<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">


CISO MELBOURNE


Connecting you to what's next in information security

12-13 July 2022
Park Hyatt Hotel
EXPLORE SPONSORSHIP
DOWNLOAD THE AGENDA
REGISTER

Main Conference Day 1 - July 12th

Lessons Learned from the Equifax 2017 data breach

Speaker: 

  • Graeme Payne, Author, The New Era of Cybersecurity Breaches: A Case Study and Lessons Learned

 

Can we really trust developers to handle security?

Speaker: 

  • Lawrence Crowther, Head of Solutions Engineering APJ, Snyk

 

Making Zero Trust Possible

Speaker: 

  • Dragan Vladicic, Director, Solutions Engineer, Okta

 

Threat Detection & Response Strategies – What Sets Success and Failure Apart?

Speaker: 

  • Varun Acharya, Deputy CISO, Healthscope

 

Pros & Cons of Automating the SOC

Speakers: 

  • Samuel Morgan, Director Defence Security Operations Centre, Department of Defence
  • Nadia Taggart, Director Cyber Security Operations, Parliament House

 

Getting Prepared for the Rise in Supply Chain Risk

Speaker: 

  • Brian Zerafa, Regional Director, Netskope

 

State of Ransomware Readiness Survey:

Speaker: 

  • Pete Murray, Managing Director, Australia & New Zealand, Veritas Technologies

 

Security from scratch – what would you do if you were starting all over again with your security program?

Speaker: 

  • Andrew Morgan, CISO, La Trobe University

 

Reducing Cyberattack Risk During Uncertain Times

Speaker: 

  • Sean Deuby, Director of Services, Semperis

Main Conference Day 2 - July 13th

What makes a good cybersecurity strategy

Speaker: 

  • Charles Gillman, CISO, Superchoice

 

Creating your InfoSec workforce strategy

Speaker: 

  • Agnieszka Lecka, Senior Manager, Cyber Security Services, Strategy & Planning, Standard Chartered Bank (Poland)

 

Strategies in addressing cyber risks from an expanding Attack Surface

Speaker: 

  • Wai Kit Cheah, Senior Director, APAC Product Management & Security Practice, Lumen

 

The Top Breach Paths You’re Missing in Cloud

Speaker: 

  • Matt Preswick, Enterprise Solutions Engineer, APJ, Wiz

 

Keynote of success: “All I really need to know (about Cyber Security), I learned in kindergarten”

Speaker: 

  • Arnold Wong, National Treasurer, ACS

 

How to achieve Customer Identity and Access Management (CIAM) without compromise

Speaker: 

  • Robin Antony, Solutions Architect, WSO2

 

Into the Wild: Exploring Today's Top Threats

Speaker: 

  • Ken Mizota, Chief Technology Officer, APAC, Rapid7

 

Are Information Security Audits evolving with the industry?

Speaker: 

  • Chikonga Maimbo, Manager
    Information Security, Bank Australia

Resources

Snyk - Overview 1 pager

Snyk - Customer success story

Veritas - State of Ransomware Readiness 2022 Report

Veritas - Whitepaper: Best Practices to combat the threat of Ransomware

WIZ - 2022 Cloud Security Threats Report

WIZ - Tech Dossier Wiz April 2022

Mimecast - The State of Email Security Report

Mimecast - Mimecast + Microsoft 365 = Unparalleled Protection​

WSO2 - CIAM With Out Comprimise

WSO2 - The Five Pillars of Customer Identity and Access Management

Okta - The State of Zero Trust Security Asia Pacific 2021

Okta - Whitepaper Getting Started Zero Trust 2021

Semperis - Discover weaknesses in your Active Directory before attackers do

Semperis - Prime Healthcare Slashes Active Directory Disaster Recovery Time with Semperis ADFR

Lumen - SASE Solutions

Lumen - IDC Whitepaper: Avoiding Ransomware : Practical or Pipedream

BigID - Data Security Suite

BigID - Zero Trust Security Strategy

Devo - 2021 Devo SOC Performance Report

Devo - What customers are saying about Devo

Netskope - Security Service Edge SSE For Dummies

Netskope - Top 5 sase use cases for remote workers 

Rapid7 - Product Brochure 2021

ExtraHop - 2022 Cyber Confidence Index Asia Pacific

ExtraHope - SHIELDS UP - RECLAIM THE CYBER ADVANTAGE.

Abnormal Security - Integrated Cloud Email Security Augmenting Microsoft 365

Abnormal Security - Behavior Technology

Proofpoint - The Human Factor 2022 report

Proofpoint - 2022 Voice of the CISO

Puppet - Datasheet Puppet Security Compliance with the ACSC Essential Eight

Puppet - Self Healing Policy Based Continuous Compliance (19 Jan)

Fortanix - CISO Guide Digital Transformation of Data Security

Fortanix - eBook: Data Privacy in Public Cloud

Cohesity - Defend your data from a ransomware attack ebook

Cohesity - Ransomware Readiness Guide

Checkmarx - [White Paper] Checkmarx Fusion Correlation AST Imperative in MAD

Checkmarx - [Whitepaper] Don’t Take Code from Strangers - An Introduction to Checkmarx Supply Chain Security

Blackberry - Defend Your Enterprise with CylanceGATEWAY and CylancePROTECT

Blackberry - CylancePROTECT

Blackberry - CylanceGUARD

Orca - Solution Brief Overview - May 2021

Orca - Security Takes Zip from 18% Visibility of Risk to 100% Coverage in Less Than a Day

Cloudflare - Can ZTNA Replace Your VPN Whitepaper

Cloudflare - Five Best Practices for Mitigating DDoS Attacks WP

Insight/Trend Micro - CISO Elevate and Innovate Cybersecurity ebook

TrendMicro - Cloud One Overview 2022

Cloudera - Data Privacy As A Core Business Process

Cloudera - Nextgen Financial Crimes Platform Solutions Brief

Upcoming Events

Online Events: 

CISO Healthcare Online APAC
11-12 October 2022

 

Physical Events: 

CISO Brisbane
6 September 2022

 

REWORK Sydney Deep Learning & Enterprise AI Summits
17-18 October 2022

 

CISO Auckland
9-10 November 2022