<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">


CISO MELBOURNE


Connecting you to what's next in information security

12-13 July 2022
Park Hyatt Hotel
EXPLORE SPONSORSHIP
DOWNLOAD THE AGENDA
REGISTER

Event Resources

Please see the below to access our partner resources.

Snyk

 

Snyk overview 1 pager

Snyk customer success story:

Veritas_Logo_RED_1000x197

State of Ransomware Readiness 2022 Report

Whitepaper: Best Practices to combat the threat of Ransomware

WIZ logo-jpg

 

 

2022 Cloud Security Threats Report

Tech Dossier Wiz April 2022

 

Mimecast Logo June 2020 JPEG

 

The State of Email Security Report

Mimecast + Microsoft 365 = Unparalleled Protection​

wso2-logo

 

CIAM With Out Comprimise

The Five Pillars of Customer Identity and Access Management

Logo_Okta_Blue_PMS

 

The State of Zero Trust Security Asia Pacific 2021

Whitepaper Getting Started Zero Trust 2021

Semperis Logo - Full Color - Stacked-png

 

Discover weaknesses in your Active Directory before attackers do

Prime Healthcare Slashes Active Directory Disaster Recovery Time with Semperis ADFR

Lumen-Logo-Blue_Black-RGB

 

Lumen SASE Solutions

IDC Whitepaper: Avoiding Ransomware : Practical or Pipedream

BigID_logo

 

Data Security Suite

Zero Trust Security Strategy

DEVO_Logo_RGB_2C (4)-2

 

2021 Devo SOC Performance Report

What customers are saying about Devo

Netskope stacked logo_full color-jpg-1

 

Security Service Edge SSE For Dummies

Top 5 sase use cases for remote workers 

rapid7-logo-black-orange (7)

 

Rapid7 Product Brochure 2021

ExtraHop_logo-hires

 

ExtraHop 2022 Cyber Confidence Index Asia Pacific

SHIELDS UP - RECLAIM THE CYBER ADVANTAGE.

Abnormal-logo-black-1

 

Abnormal Security Integrated Cloud Email Security Augmenting Microsoft 365

Abnormal Behavior Technology

Proofpoint_R_Logo

 

The Human Factor 2022 report

2022 Voice of the CISO

puppet

 

Datasheet Puppet Security Compliance with the ACSC Essential Eight

Self Healing Policy Based Continuous Compliance (19 Jan)

Fortanix

 

CISO Guide Digital Transformation of Data Security - Fortanix

eBook: Data Privacy in Public Cloud

cohesity (2)

 

Defend your data from a ransomware attack ebook

Ransomware Readiness Guide

checkmarx_application-security-testing_1636037356500

 

[White Paper] Checkmarx Fusion Correlation AST Imperative in MAD

[Whitepaper] Don’t Take Code from Strangers - An Introduction to Checkmarx Supply Chain Security

Blackberry - Centered

 

Defend Your Enterprise with CylanceGATEWAY and CylancePROTECT

CylancePROTECT

CylanceGUARD

Orca Security

 

Orca Solution Brief Overview - May 2021

Orca Security Takes Zip from 18% Visibility of Risk to 100% Coverage in Less Than a Day

Cloudflare logo 500 x 173 px

 

Can ZTNA Replace Your VPN Whitepaper

Five Best Practices for Mitigating DDoS Attacks WP

Trend Micro

Insight Transparent-png

 

CISO Elevate and Innovate Cybersecurity ebook

TrendMicro Cloud One Overview 2022

Data Privacy As A Core Business Process

Nextgen Financial Crimes Platform Solutions Brief

 

For any questions regarding the event, please visit the registration desk.

For all other enquiries please email us at info@coriniumintel.com