Slideshow

ARN Exchange - Channel debates data breach notification laws

The spotlight is shining on the security practices and policies of Australian organisations, as the data breach notification laws come into effect. With the cyber health of a nation under question, businesses remain unprepared to handle the requirements, creating a need for external guidance and advice. But is the channel ready to capitalise? Because as Australia wakes up to greater security scrutiny, key questions remain. In 2018, partners must learn legalities, assume risk and deliver outcome-driven solutions. This interactive ARN Exchange event debated the early implications of Australia’s data breach notification laws, extracting opportunities and evaluating challenges for partners in the years ahead - in association with Bitglass, Datto, Extreme Networks, FireEye, Fortinet, Gemalto, Palo Alto Networks and Sophos.​ Photos by Christine Wong.

  • Introducing ARN Exchange, an interactive forum debating the key issues of the day in the Australian channel. Through open and engaging discussions, partners can offer opinions on the opportunities and challenges ahead, providing a platform for different perspectives and insights.

  • James Henderson (ARN)

  • Andrew Taylor (Chubb Insurance) provided a detailed overview of the data breach notification laws, outlining implications to both partners and customers

  • Andrew Taylor (Chubb Insurance) provided a detailed overview of the data breach notification laws, outlining implications to both partners and customers

  • ARN Exchange - Channel debates data breach notification laws

  • ARN Exchange - Channel debates data breach notification laws

  • Andrew Taylor (Chubb Insurance) provided a detailed overview of the data breach notification laws, outlining implications to both partners and customers

  • Andrew Taylor (Chubb Insurance) provided a detailed overview of the data breach notification laws, outlining implications to both partners and customers

  • ARN Exchange - Channel debates data breach notification laws

  • Andrew Taylor (Chubb Insurance) provided a detailed overview of the data breach notification laws, outlining implications to both partners and customers

  • Andrew Taylor (Chubb Insurance) provided a detailed overview of the data breach notification laws, outlining implications to both partners and customers

  • ARN Exchange - Channel debates data breach notification laws

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • After assigning each table a stance, partners and vendors grouped together to discuss either the challenges or opportunities associated to the data breach notification laws, in the context of the channel

  • Challenges: Representatives from each assigned group came together on stage to outline the potential roadblocks ahead for partners and customers - James Bergl (Datto); Julian Critchlow (Extreme Networks); Sean Duca (Palo Alto Networks) and Graeme Pyper (Gemalto)

  • Challenges: Representatives from each assigned group came together on stage to outline the potential roadblocks ahead for partners and customers - Julian Critchlow (Extreme Networks)

  • Challenges: Representatives from each assigned group came together on stage to outline the potential roadblocks ahead for partners and customers - James Bergl (Datto) and Julian Critchlow (Extreme Networks)

  • Challenges: Representatives from each assigned group came together on stage to outline the potential roadblocks ahead for partners and customers - James Henderson (ARN)

  • Challenges: Representatives from each assigned group came together on stage to outline the potential roadblocks ahead for partners and customers - James Bergl (Datto); Julian Critchlow (Extreme Networks); Sean Duca (Palo Alto Networks) and Graeme Pyper (Gemalto)

  • Challenges: Representatives from each assigned group came together on stage to outline the potential roadblocks ahead for partners and customers - Graeme Pyper (Gemalto)

  • Challenges: Representatives from each assigned group came together on stage to outline the potential roadblocks ahead for partners and customers - James Bergl (Datto); Julian Critchlow (Extreme Networks) and Sean Duca (Palo Alto Networks)

  • Challenges: Representatives from each assigned group came together on stage to outline the potential roadblocks ahead for partners and customers - James Henderson (ARN)

  • Challenges: Representatives from each assigned group came together on stage to outline the potential roadblocks ahead for partners and customers

  • Challenges: Representatives from each assigned group came together on stage to outline the potential roadblocks ahead for partners and customers - Sean Duca (Palo Alto Networks)

  • Challenges: Representatives from each assigned group came together on stage to outline the potential roadblocks ahead for partners and customers - James Bergl (Datto); Julian Critchlow (Extreme Networks); Sean Duca (Palo Alto Networks) and Graeme Pyper (Gemalto)

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead - Jon Fox (Sophos)

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead - David Shephard (Bitglass)

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead - Jackson McKinely (FireEye)

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead - Toan Trinh (Fortinet)

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead - David Shephard (Bitglass)

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead - Toan Trinh (Fortinet) and Jackson McKinely (FireEye)

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead - Jon Fox (Sophos)

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead - Jackson McKinely (FireEye)

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead - Toan Trinh (Fortinet); Jackson McKinely (FireEye); David Shephard (Bitglass) and Jon Fox (Sophos)

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead

  • Opportunities: Representatives from each assigned group came together on stage to discuss how partners can capitalise on the new legislation through summarising key channel opportunities ahead

  • Partner Perspective: A select panel of Australian partners examined ways in which security specialists can extract value from the laws in the year ahead, alongside the role of the supply chain in supporting this approach

  • Partner Perspective: A select panel of Australian partners examined ways in which security specialists can extract value from the laws in the year ahead, alongside the role of the supply chain in supporting this approach - Richard Bergman (PwC Cyber)

  • Partner Perspective: A select panel of Australian partners examined ways in which security specialists can extract value from the laws in the year ahead, alongside the role of the supply chain in supporting this approach - Gavin Coulthard (Thomas Duryea Logicalis)

  • Partner Perspective: A select panel of Australian partners examined ways in which security specialists can extract value from the laws in the year ahead, alongside the role of the supply chain in supporting this approach - Tony Vizza (Sententia); Gavin Coulthard (Thomas Duryea Logicalis); Richard Bergman (PwC Cyber) and James Henderson (ARN)

  • Partner Perspective: A select panel of Australian partners examined ways in which security specialists can extract value from the laws in the year ahead, alongside the role of the supply chain in supporting this approach - Richard Bergman (PwC Cyber)

  • Partner Perspective: A select panel of Australian partners examined ways in which security specialists can extract value from the laws in the year ahead, alongside the role of the supply chain in supporting this approach - Tony Vizza (Sententia)

  • Partner Perspective: A select panel of Australian partners examined ways in which security specialists can extract value from the laws in the year ahead, alongside the role of the supply chain in supporting this approach

  • Partner Perspective: A select panel of Australian partners examined ways in which security specialists can extract value from the laws in the year ahead, alongside the role of the supply chain in supporting this approach - Tony Vizza (Sententia); Gavin Coulthard (Thomas Duryea Logicalis) and Richard Bergman (PwC Cyber)

  • Partner Perspective: A select panel of Australian partners examined ways in which security specialists can extract value from the laws in the year ahead, alongside the role of the supply chain in supporting this approach - Richard Bergman (PwC Cyber)

  • Partner Perspective: A select panel of Australian partners examined ways in which security specialists can extract value from the laws in the year ahead, alongside the role of the supply chain in supporting this approach - Tony Vizza (Sententia); Gavin Coulthard (Thomas Duryea Logicalis) and Richard Bergman (PwC Cyber)

Show Comments