Put security at the core of corporate strategy
Join us at CISO Melbourne to share insights on governance, risk management, information security program management, and incident management and response.
Discover how to align cyber and business strategies from a high-level perspective.
Join the conversation #CISOMELBOURNE
Event highlights
Our 2024 speakers include
Joe Smith
Assistant Secretary and Acting Deputy Cyber Security Coordinator
National Office of Cyber Security, Department of Home Affairs
Greg Adamson
CISO
Department of Transport and Planning
Sam Fariborz
CISO
David Jones
Nigel Hedges
CISO
Chemist Warehouse
Tara Dharnikota
Head of Information Security Management
PEXA
Bethwyn Berry
Head of Cyber Security, PMO & Governance
BlueScope Steel
John O'Driscoll
Head of Risk – Data & Technology
Medibank
Varun Acharya
CISO
Healthscope
Anafrid Bennet
Head - Technology, Security & Property
Greater Western Water
Neha Malik
Head of Application Security
REA Group
John Ellis
Global Head of Security Trust and Influence
QBE
Sanja Marais
Chief Technology and Security Officer
Aspen Medical
Why should you attend
Hear from 80+ leading infosec experts from Australia and the region
International keynotes from prominent global infosec leaders
Two full-days of jam-packed content to provide clarity and best-practice
Update your tech stack
Who should attend
What past attendees say about CISO Melbourne
"Absolutely enjoyed CISO Melbourne. The team at Corinium put together a great line up of speakers and vendors in a very intimate setting. One key learning, we can rely on being one step ahead anymore, we need to be at least two steps ahead."
"It was great to be attending a conference in person and reconnect with peers in the industry. The sessions were on point and relevant, if we consider human error is still such a notable issue, the discussions around security awareness were very relevant."
"Really informative and engaging with relevant topics providing actionable insights to take back to our organisation."
"Good overall experience with access to vendors in the marketplace that can enhance business cybersecurity posture."
"This is a very useful industry event in information security. Highly recommended!"
"It was a fantastic event, I learned a lot and hope to see all the participants again. The event was also very well organised and I had 2 days quality time in the conference."
Key themes & takeaways
|
Government & industries partnering up for success: Discover the Australian Government plans to support your organisational security and resilience strategies |
Critical Infrastructure: Addressing your key challenges and staying compliant to standards and regulations | |
|
Lessons learned: How to implement successful ransomware protection strategies |
|
Collaboration: Benchmark your strategies with peers and learn how to get buy-in and collaboration in your projects across the board |
|
Cyber strategy: Learning from others and overcoming common challenges when strengthening your programs |
|
Enabling growth: Explore stronger practices to support business progress through secure innovation |
|
Becoming future ready: Learn from real-life lessons and create an enhanced security program this year and beyond |
Invite your teams to join our co-located events
Cloud Security Melbourne | 17 July
At Cloud Security Melbourne 2024, we will explore successful cloud security strategies and features, secure new and current business opportunities, and exchange ideas and best practices to keep organisations secure, safe and resilient.
DevSecOps Melbourne | 17 July
DevSecOps is your one stop shop for best industry practices and solutions to embed security into your software development and operations. Covering everything from IT delivery evolution, empowering teams, maturity model, to measuring DevSecOps, be part of THE event that sets the security-by-design agenda.
Thanks to our 2024 Partners
Lead Partner
Snyk
Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by more than 1,200 customers worldwide today.
Visit website
Diamond Partner
CyberArk
CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud environments and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on LinkedIn, Twitter, Facebook or YouTube.
Visit website
Platinum Partners
Semperis
For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing Active Directory, Semperis’ patented technology protects over 40 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organisations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies. Semperis is headquartered in New Jersey and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.
Visit websiteHashiCorp
At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud. Our suite of multi-cloud infrastructure automation products — all with open source projects at their core — underpin the most important applications for the largest enterprises in the world. As part of the once-in-a-generation shift to the cloud, organizations of all sizes, from well-known brands to ambitious start-ups, rely on our solutions to provision, secure, connect, and run their business-critical applications so they can deliver essential services, communications tools, and entertainment platforms worldwide.
