According to the Australian Government, cyber incidents cost the economy up to AU$29 billion a year. While New Zealand’s central bank estimates costs resulting from cyber-attacks could exceed NZ$2.3 billion a year to the country’s financial sector.
With heavy pressure to protect our countries and businesses from ever more sophisticated threats, the responsibility is on cybersecurity leaders to be well-equipped to predict, prevent and respond to criminal attacks.
Building on the success of the first edition, the 2nd CISO Online, A/NZ offers you the tools you need to keep up with technology innovation and best-in-class industry practices.
Simply sign-up, logon and learn.
DAY ONE: PREDICT & PREVENT
How prepared are you for today’s challenges? What are the technologies that can support your cyber resilience strategy? Day One is focused on exploring practices to predict and prevent attacks by mitigating and controlling risks. Join us in a conversation on how to continuously review, streamline and improve your processes, and how technologies can be adopted to reduce your company’s exposure to cyberattacks.
DAY TWO: HUMAN FACTORS IN CYBER
Data leaks, breaches or attacks are no longer a question of if, but a matter of when. Not having the right systems, tools and skills to be able to report and respond to incidents quickly could lead to disastrous impacts. Yet, most companies are unaware of how secure they are until their data or systems are compromised. Day Two focuses on making the most out of your people to reduce and minimise the risks of financial, operational and reputational losses as a result of cyber-attacks.
Professionals in the following areas:
One week of digital disruption would indirectly cost the Australian economy:
Between 2019-2020 the ACSC received
1. ACSC Annual Cyber Threat Report 2019-20
2. Austcyber Digital Trust Report 2020
Over two days, we will broadcast our expert panels, interviews and webinar sessions directly to your desk. Benefit from insightful sessions, delivered by outstanding cybersecurity leaders, covering the most pertinent strategic issues. This allows you to fit the agenda around your busy schedule.
Ask Your Questions
Our webinars are not just presentations. Get involved and submit your questions in the live Q&A during the sessions.
Our online events use the latest browser-based technology, so you won’t need to download anything to join, you just need access to the internet!
ARCON is a leading technology company specialized in providing Risk Control Solutions. ARCON believes in technological innovations that constantly mitigate the current and emerging digital threats that wreak havoc on organizations from various industries. Internet, millions of interconnected devices and IoTs (Internet of Things) are revolutionizing the world of technology. At the same time, business operations are moving towards advanced automation where greater risks are emanating from threats that are now embedded within those technologies. In addition, various interfaces are vulnerable to sophisticated digital threats. In order to mitigate these risks, ARCON, came into being in 2006 with the sole objective of working towards the next generation risk control solutions that work in real-time.
The vision of the company is to create a stack of products that work at the enterprise level to provide a robust control framework which works not only at the device level but also across applications and business processes. The company aims to have a set of products which would have their individual objectives and goals; however the vision is to have an integrated framework that would converge at the business level.
ARCON’s product portfolio includes:
These enterprise-class solutions provide seamless access and have scalable architecture. More than 500+ global enterprises, spanning wide range of industries such as Banking, Finance, Insurance, Telecom, Government, Oil & Gas, Pharmaceuticals, Logistics and Fintech trust ARCON solutions to safeguard their critical business information. These next-generation solutions are based on the technologies that are able to PREDICT, PROTECT and PREVENT malicious elements.
901 & 902, Kamla Executive Park,
Off. Andheri-Kurla Road, JB Nagar, Andheri (E),
Landmark: Nr. Vazir Glass Factory,
Mumbai, Maharashtra, India - 400059
Phone: +91 22 4221 5300 | Email: email@example.com | Fax: +91 22 4221 5303
BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com.
Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 4,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems.
The company has over 1,300 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.
KnowBe4 is the world’s largest integrated Security Awareness Training and Simulated Phishing platform. Realising that the human element of security was being seriously neglected, KnowBe4 was created to help organisations manage the ongoing problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using real-world mock attacks, engaging interactive training, continuous assessment through simulated phishing, and vishing attacks and enterprise-strength reporting. Tens of thousands of organisations worldwide use KnowBe4’s platform to mobilise their end users as a last line of defense and enable them to make smarter security decisions.
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 8,400 organizations, including Engie, JetBlue, Nordstrom, Takeda Pharmaceutical, Teach for America, T-Mobile and Twilio, trust Okta to help protect the identities of their workforces and customers.
OneLogin manages and secures millions of identities around the globe by bringing speed and integrity to the modern enterprise with an award-winning Identity & Access Management (IAM) solution. Our Trusted Experience Platform secures connections across users, devices, and applications, helping enterprises drive new levels of business integrity, operational velocity, and team efficiency across all their cloud and on-premise applications. Risk-based authentication, mobile identity management, and real-time directory synchronization add an extra layer of protection. The ability to handle on-premises and cloud/SaaS applications makes OneLogin the Identity as a Service (IDaaS) vendor of choice for the hybrid enterprise.
Organisations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Learn more at www.rapid7.com.
Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant.
Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside.
By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.
The AIPIO goal is to advance the professionalisation of intelligence.
To achieve our vison and goal, AIPIO works to sustain and grow a community of intelligence practitioners' through advocacy, thought leadership and partner engagement.
The Institute's membership reflects all domains of intelligence practice including: national security, defence, law enforcement, regulation, compliance, business, industry and academia.
