CyberWest Summit 2024 Program

░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄
░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░
░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀
░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█
░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█
░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀
░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀
░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█
░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀
░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀
░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀
░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀
░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀
░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀
░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀
░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀
░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░
░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀
░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄
░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█
░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░
░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀
░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░
░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀
░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█
░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█
░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀
░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀
░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█
░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀
░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄
░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄
░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀
░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█
░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░
░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░
░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄
░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░
░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀
░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀
░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░
░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░
░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█
░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█
░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀
░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀
░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░
░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░
░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█
░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█
░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀
░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄
░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄
░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░
░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█
░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█
░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀
░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄
░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░
░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀
░▄▀▄░▀▀▄░█░█░█▀▀░█░█░█▀▄░█▀▀░█▀▄░█░█░█▀▀░█▀▀░▀█▀░█▀▀░█░█░█▄█░█▄█░▀█▀░▀█▀░▀▀▄░▄▀▄░▀▀▄░█░█                                                    
░█/█░▄▀░░░▀█░█░░░░█░░█▀▄░█▀▀░█▀▄░█▄█░█▀▀░▀▀█░░█░░▀▀█░█░█░█░█░█░█░░█░░░█░░▄▀░░█/█░▄▀░░░▀█                                                    
░░▀░░▀▀▀░░░▀░▀▀▀░░▀░░▀▀░░▀▀▀░▀░▀░▀░▀░▀▀▀░▀▀▀░░▀░░▀▀▀░▀▀▀░▀░▀░▀░▀░▀▀▀░░▀░░▀▀▀░░▀░░▀▀▀░░░▀

CyberWest Summit 2024 takes place across two days at Pan Pacific Perth. Find out what, when and where in the program below.

8:00 am
Pan Pacific Perth
60
Minutes

Registration

No items found.
9:15 am
Plenary (Golden Ballroom)
Pan Pacific Perth
10
Minutes

Conference Opening

Hon Stephen Dawson MLC

Minister for Innovation and the Digital Economy
|
Goverment of Western Australia
9:30 am
Resilience
Pan Pacific Perth
20
Minutes

How to Lead in Security and Resilience

How can WA lead in security and resilience to protect our critical industries?

Hayley Turner

Area Vice President, APAC
|
Dragos
10:30 am
Pan Pacific Perth
40
Minutes

Morning Tea

No items found.
11:00 am
Govern
Pan Pacific Perth
180
Minutes
Govern

Becoming Cyber Ready at CyberWest Summit 2024

CyberWest Summit is WA’s flagship cybersecurity education and awareness event. Learn from dozens of cybersecurity experts and acquire the skills to prevent and react to cyber crime targeting your business.

Craig Ford

Head Unicorn
|
Cyber Unicorns

Matthew Sear

CEO
|
Best IT & Business Solutions
11:10 am
Defend
Pan Pacific Perth
40
Minutes
Protect

PANEL: Protecting Corporate Data

Safeguarding sensitive information, such as customer data, is essential for maintaining trust and complying with privacy laws. Join our panel of experts to explore how to protect corporate data across a range of industries.

Tina Ambrose

CEO
|
Valrose

Alex Evans

Manager Customer & Information Services
|
City of Wanneroo

Shane Jansz

Head of Customer Solutions
|
Nuix
11:10 am
Resilience
Pan Pacific Perth
40
Minutes
Respond

PANEL: Incident Response: What to do when it goes wrong?

Do you know what to do if you experience a hack? Don't work it out in the moment, this panel will explore key considerations for planning for an incident.

Shana Uhlmann

Chief Information Security Officer
|
Minderoo Foundation
11:10 am
Goldsworthy
Pan Pacific Perth
90
Minutes
Govern

WORKSHOP: How to create a culture of collaboration for better cyber security

There is more to cybersecurity than technical matters and metrics.  In this workshop participants will engage in a lively process that creates opportunities to shift perceptions and open new possibilities for working together more harmoniously and effectively.

Caitriona Forde

|
caIT Cyber Safe

Elaine Olsen

Partnership and Business Development Lead
|
Befriend
11:10 am
Hamersley
Pan Pacific Perth
90
Minutes
Respond

WORKSHOP: Cyber Security for Small Business

Learn the  fundamentals to keep your small enterprise secure. Think like an attacker in assessing your weaknesses, understand business email compromise and spoofing, and get the Ransomware 101.

