Lessons Learned from the Equifax 2017 data breach
Speaker:
Can we really trust developers to handle security?
Speaker:
Speaker:
Threat Detection & Response Strategies – What Sets Success and Failure Apart?
Speaker:
Pros & Cons of Automating the SOC
Speakers:
Getting Prepared for the Rise in Supply Chain Risk
Speaker:
State of Ransomware Readiness Survey:
Speaker:
Speaker:
Reducing Cyberattack Risk During Uncertain Times
Speaker:
What makes a good cybersecurity strategy
Speaker:
Creating your InfoSec workforce strategy
Speaker:
Strategies in addressing cyber risks from an expanding Attack Surface
Speaker:
The Top Breach Paths You’re Missing in Cloud
Speaker:
Keynote of success: “All I really need to know (about Cyber Security), I learned in kindergarten”
Speaker:
How to achieve Customer Identity and Access Management (CIAM) without compromise
Speaker:
Into the Wild: Exploring Today's Top Threats
Speaker:
Are Information Security Audits evolving with the industry?
Speaker:
Veritas - State of Ransomware Readiness 2022 Report
Veritas - Whitepaper: Best Practices to combat the threat of Ransomware
WIZ - 2022 Cloud Security Threats Report
WIZ - Tech Dossier Wiz April 2022
Mimecast - The State of Email Security Report
Mimecast - Mimecast + Microsoft 365 = Unparalleled Protection
WSO2 - CIAM With Out Comprimise
WSO2 - The Five Pillars of Customer Identity and Access Management
Okta - The State of Zero Trust Security Asia Pacific 2021
Okta - Whitepaper Getting Started Zero Trust 2021
Semperis - Discover weaknesses in your Active Directory before attackers do
Semperis - Prime Healthcare Slashes Active Directory Disaster Recovery Time with Semperis ADFR
Lumen - IDC Whitepaper: Avoiding Ransomware : Practical or Pipedream
BigID - Zero Trust Security Strategy
Devo - 2021 Devo SOC Performance Report
Devo - What customers are saying about Devo
Netskope - Security Service Edge SSE For Dummies
Netskope - Top 5 sase use cases for remote workers
Rapid7 - Product Brochure 2021
ExtraHop - 2022 Cyber Confidence Index Asia Pacific
ExtraHope - SHIELDS UP - RECLAIM THE CYBER ADVANTAGE.
Abnormal Security - Integrated Cloud Email Security Augmenting Microsoft 365
Abnormal Security - Behavior Technology
Proofpoint - The Human Factor 2022 report
Proofpoint - 2022 Voice of the CISO
Puppet - Datasheet Puppet Security Compliance with the ACSC Essential Eight
Puppet - Self Healing Policy Based Continuous Compliance (19 Jan)
Fortanix - CISO Guide Digital Transformation of Data Security
Fortanix - eBook: Data Privacy in Public Cloud
Cohesity - Defend your data from a ransomware attack ebook
Cohesity - Ransomware Readiness Guide
Checkmarx - [White Paper] Checkmarx Fusion Correlation AST Imperative in MAD
Blackberry - Defend Your Enterprise with CylanceGATEWAY and CylancePROTECT
Orca - Solution Brief Overview - May 2021
Orca - Security Takes Zip from 18% Visibility of Risk to 100% Coverage in Less Than a Day
Cloudflare - Can ZTNA Replace Your VPN Whitepaper
Cloudflare - Five Best Practices for Mitigating DDoS Attacks WP
Insight/Trend Micro - CISO Elevate and Innovate Cybersecurity ebook
TrendMicro - Cloud One Overview 2022
Cloudera - Data Privacy As A Core Business Process
Cloudera - Nextgen Financial Crimes Platform Solutions Brief
Online Events:
CISO Healthcare Online APAC
11-12 October 2022
Physical Events:
CISO Brisbane
6 September 2022
REWORK Sydney Deep Learning & Enterprise AI Summits
17-18 October 2022
CISO Auckland
9-10 November 2022