This event is only available for members. If already a member please Login or click here to become a member.
Shadow IT – A Topic of Debate
A lighthearted, fun, but also serious panel discussion and debate on the issues and implications of Shadow IT
About this event
Shadow IT, are the instances of IT within an organisation that have been obtained or are managed outside the governance, IT or security management structures of the IT department.
How and why shadow IT can occur is due to many factors, almost all which can be the subject of intense debate. Various stakeholders from around organisations will have differing views on whether shadow IT is good or bad. Most will agree that it is a topic that brings many important security implications, and the “right answer” to the question of shadow IT is not simple to find.
Join our panel of experts who all bring different yet overlapping experience in managing IT and cyber security as they share their views on shadow IT and how they’ve approached this issue.
Speakers
With over 23 years of experience, Ash commenced her career in the Defence Forces and also worked with the Australian Defence Force and United Nations in East Timor as part of the peacekeeping forces. Having transitioned from a defence background to the corporate sector, Ash has a background in Logistics, Supply Chain, and Procurement. Ash is also a passionate mountaineer havingscaled peaks over 7000m in the Himalayas.
In her current role in vendor management within the technology sector, Ash excels at establishing strong supplier relationships and ensuring operationalefficiency, quality, and cost-effectiveness in all aspects of third-party relationships. Her expertise in managing vendor risk and compliance has been instrumental in driving strategic initiatives and fostering innovation.
Ash is a strong believer that effective relationships contribute towards a growing organisation. Her commitment to building trust and collaboration with vendors has consistently resulted in enhanced service delivery and mutual growth.
She regularly briefs senior executive, audit and risk committees and boards on privacy and cyber security matters and has supported numerous organisations through notifiable data breaches. Kate has a Masters in Marketing and an MBA from the University of Melbourne as well as CISM certification.
She has won local and global recognition for her success in digital communication and was a finalist in the Women in ICT Awards in 2022 and 2023. She is a member of the Australian Women in Security Network and an ISACA member. Kate is the CISO at EPA Victoria.
Stephen is an IT & OT cybersecurity security specialist with a background in Policy Development, Governance, Leadership, Cybersecurity, IT Systems and Network Engineering, Education & Business Analysis. He has worked from the server room to the board room on security, governance, policy and technology.
He has helped organisations respond to and recover from internally and externally caused cybersecurity and operational incidents and helped put in place the needed policies, governance and technology to avoid recurrence and mitigate future instances of various types of incidents.
Event Location
Event Terms & Conditions
Registration
- Payment in full is required the time of booking in order for the registration to be valid.
- To avoid disappointment, ensure you pay for your booking(s) before the registration closing date. Anyone that has not received a confirmation email will not be on the event attendance list and therefore will not be admitted to the event.
- Online registration ends at the time stated on the event registration page.
Cancellation and Refund
All cancellations must be processed through the website, a refund will only be considered if it is at least 3 working days prior to the event.
Disclaimer
- ACS reserves the right to change the program at any time. Every effort will be made to ensure a program of equivalent standard and members are updated with changes.
- All dietary requirements are considered, however we cannot guarantee a 100% allergen free environment.
- ACS reserves the right to prohibit entry or eject any person from an ACS event based on behaviour deemed inappropriate by ACS staff, its agents and/or others working under its authority.
- Filming or streaming by attendees is not permitted. If an attendee is found to be doing so they will be asked to leave the event immediately and further action may be taken.
- Photography and/or filming may take place during this event, by accepting these terms you consent to this. Please let a member of ACS know if you do not want your picture taken.
COVID-19 Event Attendance Compliance
By registering to attend an ACS in person event you are agreeing to the below terms and conditions
- If an attendee is displaying flu or cold like symptoms in the days leading up to the event and therefore is not able to attend, ACS will refund the registration fee.
- If an attendee comes to an event and is displaying flu or cold like symptoms they will be asked to leave
- We ask all ACS members to respect the social distancing guidelines, if an attendee repeatedly disregards these guidelines, they may be asked to leave
- ACS reserves the right to cancel the event within 24 hours' notice if either the speaker or the event host has advised us that they are exhibiting flu or cold like symptoms
- All attendees must provide a valid phone number and email address to be contacted on if there is reason to notify about a possible COVID-19 exposure
Personal information collection notice
By registering for this event, you are providing personal information to the Australian Computer Society. In accordance with the ACS Privacy Policy, ACS collects personal information through registrations and attendances at its events for the purposes of:
- organising and providing the various professional development events held by the ACS (including for example, courses, conferences, seminars, workshops, launches);
- processing and managing event registrations (including catering for dietary requirements);
- maintaining event attendance records;
- contacting registered event guests with information in regard to the event and seeking post-event feedback;
- communicating with you to in relation to future events or ACS products, courses, services, promotions or other products or services that ACS reasonably thinks may be of interest to attendees;
- processing and responding to attendee inquiries; and
- conducting research to improve its events and better understanding needs.
If the required information is not provided, we or any involved third parties, may not be able to respond to you, update you, or provide appropriate services or events to you.
We may obtain personal information directly from you or from someone who registers for the event on your behalf. If you provide us with personal information about another person, you must do so only with their consent and agree to make them aware of this privacy notice.
ACS may share your personal information with third parties for the collection purposes noted above or as set out in our Privacy Policy, where it is reasonably necessary for, or directly related to, one or more of our activities, or required by law.
When you register to participate in an overseas event, we may send personal information we collect overseas.
See our Privacy Policy at https://www.acs.org.au/privacy-policy.html for more information about our privacy practices.