Tim Orr

Cyber Security Training & Awareness Manager
|
Commonwealth Bank
12:00 pm
Govern
Pan Pacific Perth
20
Minutes
Govern

The How, Why and Which of Cybersecurity Frameworks: Identify and Implement your Perfect Fit

There are a range of information security framework(s) available. How can you determine the right one for your organisation? This session will consider various cybersecurity frameworks’ unique features and applicability, to enable organisations to make informed choices, saving considerable time, resources, and financial investments.

Gaurav Vikash

Head of Security and Risk (APAC)
|
Axon
12:00 pm
Defend
Pan Pacific Perth
40
Minutes
Protect

PANEL: Securing Remote Operations: Challenges and Solutions

Securing remote operations in today’s digital landscape is crucial, especially in our large state with remote mining, agriculture and space activity, and also, as more organisations embrace remote work. This expert panel will share how they are meeting this future challenge of securing the whole organisation's operations, wherever they may be.

Tamryn Barker

Co-founder and CORE Skills Lead
|
CORE Innovation Hub

Hayley Turner

Area Vice President, APAC
|
Dragos

Rob Labbe

CEO and CISO-in-Residence
|
MM-ISAC
12:20 pm
Govern
Pan Pacific Perth
20
Minutes
Govern

It's time to grow up! Maturing with the Essential 8

This session is a deep dive into the implementation of the Australian Cyber SecurityCentre's Essential 8. Covering Maturity Levels 1 through 3. Attendees will learn what the framework means, and how to start the process in implementing it.

Shaun Barnett

Manager, Cyber Security
|
Ever Nimble
12:40 pm
Pan Pacific Perth
60
Minutes

Lunch

No items found.
1:40 pm
Resilience
Pan Pacific Perth
20
Minutes
Identify

Enhance Resilience: A Comprehensive Approach to Third Party Preparedness

This session will give SMEs strategies and best practices to take a proactive approach to third-party risk management by implementing robust controls, fostering transparency, and collaborating effectively with their clients. This session is essential for any business needing to understand the role they play in creating a resilient and secure vendor ecosystem.

Prudence Jofirisi

Senior Cyber Security Advisor
|
Keystart
1:40 pm
Goldsworthy
Pan Pacific Perth
90
Minutes
Identify

WORKSHOP: MM-ISAC

The MM-ISAC is a not-for-profit industry owned Information Sharing and Analysis Centre (ISAC) for the global mining and metals industry.  Join the team in this interactive session exploring current concerns in the global cyberthreat landscape.

Rob Labbe

CEO and CISO-in-Residence
|
MM-ISAC

Cherie Burgett

Director, Cyber Intelligence Operations
|
MM-ISAC
1:45 pm
Govern
Pan Pacific Perth
20
Minutes
Govern

Setting the Standard: The Importance of Governance in Cyber Security

Security governance serves as the foundation upon which effective cybersecurity practices are built. It ensures that organisations have the policies, processes, and controls in place to manage cyber risks and protect sensitive data, in addition to all of the technical controls typically implemented. By exploring why NIST has incorporated 'Govern' as a separate pillar, we not only gain insights into the framework's evolution but also underscore the crucial role of governance in safeguarding our digital assets and ensuring the resilience of systems.

Jordan Davies

Senior Security Consultant
|
ES2 | OneStep
2:00 pm
Govern
Pan Pacific Perth
20
Minutes
Identify

Cyber security lessons from OH&S safety

Just like safety, security needs to take into account that there are humans in the loop. Many organisations, especially in mining, are already successfully implementing a safety zero approach and we can follow the same approach for security.In this session we will explore lessons learnt from safety culture to help us make security just as successful.

Byron Pogson

Senior Security Solutions Architect
|
Amazon Web Servies
2:00 pm
Defend
Pan Pacific Perth
20
Minutes
Protect

Securing Remote Operational Technology: A Case Study

Talison is a leading global producer of lithium minerals operating in WA. They will share recent efforts to uplift security across their operations.

Chris Milford

CIO
|
Talison Lithium
2:00 pm
Resilience
Pan Pacific Perth
20
Minutes
Govern

Aligning your cyber strategy to your business strategy

Aligning your cybersecurity strategy with your business strategy is crucial for resilience, growth, and overall success. It transforms cybersecurity from a technical concern into a strategic advantage, safeguarding both business interests and customer trust.