Visit websiteSonatype
Sonatype is the software supply chain management company. We enable organizations to innovate faster in a highly competitive market. Our industry-leading platform empowers engineers to develop software fearlessly and focus on building products that power businesses. Sonatype researchers have analysed more than 120 million open source components – 40x more than its competitors – and the Sonatype platform has automatically blocked over 115,000 malicious components from attacking software development pipelines. Enabling high-quality, secure software helps organizations meet their business needs and those of their customers and partners. More than 2,000 organizations, including 70% of the Fortune 100 and 15 million software developers, rely on our tools and guidance to be ambitious, move fast and do it securely.
To learn more about Sonatype, please visit www.sonatype.com.
Video: SDLC - Software Development Life Cycle
Maintain quality code with an open source dependency manager that helps your DevOps team identify risks and provide safe replacement options.
Whitepaper: State of the Software Supply Chain
Gain in-depth knowledge and understanding of key topics related to DevOps, Application Security, Software Supply Chain Management, and Open Source Vulnerabilities.
Orca Security
Orca Security is the pioneer of agentless cloud security, and is trusted by hundreds of enterprises globally. We're the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes.
Visit websiteSysdig
In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights, a unique AI architecture, and open source Falco. Sysdig delivers live visibility by correlating signals across cloud workloads, identities, and services to uncover hidden attack paths. By knowing what is running, teams can prioritize the vulnerabilities, misconfigurations, permissions, and threats that matter most. From prevention to defense, Sysdig helps enterprises move faster and focus on what matters: innovation.
Sysdig. Secure Every Second.
Visit websiteTenable
Tenable® is the Exposure Management company. Approximately 44,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 65 percent of the Fortune 500, approximately 50 percent of the Global 2000, and large government agencies. Learn more at tenable.com.
Visit websiteGitlab
GitLab is the most comprehensive DevSecOps platform for software innovation. As the DevSecOps Platform, GitLab provides one interface, one data store, one permissions model, one value stream, one set of reports, one spot to secure your code, one location to deploy to any cloud, and one place for everyone to contribute. The platform is the only true cloud-agnostic end-to-end DevOps platform that brings together all DevOps capabilities in one place.
With GitLab, organizations can create, deliver, and manage code quickly and continuously to translate business vision into reality. GitLab empowers customers and users to innovate faster, scale more easily, and serve and retain customers more effectively. Built on Open Source, GitLab works alongside its growing community, which is composed of thousands of developers and millions of users, to continuously deliver new DevOps innovations.
Upwind
Upwind is the runtime-powered cloud security platform that leverages runtime data to secure your cloud infrastructure. Upwind helps you mitigate the risks that actually matter, identify the root causes of threats in minutes and respond with context and automation.
Upwind protects everything you run in the cloud in one centralized platform, whose capabilities include CSPM, DSPM, CWPP, CDR, API security, vulnerability management, identity security and container security.
WIZ
Wiz secures everything organizations build and run in the cloud. Founded in 2020, Wiz is the fastest-growing software company in the world, scaling from $1M to $100M ARR in 18 months. Wiz enables hundreds of organizations worldwide, including 30 percent of the Fortune 100, to rapidly identify and remove critical risks in cloud environments. Its customers include Salesforce, Slack, Mars, BMW, Avery Dennison, Priceline, Cushman & Wakefield, DocuSign, Plaid, and Agoda, among others. Wiz is backed by Sequoia, Index Ventures, Insight Partners, Salesforce, Blackstone, Advent, Greenoaks and Aglaé. Visit https://www.wiz.io/ for more information.
Visit websitePing Identity
Ping Identity delivers unforgettable user experiences and uncompromising security. We are a single company that makes crafting digital experiences simple for any type of user—partners, customers, employees, and beyond. We are anti-lock-in. That means integrations with existing ecosystems, clouds, and on-prem technologies is simple. Out-of-the-box templates let businesses leverage our identity expertise to give their users frictionless experiences. Whether they’re building a foundation of modern digital identity, or out-innovating their competitors with cutting-edge services like digital credentials, AI-driven fraud prevention and governance, Ping is the one-stop shop for game-changing digital identity.
Visit websiteDigiCert
DigiCert ONE is a modern, holistic approach to PKI management. Based on an advanced, container-based design, DigiCert ONE allows you to rapidly deploy in any environment, roll out new services in a fraction of the time, and manage users and devices across your organization at any scale. Built by experts, designed for users. Because it’s not just what PKI can do. It’s what you do with it.
