HOME
SPEAKERS
OUR SPEAKERS
REQUEST TO SPEAK
AGENDA
VIEW AGENDA
DOWNLOAD AGENDA
PARTNERS
SPONSORSHIP
VIEW PARTNERS
REGISTER
CONTENT
INFO
VENUE
CONTACT US
Home
About us
Contact
View All Events
RE•WORK
|
CISO Melbourne 2025
Register
Open Menu
HOME
SPEAKERS
OUR SPEAKERS
REQUEST TO SPEAK
AGENDA
VIEW AGENDA
DOWNLOAD AGENDA
PARTNERS
SPONSORSHIP
VIEW PARTNERS
REGISTER
CONTENT
INFO
VENUE
CONTACT US
CISO Melbourne
Presentations
Day 1 - Tuesday 16 July 2024
DAY 2 - 17 JULY
CLICK HERE
Advice for the CISO and Board on planning for a CyberWar
Andrew Horton, CTO
Threat Canary
DOWNLOAD NOW
Embracing GRC as the secret weapon to boost cyber maturity
Andrew Morgan, Former CISO
La Trobe University
DOWNLOAD NOW
Path to passwordless - A practical approach
Ashley Diffey, Vice President Sales, ANZ
Ping Identity
DOWNLOAD NOW
PAM is the new Firewall
Daniel Comarmond, Cybersecurity Solution Engineer
Delinea
DOWNLOAD NOW
Unleashing the Power of Offensive Security Teams
Eldar Marcussen, Head of Offensive Security
SEEK
DOWNLOAD NOW
The Best Kept Secret in Security
Jamie Wright, Staff Solutions Engineer
HashiCorp
DOWNLOAD NOW
Leveraging cybersecurity as a business growth enabler
John Ellis, Global Head of Security Trust and Influence
QBE
DOWNLOAD NOW
Self-Governing DevSecOps: Navigating Towards Continuous Security
Lawrence Crowther, Head of Solutions Engineering, APJ
Snyk
DOWNLOAD NOW
Role of AI in Cloud-Native Application Security: from Development to Production
Madhul Sachdeva, Presales Cloud Native Security Specialist – APAC
Aqua Security
DOWNLOAD NOW
Cyber strategy – creating robust and future-oriented frameworks
Nigel Hedges, CISO
Chemist Warehouse
DOWNLOAD NOW
Fortifying your Security Operations with Enhanced Visibility
Robin Long, Field CTO, APAC
Rapid7
DOWNLOAD NOW
Improving cyber resilience strategy and effective board reporting
Roshan Daluwakgoda, CISO
Eastern Health
DOWNLOAD NOW
Securing Microsoft Co-Pilot: Preventing Prompt-Hacking and Data Exposure with Varonis
Scott Leach, Vice President, APAC
Varonis
DOWNLOAD NOW
Mitigating Risk to the #1 Target for Attackers: Your Enterprise Identity System
Sean Deuby, Principal Technologist
Semperis
DOWNLOAD NOW
Advancing your cyber maturity through improved resilience
Toh Shang Yee, Head of Information Security (CISO)
MCIS Insurance Berhad (Malaysia)
DOWNLOAD NOW
Practical approach to OT risk – hype or reality?
Trevor Goldman, Technical Director OT Cybersecurity
Worley
DOWNLOAD NOW
Anatomy of successful cyber attacks and how stop it from spreading
Wassim Daghash, Principal Systems Engineer
Illumio
DOWNLOAD NOW
Continuous Exposure Management - Why thinking like an attacker is an efficient way to shape your remediation
Wayne O’Young, Sales & Engineering Manager
ANZ - XM Cyber
DOWNLOAD NOW
Day 2 - Wednesday 17 July 2024
DAY 1 - 16 JULY
CLICK HERE
Risk and Vulnerabilities - Managing your attack surface and prioritising vulnerabilities
Ben Verschaeren, Director of Sales Engineering APJ
Sophos
DOWNLOAD NOW
How to prepare for Quantum Computing
Daniel Sutherland, RVP, Australia and New Zealand
DigiCert
DOWNLOAD NOW
Embracing AI with confidence – leveraging the benefits while mitigating the risks
Greg Adamson, CISO
Department of Transport and Planning
DOWNLOAD NOW
What can Cyber learn from Health in managing incidents
Ian Pham, Head of Information Security
VMIA
DOWNLOAD NOW
Practical approach to security operations and incident management
James Ng, CISO
Insignia Financial
DOWNLOAD NOW
2024: A Cyborg Odyssey
Len Noe, Technical Evangelist, White Hat Hacker & Biohacker
Cyberark
DOWNLOAD NOW
Accelerating Cloud Security to enable AI: How Security teams can adopt a new operating model to enable agile AI adoption
Matt Preswick, Enterprise Solutions Engineer
Wiz
DOWNLOAD NOW
Building cyber resilient organisations: beyond technical expertise
Rhiannon Taylor, Program Director Cyber Security
DOWNLOAD NOW
Building a cybersecurity program from scratch
Sam Fariborz, CISO
David Jones
DOWNLOAD NOW
Learnings from an unexpected CISO
Will Sharpe, CISO
Telstra Health
DOWNLOAD NOW