Insights you won't find anywhere else, brought directly to you.
10am - 2pm AEDT
12pm - 4pm NZDT
Insights you won't find anywhere else, brought directly to you.
10am - 2pm AEDT
12pm - 4pm NZDT
CISO Online, A/NZ 2020 will welcome an inspiring speaker line-up with a comprehensive agenda covering the biggest strategic concerns for leaders in the information security space, for just 1.5 hours per day.
Discover how CISOs and senior cybersecurity leaders are migrating from a technical to a strategic role and enabling business agility and growth by strengthening their frontiers.
Join our industry experts and explore:
Cybersecurity incident management |
|
13:00-13:30 (AEST) 15:00-15:30 (NZST) |
Panel: How prepared is your enterprise to respond to threat trends?
Panel Moderator: Tony Vizza, Director of the Board, AISA and Director of Cybersecurity Advocacy for the Asia-Pacific, (ISC)2
Panellists: Christoph Strizik, CISO, Origin Energy David Chantler, Head of Information Security and Technology Risk, Queensland Treasury Corporation
Dalton Cole, Sales Director ANZ, Cofense
|
13:30-13:55 (AEST) 15:30-15:55 (NZST) |
An Overdue Shift to People-Centric Security - How to get more information from threat-intel data Adrian Covich, Senior Director, Systems Engineering, Proofpoint APAC |
13:55-14:15 (AEST) 15:55-16:15 (NZST) |
Creating a successful incident response plan
Siva Sivasubramanian, CISO, Optus |
Cybersecurity Incident Management How effective are your company’s practices and processes in mitigating and controlling risks? What role does automation play in strengthening your cybersecurity operations? Day Three is focused on how to continuously review, streamline and improve your processes, and how automation can be employed to reduce your company’s exposure to cyberattacks. |
|
13:00-13:25 (AEST) 15:00-15:25 (NZST) |
Busting six myths of privileged access management – Let’s separate fact from fiction
Speakers: Simon Hickson, Regional Director – ANZ, BeyondTrust Scott Hesford, Senior Security Consultant, BeyondTrust |
13:25–13:45 (AEST) 15:25-15:45 (NZST) |
Streamlining and improving processes to reinforce your cyber resilience
Speaker: David Chantler, Head of Information Security and Technology Risk, Queensland Treasury Corporation |
13:45–14:10 (AEST) 15:45-16:10 (NZST) |
Threat management strategy – understanding the trends and creating a plan
Speaker: Sadeed Tirmizey, Director of Cyber Security, Queensland Health |
|
People Creating a culture to safeguard the company is every CISO's challenge. During the outbreak of COVID-19, organisations were forced to undertake survival digital transitions - a journey that usually takes 1-2 years - within days! Day Four will explore how CISOs are focusing on creating enterprise-wide risk awareness whilst ensuring excellence in their cybersecurity strategies. |
|
13:00-13:30 (AEST) 15:00-15:30 (NZST) |
How to create a culture to safeguard the enterprise
Speakers: Christoph Strizik,CISO, Origin Energy Beverley Roche, CISO, Sigma Healthcare Adele Jones, Lead Architect: Information Security and Blockchain, Nedbank (South Africa) |
13:30–13:55 (AEST) 15:30-15:55 (NZST) |
Levers of Human Deception: The Science and Methodology Behind Social Engineering
Speaker: Jaqueline Jayne, Security Awareness Advocate APAC, KnowBe4 |
13:55–14:15 (AEST) 15:55-16:15 (NZST) |
CISO in the spotlight – migrating from a technical to a strategic role
Speaker: Elrich Engel, CISO, AMP |
Keeping up-to-date with the latest technologies and innovations is difficult, isn't it?
Your time is limited, valuable resources are scarce and it can just feel overwhelming, right?
We understand, and that's why we are launching CISO Online, A/NZ.
Taking place for just 1.5 hours per day for 4 days, CISO Online, A/NZ brings content you cannot find anywhere else, directly to your home, commute or office, on desktop, mobile or tablet, delivered by the region's leading experts in cybersecurity.
Sharing their successes, failures and lessons learned in a bitesize and interactive format, this is your chance to get up-to-speed with the latest and greatest cybersecurity technologies and innovations.
Simply sign-up, logon and learn.
Are you ready to accelerate your company's cybersecurity journey?
Agenda format
From Tuesday, 1st September - Friday, 4th September, we will broadcast three 30-minute webinar sessions directly to your desk. Across the week, you will benefit from insightful sessions, delivered by outstanding cybersecurity leaders, covering the most pertinent strategic issues. This allows you to fit the agenda around your busy schedule.