Visit websiteCribl
Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy. Powered by a data processing engine purpose-built for IT and Security, Cribl’s product suite is a vendor-agnostic data management solution capable of collecting data from any source, processing billions of events per second, automatically routing data for optimized storage, and analyzing any data, at any time, in any location. With Cribl, IT and Security teams have the choice, control, and flexibility required to adapt to their ever-changing data needs. Cribl’s offerings–Stream, Edge, and Search–are available either as discrete products or as a holistic solution.
Visit websiteSophos
Sophos delivers superior cybersecurity outcomes by providing cybersecurity as a service to protect companies of all sizes from the most advanced cyberthreats. Our cybersecurity products and services include managed detection and response (MDR), firewall, email, endpoint (XDR), and cloud native security protection. Sophos products and services defend against ransomware, phishing, malware, and more. They connect through the cloud-based Sophos Central management console and are powered by Sophos X-Ops, our cross-domain threat intelligence unit. We provide fully managed security solutions so you can manage your cybersecurity directly with our security operations platform. Or, you can supplement your in-house team with Sophos' products and services.
Visit websiteCheckmarx
Checkmarx is the leader in application security and ensures that enterprises worldwide can secure their application development from code to cloud. Our consolidated platform and services address the needs of enterprises by improving security and reducing TCO, while simultaneously building trust between AppSec, developers, and CISOs. At Checkmarx, we believe it’s not just about finding risk, but remediating it across the entire application footprint and software supply chain with one seamless process for all relevant stakeholders.
We are honored to serve more than 1,800 customers, which includes 40 percent of all Fortune 100 companies including Siemens, Airbus, SalesForce, Stellantis, Adidas, Wal-Mart and Sanofi.
Visit website
Gold Partners
Axonius
Axonius correlates asset data from existing solutions and provides an always up-to-date inventory, uncovers gaps, and automates response actions.
We give IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks.
With Axonius, IT and security teams can move away from reactive, disruptive day-to-day firefighting to focus on the bigger picture.
Visit websiteRapid7
At Rapid7, we believe in simplifying the complex through shared visibility, analytics, and automation that unite your teams around challenges and successes of cybersecurity.
What if security was an opportunity and not an obstacle? What if you could securely advance your business with clarity and confidence?
Your security isn't hypothetical. It should be a reality for all organisations. That’s why we’re committed to helping you build security into the heart of your organisation. Whether you’re looking for a comprehensive security platform, an assessment to better understand your security posture, or something in between, we’ve got your back.
Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all communication and traffic between workflows, devices, and the internet in one console, automatically sets granular segmentation policies to control unnecessary and unwanted communications, and isolates high-value assets and compromised systems to proactively or reactively stop the spread of a breach.
ZTS is proven to help organizations of all sizes, from Fortune 100 to small business, stop breaches and ransomware in minutes, save millions in application downtime, and accelerate digital transformation projects.
Assume breach. Minimize impact. Increase resilience.
AppOmni
AppOmni is the leading provider of enterprise level SaaS security. The company was founded by a team of security veterans from top SaaS providers and cybersecurity vendors, and its customer base includes global leaders across technology, healthcare, banking, and finance as well as many well-known cybersecurity providers.
AppOmni’s patented technology scans APIs, security controls, and configuration settings to compare the current state of enterprise SaaS deployments against best practices and business intent. The solution offers fast deployment, instant visibility, and makes it easy for security and IT teams to protect and monitor their entire SaaS environment, from each vendor to every end user. As SaaS applications evolve, AppOmni stays current with all updates and releases to keep customer environments secure over time.
Aqua Security
Aqua Security stops cloud native attacks across the application lifecycle and is the only company with a $1M Cloud Native Protection Warranty to guarantee it. As the pioneer in cloud native security, Aqua helps customers reduce risk while building the future of their businesses. The Aqua Platform is the industry's most integrated Cloud Native Application Protection Platform (CNAPP), protecting the application lifecycle from code to cloud and back. Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, IL with Fortune 1000 customers in over 40 countries.
Visit websiteDelinea
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide, including over half of the Fortune 100. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.
Visit websiteMyCiso
MyCISO is the World’s first SaaS application that will vastly simplify security management for all. MyCISO provides the tools and people to achieve cybersecurity maturity, making it simple for organisations or their IT providers to assess, improve and manage their security improvement journey.
