

15:50 - 16:30

Networking Drinks

Why Attend

Fortune 2000 white

Fortune 2000 Companies

Learn from organisations at all phases of their journeys as they talk about the rapidly changing roles within DevSecOps and digital transformations.

It was a great event. The conversation was authentic, relevant, and highly informed.”
—Gene Kim, Author of The Phoenix Project
I am not an easy person to impress and I thought it was a fabulous event.” 
—Sam Guckenheimer, Microsoft
Fortune 2000 white

Senior IT Decision Makers

Senior IT Decision Makers Hear from senior and executive technology leaders who have successfully implemented governance practices within DevOps transformations.

Collaboration and Learning

Collaboration & Learning

Collaboration & Learning Connect with industry peers to learn together how to bring together software developers and security professionals to remediate open source risk, without slowing down innovation.

I really enjoyed the presentations. It's great to see how other organisations are overcoming these challenges. This is a brilliant platform to gain deep insight and understanding. Thank you very much!”
—DevSecOps Leadership Forum Online Attendee
Fortune 2000 white

Fortune 2000 Companies

Learn from organisations at all phases of their journeys as they talk about the rapidly changing roles within DevSecOps and digital transformations.

Fortune 2000 white

Senior IT Decision Makers

Senior IT Decision Makers Hear from senior and executive technology leaders who have successfully implemented governance practices within DevOps transformations.

Collaboration and Learning

Collaboration & Learning

Collaboration & Learning Connect with industry peers to learn together how to bring together software developers and security professionals to remediate open source risk, without slowing down innovation.

It was a great event. The conversation was authentic, relevant, and highly informed.”
—Gene Kim, Author of The Phoenix Project
I am not an easy person to impress and I thought it was a fabulous event.” 
—Sam Guckenheimer, Microsoft
I really enjoyed the presentations. It's great to see how other organisations are overcoming these challenges. This is a brilliant platform to gain deep insight and understanding. Thank you very much!”
—DevSecOps Leadership Forum Online Attendee

Sign Up Here  

Can’t attend? Find another session, or watch previous sessions on demand.
Can’t attend? Find another session, or watch previous sessions on demand.