Mike Foster was previously the CEO and Executive Director of Fujitsu Australia and New Zealand.
In line with the restructuring of Fujitsu’s global organization, Mike was appointed as Head of the Oceania Region in April 2014 to November 2020 reporting directly to the Global President of Fujitsu in Japan. He had been instrumental in driving the company’s business strategy at the enterprise level and developing Fujitsu’s presence as a Tier 1 Technology Services Integrator with over 5,000 people in Australia and New Zealand.
Mike’s career to date spans over 25 years in the ICT industry in Australia and North America. Prior to Fujitsu, he spent nine years in senior executive positions at Telstra, including Managing Director, Business Sales, and more recently as the Chief Executive Officer, KAZ Group. Before joining Telstra, he was Managing Director, EMC, Australia/New Zealand and Managing Director, NCR Australia.
Mike’s qualifications include a Bachelor of Education from Victoria University, a Master of Strategic Marketing from Charles Sturt University, qualifications in Conducting Business Negotiations, Company Mergers and Acquisitions from Harvard University, and a qualification in Sustaining High Performance from Babson Graduate College in Boston, USA. Mike is completing a Masters in Cyber security, focusing on specialising in Cyber Management and Leadership.
He is an accomplished public speaker, having actively participated in public speaking at events in Australia, New Zealand, Singapore, Hong Kong, China and South Korea on various topics, including Internet Banking, Electronic Commerce, Relationship Banking, Smart Card Technologies, Cyber and Electronic Security and Automation.
Talking Points
Data Management and Creating a Cyber Security Framework For Executives
What a senior non-IT manager will learn:Data Management and Creating a Cyber Security Framework For Executives
- To give each group a high-level overview of what is happening in the world of Cyber?
- Get them to question; are they doing enough? Or do they know enough? What is your Cyber Maturity Assessment score?
- Show them the many dimensions of what is happening in cyber and that it isn’t enough to leave it with the IT team.
- To give senior executives and board members so tools/questions to ask.
- Make Governance work for you. Ensure checks and audits as to what IT, Data Management and Workforce Behavior doing what they attest to?
- Check there is compliance to cyber and security standards
-Give management their top 5 exposures to cyber and what they need to be doing to address them.
- Review the company response plan across
a number of scenarios. Within your Company, Supply chain or Ecosystem.
Aligning Technology and Processes to Support Your Future Business Strategy
- The importance of using AI/Automation and associated Tools to combat Cyber. The importance of having Executive Dashboards help you manage the following:Aligning Technology and Processes to Support Your Future Business Strategy
Prevention: Risk scores are generated by systems based on variables such as behavioural patterns and geolocation. Zero trust architecture i s combined with machine learning. Asset management leverages visibility using machine learning. Comply with regulations by improving discovery, classification, and p rot ection of data using machine learning. Data security and data privacy services use machine learning for data discovery.
Detection: AI, advanced machine learning, and static approaches, such as code file analysis, combine to automatically detect and analyze threats and prevent threats from
spreading, assisted by threat intelligence
Response: AI /Automation helps in orchestrating security technologies for organisations to reduce the number of security agents installed, which may not talk to each other or, worse, may conflict with each other.
Recovery: AI/Automation continuously tunes based on lessons learned, such as creating security policies for improving future accuracy. AI also does not get fatigued, and it assists humans in a faster recovery
Workshops
Mike is also currently leading 4-hour workshops with businesses looking to gain intel on business security. Workshops
During these sessions executives will learn about:
- What is happening in the world of Cyber.
- Get them to question; are they doing enough? Or do they know enough? What is your Cyber Maturity Assessment score?
- The many dimensions of cyber and that it isn’t enough to leave it with the IT team.
-Tools/questions to ask for senior executives and board members.
- How to make Governance work for you.
- Ensuring checks and audits for IT, Data Management and Workforce Behavior – Are they doing what they attest to?
- Checking for compliance to cyber and security standards.
- The top 5 exposures to cyber and what they need to be doing to address them.
- Reviewing the company response plan across a number of scenarios (Within the Company, Supply chain or Ecosystem).