Visit websiteXM Cyber
XM Cyber is a leading hybrid cloud security company that’s changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them, pinpointing where to remediate exposures with a fraction of the effort. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.
Visit websiteProofpoint
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 80 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com.
Visit websiteVaronis
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
Visit websiteOkta
The best security has Identity at the heart. Okta can help you protect against identity-based threats, accelerate adoption of any technology, deploy phishing-resistant passwordless authentication, build your foundation for Zero Trust and benefit from simplified, integrated Identity Governance.
Visit websiteObbe (Fujitsu)
Born in 2007 out of the Defence and Intelligence space as a company that specialised in security and end-user computing, we chose to focus on quality and raw expertise as a means to differentiate ourselves in the market, and that holds true today.
Whether it’s leading cloud initiatives or wholescale digital transformation, our people are passionate about delivering seamless solutions that make our clients’ work lives easier.
With our demonstrated expertise, focus on genuine outcomes, and with today’s ubiquitous emphasis on security, our solutions are designed to be simple to support and to make it easy to comply with the most stringent cybersecurity compliance standards.
oobe has offices in Canberra, Brisbane, and Melbourne, and a distributed workforce across Australia and New Zealand. With more than 200 professionals serving an extensive list of clients in public sector, critical infrastructure, and retail, we provide a solid services and product portfolio that spans modern workplace, desktops, apps, data, cloud and cyber.
Synopsys
Synopsys Software Integrity Group provides integrated solutions that transform the way development teams build and deliver software, accelerating innovation while addressing business risk. Our industry-leading portfolio of software security products and services is the most comprehensive in the world and interoperates with third-party and open source tools, allowing organizations to leverage existing investments to build the security program that's best for them. Only Synopsys offers everything you need to build trust in your software. Learn more at www.synopsys.com/software.
Visit websiteInfoblox
Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world. Visit infoblox.com, or follow us on LinkedIn or Twitter.
Visit website6clicks
Transform your approach to cyber risk and compliance with 6clicks, a leading AI-powered Governance, Risk & Compliance (GRC) platform.
Designed for service providers, enterprises and governments, 6clicks streamlines building resilient cyber programs that go beyond tick-box compliance. Our unique Hub & Spoke deployment model and powerful AI engine connect distributed teams, systems, and data, providing comprehensive oversight and control.
With 6clicks, you can:
- Balance control and autonomy with our Hub & Spoke deployment model, ideal for managing distributed GRC programs across various divisions, functions, geographies, or projects.
- Utilize Hailey, our AI engine, to automate security compliance, IT risk management, vendor management, incident response and more.
- Leverage our transparent licensing model with unlimited users and access to all our modules and the most in-demand security frameworks, like ISO27001, NIST, SOC 2, Cyber Essentials, CMMC, and DORA.
- Access our vast Content Library, including turn-key security frameworks and regulations, audit and assessment templates, control sets and policies, and risk and issue libraries.
We also offer advisors and managed service providers a white-labelled, turn-key GRC platform designed to increase client retention, unlock new revenue streams and streamline and scale service delivery.
Cyfirma
CYFIRMA combines cyber-intelligence with attack surface discovery and digital risk protection to deliver early warning, personalized, contextual, outside-in, and multi-layered insights. We have built the next generation of AI-powered threat intelligence platform called External Threat Landscape Management (ETLM) to provide cyber defenders with the hacker’s view to help clients prepare for impending attacks. CYFIRMA is headquartered in Singapore with offices in Japan, India, the US, and the EU. Customers include both government as well as Fortune 500 companies across manufacturing, financial services, retail, industrial products, natural resources and pharmaceutical industries.
Visit websitePerfekt
Established in 1998, Perfekt is a leading Australian IT Infrastructure, Managed Services, Hybrid Cloud, CyberSecurity and IoT provider to the Australian market.
We help create digital transformations, through a highly client focused, integrated modernisation of their mainstream IT - providing digital solutions at scale to produce better business outcomes.
CrowdStrike
CrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. CrowdStrike secures the most critical areas of risk – endpoints and cloud workloads, identity, and data – to keep customers ahead of today’s adversaries and stop breaches. Powered by the CrowdStrike Security Cloud, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence on evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities – all through a single, lightweight agent. With CrowdStrike, customers benefit from superior protection, better performance, reduced complexity and immediate time-to-value.