Ask Your Questions
Our webinars are not just presentations. Get involved and submit your questions in the live Q&A during the sessions.
Technology
Our online events use the latest browser-based technology, so you won’t need to download anything to join, you just need access to the internet!
BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com.
Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant.
Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside.
By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.
Proofpoint, Inc. (NASDAQ: PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com/au.
Sumo Logic is a leader in continuous intelligence, a new category of software, which enables organizations of all sizes address the data challenges and opportunities presented by digital transformation, modern applications, and cloud computing. The Sumo Logic Continuous Intelligence Platform™ automates the collection, ingestion, and analysis of application, infrastructure, security, and IoT data to derive actionable insights within seconds. More than 2,000 customers around the world rely on Sumo Logic to build, run, and secure their modern applications and cloud infrastructures. Only Sumo Logic delivers its platform as a true, multi-tenant SaaS architecture, across multiple use-cases, enabling businesses to thrive in the Intelligence Economy.
Founded in 2010, Sumo Logic is a privately held company based in Redwood City, California, and is backed by Accel Partners, Battery Ventures, DFJ Growth, Franklin Templeton, Greylock Partners, IVP, Sapphire Ventures, Sequoia Capital, Sutter Hill Ventures, and Tiger Global Management. For more information, visit www.sumologic.com.
ForgeRock®, the leader in digital identity, delivers modern and comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world. Using ForgeRock, more than a thousand global customer organizations orchestrate, manage, and secure the complete lifecycle of identities from dynamic access controls, governance, APIs, and storing authoritative data – consumable in any cloud or hybrid environment. The company is privately held, backed by leading global venture capital firms Accel Partners, Foundation Capital, Meritech Capital and KKR.
AustCyber is the Australian Cyber Secuirty Growth Network. We exist to:
Take a look at our latest report: Australia’s Digital Trust Report 2020, which highlights the role ‘digital trust’ plays in attracting investment and driving jobs growth. It draws on data modelled by Synergy’s Advanced Modelling Group to quantify the value of digital activity to the Australian economy and model the impact of a major cyber security incident creating a digital interruption to the Australian economy.
The Victorian Security Institute (VSI) was established in 1973 by security professionals in order to develop the science of security management and to develop and direct the professional standards of the security industry. Today, the membership consists of security practitioners and educators from a broad range of industries who share a common belief in the value of high professional and ethical standards for the security industry. The Institute has initiated and developed educational and professional development programs to assist its membership and the security industry.
Computer Weekly stands out from the many technology news websites on offer through its unique history, extensive reader community and in-depth coverage of the issues, challenges and trends facing today’s IT leaders. Computer Weekly provides the latest news and analysis through its website and 200,000-subscriber weekly digital magazine, as well as award-winning and exclusive premium content; a dedicated monthly magazine for European IT leaders; independent research studies; and the CW500 Club’sexclusive networking events for senior IT managers. From being the world’s first weekly IT newspaper in 1966, to today’s multi-platform digital publication, Computer Weekly continues to reach millions of IT decision-makers in the UK, Europe and the rest of the world.
MySecurity Media is an integrated media provider for the Security, Technology, Risk and Governance sectors with market reach via newsletters, digital magazines, podcasts, article mixes, web-channels and highly targeted event exposure, including roundtables and Meetups.
For more information visit: https://mysecuritymedia.com/
Are you looking to demonstrate thought leadership to the cybersecurity community, raise awareness of your solution, educate the marketplace, identify & engage qualified leads, achieve measurable results with real ROI, and tell your story to stand out in a crowded market?
If so, sponsoring CISO Online, A/NZ could offer you the perfect way to achieve your goals!
Our live, online event will attract genuine cybersecurity leaders and you could address them, sharing a case study to demonstrate the value of partnering with you. We have a strictly limited number of opportunities for sponsors to achieve their goals by participating in the event, so enquire today to avoid missing out.
For more information regarding sponsorship opportunities, please contact Rhys Ghorashi: info@coriniumintel.com
Across 4 days, we broadcast 1.5 hour webinar sessions directly to your desk. Throughout the week you will benefit from our insightful sessions, delivered by outstanding cybersecurity specialists, covering your most pertinent challenges.
CISO Online, A/NZ uses the latest browser based technology meaning you won't need to download any software to join the event. Simply ensure you have a wifi connection and a web browser such as Chrome, Safari, Edge or Internet Explorer.
Yes
All sessions will only be accessible LIVE, during the event hours.
Terms & Conditions
The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.
Disclosure of your information
You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:
- Business partners
- Suppliers
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Webinar.net.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing info@coriniumintel.com
Data protection
The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at info@coriniumintel.com