Sameera Bandara

Ex Head of IT
|
St Barbara Limited
2:30 pm
Govern
Pan Pacific Perth
40
Minutes
Govern

PANEL: Creating a Security Culture

While technology and training are essential, they alone cannot fully safeguard companies against cyber threats. The human factor plays a significant role in data breaches. A strong culture ensures that every member of an organisation embraces secure behaviours. It’s not just about telling people what to do; it’s about instilling a sense of responsibility and understanding of the risks.

Caitriona Forde

|
caIT Cyber Safe

Kai Roer

CEO and founder
|
Praxis Security Labs

Marie Knights

Head of Cyber Influence and Education
|
Ramsay Healthcare
2:30 pm
Govern
Pan Pacific Perth
20
Minutes
Identify

Best Practice for safely using AI in marketing

By incorporating AI and social media into our daily routines and business strategies, we inadvertently expand our digital footprint, which, without adequate cybersecurity measures, becomes a target for cyber threats. However, by staying informed and using these tools responsibly, we can significantly mitigate theserisks. It's important to learn how we can effectively do this.

Luiza Fugarevici

Cyber Security Analyst
|
Avertro
2:30 pm
Defend
Pan Pacific Perth
40
Minutes
Protect

A live hacking demonstration involving common types of attack

Hackers don't just wear hoodies! It's time we moved beyond the ideas of scary super-hackers and acknowledge that the skills and knowledge needed to compromise computer systems are more common than many think. In this session attendees will see real demonstrations of common attacks giving them a more grounded idea of what 'hacking' really means, from Australia’s top-ranked competitive hacking team, Emu Exploit. As organisations put increasing resources into protecting themselves from the commonly sensationalised threat of cyber-attack, it is vital that decision-makers are given opportunities to learn from hackers what that label really means.

Orlando Morris-Johnson

Member
|
Emu Exploit

Ranier Wu

Vice Captain
|
Emu Exploit

Torry Hogan

Member
|
Emu Exploit
2:30 pm
Resilience
Pan Pacific Perth
40
Minutes
Respond

PANEL: Keeping Australia running - cyber for connected Critical Industries

What are Critical Infrastructure Assets? They’re assets that are essential to the functioning of the Australian economy, society and/or national security.At this session our experts will discuss how organisations operating in critical industries such as energy, healthcare, and transport can address cybersecurity challenges in critical industries and implement effective strategies to safeguard vital infrastructure.

Kath Forward

Assistant Director | Cyber Security Outreach
|
National Office of Cyber Security

Gohar Rind

Founder & Managing Director
|
Yira Yarkiny

Helen McLeish

Chief Cyber Security Officer
|
East Metropolitan Health Service
2:50 pm
Govern
Pan Pacific Perth
20
Minutes
Identify

Demystifying Quantum-Preparedness: what's happening, what's at risk, and what should we be doing about it?

WA is a leader in current quantum technology research. It's an exciting field. But do you know how quantum technology could impact your business security in the near future? Emerging technologies within quantum will be revolutionary for many fields, however there are some significant forecasted risks to specific cyber security measures in use today. Learn what to watch out for in this space and get an outline of what first steps will look like for SMEs to begin quantum-preparedness.

Tara Lie

ICT Security, Risk & Compliance Analyst
|
Red Hot Cyber
3:10 pm
Pan Pacific Perth
30
Minutes

Afternoon Tea

No items found.
4:10 pm
Plenary (Golden Ballroom)
Pan Pacific Perth
30
Minutes
Identify

Shadows of the digital world - Let me tell you some cyber stories

For too long, cyber has been made look very complicated and businesses are just ignoring it, that is not the answer, cyber insurance is not the answer. In this presentation Craig will show you how cyber safety is everyone's business, you don't need massive budgets or time and you don't need to be a techy to get the basics right. And that, can be the difference between a breach or no breach. It can be the difference between having the ability to recover or losing everything.

Craig Ford

Head Unicorn
|
Cyber Unicorns
5:00 pm
Pan Pacific Perth
90
Minutes

Welcome Reception

No items found.
8:00 am
Pan Pacific Perth
60
Minutes

Registration

No items found.
10:00 am
Pan Pacific Perth
40
Minutes

Morning Tea

No items found.
10:40 am
Govern
Pan Pacific Perth
40
Minutes
Govern

Building cyber resilience: directors' duties, legal duties and cyber risk management

Building cyber resilience starts at the top of an organisation. Directors' duties and legal duties on companies now necessitate appropriate cyber risk governance. Too often boards view information security as a technology risk and not an overall business risk. Rather than leaving cyber resilience to the IT and cyber-security departments, boards need to become much more tech savvy and alert to how the threats have changed, in particular, for the data they collect and manage. Simone is an experienced presenter on topics related to the intersection of cyber, legal and business risk and the role of human behaviour in building cyber resilience. She has educated over 10,000 Australians about cyber risk through Law & Cyber's online and face to face education, given expert written opinion in Supreme Court proceedings about the intersection of cyber risk and professional duties, presents at executive roundtables, and advises businesses.