Visit website
Coffee Cart Partners
CyberArk
CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud environments and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on LinkedIn, Twitter, Facebook or YouTube.
Visit websiteLastPass
LastPass is an award-winning password manager which helps millions of registered users organize and protect their online lives. For more than 100,000 businesses of all sizes, LastPass provides password and identity management solutions that are convenient, easy to manage and effortless to use. From enterprise password management and single sign-on to adaptive multi-factor authentication, LastPass for Business gives superior control to IT and frictionless access to users. For more information, visit https://lastpass.com. LastPass is trademarked in the U.S. and other countries.
Visit website
VIP Roundtable Partner
CrowdStrike
CrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. CrowdStrike secures the most critical areas of risk – endpoints and cloud workloads, identity, and data – to keep customers ahead of today’s adversaries and stop breaches. Powered by the CrowdStrike Security Cloud, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence on evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities – all through a single, lightweight agent. With CrowdStrike, customers benefit from superior protection, better performance, reduced complexity and immediate time-to-value.
Visit website
Silver Partners
ThreatQuotient
ThreatQuotient improves security operations by fusing together disparate data sources, tools and teams to accelerate threat detection, investigation and response (TDIR). ThreatQ is the first purpose-built, data-driven threat intelligence platform that helps teams prioritize, automate and collaborate on security incidents; enables more focused decision making; and maximizes limited resources by integrating existing processes and technologies into a unified workspace. The result is reduced noise, clear priority threats, and the ability to automate processes with high fidelity data. ThreatQuotient’s industry leading integration marketplace, data management, orchestration and automation (SOAR) capabilities support multiple use cases including threat intelligence management and sharing, incident response, threat hunting, spear phishing, alert triage and vulnerability management. ThreatQuotient is headquartered in Northern Virginia with international operations based out of Europe, MENA and APAC. For more information, visit www.threatquotient.com.
Visit websiteTrustwave
Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security. Our elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience in the age of advanced threats.
Visit websiteVanta
Vanta is the easy way to get and stay compliant. Thousands of fast-growing companies depend on Vanta to automate their security monitoring and get ready for security audits in weeks, not months. Simply connect your tools to Vanta, fix the gaps on your dashboard, and then work with a Vanta-trained auditor to complete your audit. Vanta supports SOC 2, ISO 27001, HIPAA, GDPR, CCPA, NIST and several other specialized privacy and security standards. To learn more, visit: www.vanta.com | sales@vanta.com
SentinelOne
SentinelOne is a leading provider of autonomous security solutions for endpoint, cloud, and identity environments. Founded in 2013 by a team of cybersecurity and defense experts, SentinelOne revolutionized endpoint protection with a new, AI-powered approach. Our platform unifies prevention, detection, response, remediation, and forensics in a single, easy-to-use solution.
Visit websiteZimperium
Zimperium enables companies to realize the full potential of mobile-powered business by activating a Mobile-First Security Strategy. Built for the demands of mobile business, Zimperium’s Mobile-First Security Platform™ delivers unmatched security across both applications and devices. Only Zimperium delivers autonomous mobile security that dynamically adapts to changing environments so companies can capitalize on the new world of mobile-powered opportunities, securely. For more information, visit www.Zimperium.com.
Visit websiteSaviynt
Saviynt is #1 in Identity Security. In a world of digital transformation, where organizations are faced with increasing cyber risk but cannot afford defensive measures to slow down progress, Saviynt’s Enterprise Identity Cloud gives customers unparalleled visibility, control, and intelligence to better defend against threats while empowering users with right-time, right-level access to the digital technologies and tools. Visit saviynt.com to learn more.
Visit websiteAkamai
At Akamai, we make life better for billions of people, billions of times a day.
Every day, billions of people around the world connect with their favorite brands to shop online, play the latest video games, log into mobile banking apps, learn remotely, share videos with friends, and so much more. They may not know it, but Akamai is there, powering and protecting life online.
Over 20 years ago, we set out to solve the toughest challenge of the early internet: the “World Wide Wait.” And we’ve been solving the internet’s toughest challenges ever since, working toward our vision of a safer and more connected world.
