We use cookies to deliver the best possible experience on our website. To learn more, visit our Privacy Policy.
By continuing to use this site, or closing this box, you consent to our use of cookies.

The Geopolitical Tensions Disrupting the Lateral Movement Equation
Connect with peers in the Sydney CIO Community virtually for an interactive panel discussion on current issues and top priorities for IT leaders.
Join fellow CIOs in the Sydney community to discuss:
Leveraging the platform to identify blind spots
An attackers perspective into credential based attacks
Enforcing MFA to enhance the security posture
Discussion Leaders
Members of the Sydney CIO community will lead the interactive discussion and share lessons learned.

Jonathan Nativ
Silverfort
Director of Strategic Alliances
Presenter

Evan Anderson
Randori
Director, Offensive Security
Presenter

Daniel Smith
Hearing Australia
CISO
Discussion Leader

Nidhin Tamil
Boral Limited
Head of Cyber Engineering, Operations & Defence
Discussion Leader

Graham Thomson
A2 Milk Company
Group Head of IT Security
Discussion Leader
Agenda
28 April 2022
10:00 - 11:00 AEST
The Geopolitical Tensions Disrupting the Lateral Movement Equation
Hosted by Silverfort
In the face of ongoing geopolitical tensions, there is a significant risk that Australian firms could be caught up as collateral damage. The current mayhem also increases the attack surface by providing cybercriminals an opportunity to carry out attacks they may not otherwise get away with. In times of crisis, it is common to see identity-based attacks, lateral movement, and ransomware propagation on the rise. Despite investments, the exploitation of credentials and basic MFA implementations remains a blind spot for today’s security stacks. Every organisation must act with extreme urgency to address any security gaps and accelerate the improvement of its security posture.
Join this session with Silverfort and Jonathan as they provide a live view into both the attacker and the defender's perspective of identity threats and demonstrate:
- How organisations are leveraging their platform to test assumptions and identify blind spots in their security programs
- How an attacker who has obtained admin credentials can use those to gain access to practically any machine in the environment
- How enforcing MFA on all access interfaces within the environment materially increases the level of effort skilled attackers need to employ in order to achieve their objectives.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.