Simone Herbert-Lowe

Principal
|
Law & Cyber
10:40 am
Resilience
Pan Pacific Perth
40
Minutes
Respond

PANEL: Combatting Australian CyberCrime, protecting our economy

Hannah Speldewinde

Cybercrime Operations
|
Australian Federal Police
10:40 am
Goldsworthy
Pan Pacific Perth
90
Minutes
Govern

WORKSHOP: Cyber Culture

Kai Roer

CEO and founder
|
Praxis Security Labs

Caitriona Forde

|
caIT Cyber Safe
10:40 am
Hamersley
Pan Pacific Perth
90
Minutes
Protect

WORKSHOP: Beyond Technology: Preparing organisations and people to drive business value from Generative AI

Hear from industry leaders in this field, view AI demos and consider the power of Generative AI for security and beyond.

Learn how to use GenAI securely and some of the risks and define risk in this context and specifically cover

•  Sensitive data leakage

• Risky content that may be created by generative AI (studies show more than 70% of leaders worry about inaccuracy of responses and almost 60% worry about harmful biased or distressing up outputs)

• Regulations on the horizon such as the EU AI act mean leader's face increasing regulatory pressure in this space

Vannessa van Beek

Senior Director
|
Avanade Australia
11:30 am
Govern
Pan Pacific Perth
20
Minutes
Identify

Cyber Awareness - your people are your first line of cyber defence

A strong cybersecurity posture is heavily reliant on an organisation's culture. Building a cybersecurity culture within a business, not only emphasises and reinforces security behaviours among staff but also helps to protect your organisation against a cyber-attack with your people being a first line of defence.

Leah Armand

Assistant Director Cybersecurity GRC
|
Federal Court of Australia
11:30 am
Resilience
Pan Pacific Perth
40
Minutes
Protect

PANEL: Unlocking AUKUS opportunities through cyber capability

Under AUKUS British and American nuclear-powered submarines are expected to have a rotational presence at HMAS Stirling in Kwinana from as early as 2027. This will present opportunities for suitably secure organisations to supply in to this project.Hear from our defence experts on opportunities the defence industry holds and how to meet security requirements.

Rachel Falzon

Director
|
Novel Management - Defence Consulting

Gary Hale

Director, National Resilience and Security
|
Curtin University
12:00 pm
Govern
Pan Pacific Perth
20
Minutes
Identify

Data and Navigating Ethical and Legal frameworks

As we move towards a more digitised world, data has become avital resource for businesses aiming to drive innovation and maintain their competitive advantage. Nevertheless, the utilisation of data, particularly personal data, presents substantial ethical and legal dilemmas. This talk aims to delve into the crossroads of data, exploring the balance between legal and ethical choices within the domain of artificial intelligence. Our goal is to empower attendees by providing them with the necessary tools and understanding to assist with better decision making capabilities in the realm of data, data usage, and AI implementation and/or usage.

Brenda van Rensburg

Data Protection and Artificial Intelligence Governance Executive
|
Terrene Global
12:20 pm
Govern
Pan Pacific Perth
40
Minutes
Govern

Augmentations with Generative AI: A Cyberpunk's Guide

Generative AI started last year as a fad, a gimmick, and potentially the coolest thing that computers have ever done. It has now infiltrated every business in some way and is having monumental ramifications on how work is done (and, yes, how we secure the business) now and into the future.While the knee jerk "No AI" approach can be seductive, it's not useful in the long run. We need to be the best, most secure users of these systems and tools to best understand and advise on how to securely utilise them. We can't lead if we don't understand the field of play, so we need to learn fast.Stefan exists at the intersection of AI, Cyber, and the humanities. He is uniquely placed to speak on these things: he actually knows how these things work, he’s built them himself, and knows what they can and can't do. Don’t miss this entertaining and passionate presentation.