Information Technology Professionals Association (ITPA) is a not-for-profit organisation established to advance the understanding of ICT matters within the community, corporate and government sectors in Australia.
Our members are professionals within the IT Industry in Australia and abroad who aim to advance the practice of Information Technology as a profession.
Our vision is for our members to deliver outcomes which enhance and enrich society through the understanding and application of technology in an increasingly online world.
The New Zealand Information Security Forum has been launched as an independent organization in 1995. Since 2001 it has operated as a Special Interest Group of the New Zealand Security Association.
Members of the NZISF work as independent consultants, members of divisions responsible for information security, academics, students and journalist, all of them interested in information security issues.
The New Zealand Security Association (NZSA) is the largest industry representative body for the security industry in New Zealand and represents over 85% of the industry by revenue. Its voluntary members include security providers ranging from large multi-nationals to sole traders and also includes individuals and companies who are not direct providers of security services but have an interest in the industry.
The stated objective of the New Zealand Security Association is to do all things necessary and lawful to ensure there is always available to the New Zealand public, a security industry comprising of persons and firms who are fit and proper. The New Zealand Security Association is committed to the highest standards of professional and ethical conduct at all times.
The Victorian Security Institute (VSI) was established in 1973 by security professionals in order to develop the science of security management and to develop and direct the professional standards of the security industry. Today, the membership consists of security practitioners and educators from a broad range of industries who share a common belief in the value of high professional and ethical standards for the security industry. The Institute has initiated and developed educational and professional development programs to assist its membership and the security industry.
AZK Media is a global B2B marketing, content and communications consultancy servicing the technology, data, martech, adtech, health, tax and finance sectors. Founded in 2017, leading organisations like Sisense, Silverbullet, Bonzai, Wolters Kluwer and The Tax Institute leverage AZK Media’s outsourced CMO capability to support, streamline, and scale marketing strategy and implementation to drive measurable results.
Driven by our global, connected network, Corinium inspires data and analytics senior leaders to make quicker, more informed decisions and follow proven paths to success. Through insights, practical tools, expert guidance and industry connections, we help executives harness data as an asset to drive efficiency and innovation.
On our new platform, the Business of Data, we have curated a wealth of thought-leading insights, via video podcasts, in-depth articles, reports, and interviews. Find out how other senior data and analytics leaders are tackling the challenges we’re facing today and are accelerating their organization’s recovery and transformation.
For a limited time, subscribing to the Business of Data is free, so make sure to do so today for complimentary access to exclusive insights you just can’t find anywhere else: http://www.business-of-data.com/
CISO MAG is the cyber security news publication for every stakeholder of safe Internet. If you are looking to keep abreast of the latest happenings in information security and are curious to know how security leaders are battling out of their skins to keep Internet safe, we assure you that you won’t be disappointed.
Computer Weekly stands out from the many technology news websites on offer through its unique history, extensive reader community and in-depth coverage of the issues, challenges and trends facing today’s IT leaders. Computer Weekly provides the latest news and analysis through its website and 200,000-subscriber weekly digital magazine, as well as award-winning and exclusive premium content; a dedicated monthly magazine for European IT leaders; independent research studies; and the CW500 Club’sexclusive networking events for senior IT managers. From being the world’s first weekly IT newspaper in 1966, to today’s multi-platform digital publication, Computer Weekly continues to reach millions of IT decision-makers in the UK, Europe and the rest of the world.
MySecurity Media is an integrated media provider for the Security, Technology, Risk and Governance sectors with market reach via newsletters, digital magazines, podcasts, article mixes, web-channels and highly targeted event exposure, including roundtables and Meetups.
For more information visit: https://mysecuritymedia.com/
Over two days, we will broacast interviews, panel discussions and demonstrations directly to your desk. Benefit from our insightful sessions, delivered by outstanding cybersecurity specialists, covering your most pertinent challenges.
CISO Online, A/NZ uses the latest browser based technology meaning you won't need to download any software to join the event. Simply ensure you have a wifi connection and a web browser such as Chrome, Safari, Edge or Internet Explorer.
Yes, if you aren't able to make it sign up and we will send you the links after the show. But remember, by listening live you will benefit from real-time conversations and Q&A.
1. Learn from the most successful leaders in the information security world, and explore the strategic issues that matter to you. We have years of experience in creating events that deliver valuable insights.
2. Enjoy the convenience of an online event. There’s no need to spend time & money on travel, no time out of the office, and you can fit the short webinars around your schedule.
3. Interact with the information security community’s leading executives. Our technology and live broadcasts mean you can put your specific pain points & questions to our expert speakers, and get direct, actionable answers.
4. Can't attend all the sessions live? Catch up later at the time most convenient to you, On-Demand. Approved recordings will be shared with all registrants, post-event.
5. All for free! There’s no fee to register and no travel costs. All you need is access to the internet, from anywhere in the world, on any device!
Having run events, we know that those attending as a team get so much more value, whether it be more insights and knowledge is covered and absorbed, or ensuring the buy-in from your team to accelerate and progress your next project.
Share the event on Linkedin by clicking the Share button here:
Terms & Conditions
The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.
Disclosure of your information
You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:
- Business partners
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Webinar.net.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing firstname.lastname@example.org
The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at email@example.com