Cyber risk in the new normal: strengthening your security posture against all adversaries
”
Corinium’s Chief Information Security Officer (CISO) Brisbane gathers the region’s leading information security executives to share their insights on ransomware, threat intelligence, threat hunting, cloud security, emerging technology risk and more. For 2022 we are celebrating our first in-person CISO event in Queensland by showcasing the progress made, offering insights and effective IT security strategies to the challenges that remain and preparing for the challenges that have yet to be unveiled.”
”
Tailored sessions to get the most out of your time at CISO Brisbane, from dedicated use case presentations to off-the-record extended Q&A sessions with international speakers and a deep-dive into robust infosec strategies, ideas and discussion.”
”
Take part in the premium regional meeting place with expert and renowned leaders from Brisbane and nationally to benefit your own leadership journey with C-level discussions and thought leadership.”
”
Key Themes: CISO LEADERSHIP: staying one step ahead of constant change”
”
THREAT INTELLIGENCE: keeping pace with current adversaries”
”
PEOPLE: improving cybersecurity culture and awareness”
”
REMOTE WORK & OPERATIONS: safeguarding the future with confidence”
”
IDENTITY MANAGEMENT: strengthening access control, IAM, PAM, federated identity”
”
MIND THE GAP: adopting effective incident planning and vulnerability testing and assessment”
”
GOVERNANCE & COMPLIANCE: breaking through complexity”
”
CLOUD SECURITY: how to protect data, applications and infrastructure”
”
SUPPLY CHAIN THREATS: managing of your digital assets and services risks”
”
IOT SECURITY: what it means to businesses and risks involved”
”
CYBERCRIME: Notable trends 2022 and beyond.”
”
Key benefits of attending:”
”
– Discover what cybersecurity trends you need watch in 2022 and beyond”
– Find out what the Australian Government is doing to overcome the challenges digital trust”
– Learn how your peers are gaining company-wide support for their cybersecurity strategies”
– Explore the pros & cons of automating the SOC by comparing the challenges and successes from small and large organisations”
– Hear how to use D&I as a defensive weapon in advancing your company’s protection”
– Find out the latest ransomware protection and recovery strategies to uncover blind spots and recover data at scale”
”
Secure your place today!