Stefan Prandl

CTO
|
Hyprfire
12:20 pm
Defend
Pan Pacific Perth
40
Minutes
Protect

Securing the Links: Cybersecurity in the SME Supply Chain

This presentation aims to empower SMEs with knowledge and tools to effectively manage cybersecurity risks in their role as suppliers, helping them become more resilient and competitive in the process. Through simple, non-tech language, Alladean will define supply chains, give practical examples of attacks and highlights the importance of cybersecurity in maintaining and enhancing business relationships within the supply chain. Alladean’s PhD research is focused on the cyber security of Western Australian SMEs and he is a published author in this space.

Alladean Chidukwani

Senior Cyber Security Advisor
|
Bunnings Group
12:20 pm
Resilience
Pan Pacific Perth
40
Minutes
Recover

PANEL: Choosing a Secure IT Provider

When selecting an IT provider, evaluating their security capability is crucial to ensure your organisation is protected and resilient against cyber threats.This panel will explore what you should be looking for in your provider.

Vannessa van Beek

Senior Director
|
Avanade Australia

Chris Morrisey

CEO & MD
|
Ever Nimble

Kelly Winrow

Director
|
EOS IT
2:00 pm
Resilience
Pan Pacific Perth
40
Minutes
Recover

Cyber Love and Deception: Decoding Romance Scams through the Fake Date Game

Play the FakeDate Game a simulated game experience where players will learn to discern between real and fake online profiles, identify potential romance scams, and understand the tactics employed by scammers.As the creator of the Fake Date Game, Oliver offers an interdisciplinary insight into the technical nuances of the game and how these complement human vulnerabilities that romance scammers target. He designed the Fake Date Game to empower individuals with actionable skills in identifying, protecting against, responding to, and recovering from romance scams. In this session, he'll explore the game's mechanics and the underlying psychological principles, providing a thorough understanding of how to bolster cyber resilience against romance scams.

Oliver Guidetti

Post-Doctoral Researcher
|
Edith Cowan University
2:20 pm
Defend
Pan Pacific Perth
20
Minutes
Protect

Turning Data Privacy into a Competitive Edge

Data privacy is an important part of cyber security, but it's often overlooked or put into the 'compliance' box. While there are legal obligations, data privacy is all about building trust, differentiating from competitors, mitigating risks, and positioning the business for long-term success in an increasingly data-driven world (not so different from cybersecurity!) At this session you will get a brief overview of current data privacy regulations and their impact on businesses, learn practical ways to innovate and build a competitive advantage through robust data protection practices and get proactive steps to prepare for a data breach and manage crisis communications during a data privacy incident.

Gillian van Rensburg

Data Privacy Specialist
|
VGW
2:50 pm
Govern
Pan Pacific Perth
40
Minutes
Identify

The Anatomy of a Scam - How Cyber Criminals Target You!

It is essential to educate about the potential risks of falling victim to scams or hacking attempts. Equally important is providing them with straight forward and practical methods to protect themselves.Understanding how scammers manipulate the psychology of a victim becomes particularly valuable when individuals find themselves in situations where they might be targeted. With this understanding, individuals are better prepared to respond thoughtfully and appropriately, rather than reacting impulsively in the moment.

Matthew Sear

CEO
|
Best IT & Business Solutions
3:30 pm
Pan Pacific Perth
30
Minutes

Afternoon Tea

No items found.
4:30 pm
Plenary (Golden Ballroom)
Pan Pacific Perth
30
Minutes
Govern

Fireside chat with Kai Roer

Widely considered as the leading authority on the topic of security culture, Kai Roer is a best-selling author, an award-winning speaker, and a serial entrepreneur. Currently serving as CEO at Praxis Security Labs, an innovative security software company which he co-founded in 2023, Kai has been providing actionable advice grounded in empirical evidence to public and private organisations around the world since the 1990s. Kai is dedicated to improving the knowledge and understanding of the human factors that influence security and the organisational impact they have, and in recent years has focused on helping organizations understand what culture they currently have, what culture they would like to have, and more importantly, how to get there. In 2010, he created the Security Culture Framework (SCF), a framework and methodology to build and maintain security culture, which he later gifted to the open-source community. The SCF evolved into several spin-offs, including the Cybersecurity Culture Framework by The European Union Agency for Cybersecurity (ENISA).

Kai Roer

CEO and founder
|
Praxis Security Labs

Caitriona Forde

|
caIT Cyber Safe
5:00 pm
Pan Pacific Perth
90
Minutes

Farewell Reception

No items found.