With the world’s most distributed compute platform — from cloud to edge — we make it easy for businesses to develop and run applications, while we keep experiences closer to users and threats farther away. That’s why innovative companies worldwide choose Akamai to build, deliver, and secure their digital experiences.
Our leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.
LastPass
LastPass is an award-winning password manager which helps millions of registered users organize and protect their online lives. For more than 100,000 businesses of all sizes, LastPass provides password and identity management solutions that are convenient, easy to manage and effortless to use. From enterprise password management and single sign-on to adaptive multi-factor authentication, LastPass for Business gives superior control to IT and frictionless access to users. For more information, visit https://lastpass.com. LastPass is trademarked in the U.S. and other countries.
Visit websiteBugcrowd
We are a crowdsourced security company that safeguards organizations' assets from sophisticated threat actors before they can strike—by uniting our customers with trusted hackers via our AI-powered platform to take back control and stay ahead of attackers.
Bugcrowd is backed by Blackbird Ventures, Costanoa Ventures, Industry Ventures, Paladin Capital Group, Rally Ventures, Salesforce Ventures and Triangle Peak Partners.
Abnormal Security
Abnormal provides total protection against the widest range of email attacks including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
Visit websiteThe Missing Link
With over 20 years’ experience we’re recognised as industry leaders and accredited to the highest levels in the design, delivery and support of the latest technologies. We partner with market-leading global and local vendors to deliver you world class business outcomes through IT transformation. Today, The Missing Link is one of the most awarded IT companies in Australia.
Visit websiteNCC Group
We assess, develop and manage cyber threats across our increasingly connected society. We advise global technology, manufacturers, financial institutions, critical national infrastructure providers, retailers and governments on the best way to keep businesses, software and personal data safe.
With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face.
We are passionate about making the Internet safer and revolutionising the way in which organisations think about cyber security.
Headquartered in Manchester, UK, with over 35 offices across the world, NCC Group employs more than 2,000 people and is a trusted advisor to 15,000 clients worldwide.
Cyble
Cyble provides one of the fastest and most comprehensive coverages across adversaries, infrastructure, exposure, weaknesses, and targets by leveraging cutting-edge AI technology and real-time threat intelligence and detection. Through advanced data analysis, expert insights, and automated processes, Cyble facilitates swift detection, prioritization, and remediation of security threats, and enables governments and enterprises to protect their citizens and infrastructure by delivering crucial intelligence promptly. Headquartered in Atlanta, GA, and with employees across 12 countries, Cyble has a global presence. To learn more about Cyble, visit www.cyble.com.
Visit website
Wine Tasting Partners
Cyfirma
CYFIRMA combines cyber-intelligence with attack surface discovery and digital risk protection to deliver early warning, personalized, contextual, outside-in, and multi-layered insights. We have built the next generation of AI-powered threat intelligence platform called External Threat Landscape Management (ETLM) to provide cyber defenders with the hacker’s view to help clients prepare for impending attacks. CYFIRMA is headquartered in Singapore with offices in Japan, India, the US, and the EU. Customers include both government as well as Fortune 500 companies across manufacturing, financial services, retail, industrial products, natural resources and pharmaceutical industries
Visit websitePerfekt
Established in 1998, Perfekt is a leading Australian IT Infrastructure, Managed Services, Hybrid Cloud, CyberSecurity and IoT provider to the Australian market.
We help create digital transformations, through a highly client focused, integrated modernisation of their mainstream IT - providing digital solutions at scale to produce better business outcomes.
Media Partners
CIO Review APAC
CIOReview is a leading technology magazine that is at the forefront of guiding enterprises through the continuously varying business environment with information about the solutions and services. The magazine serves as a trustworthy knowledge source as well as a platform for the C-suite executives, industry experts, technology buyers, and other decision-makers to share their valuable insights about new technology trends in the market. Visit websiteDatafloq
Datafloq is the One-Stop Source for Big Data, empowering organizations to create value from data. The platform aims to create an overview of the global big data market by bringing together all stakeholders within the global Big Data market. The objective of Datafloq is to spur the global understanding and application of Big Data in order to drive innovation and growth. Visit websiteConference Director
Michelle Ribeiro
Conference Director
Our events are all carefully created from scratch. The whole process from research to post-production is crafted by our team, so we are always available to assist with any queries! We look forward to meeting you at the event!