CISO Brisbane

Avatar
[[{“value”:”

August 27, 2024Location: Hilton Brisbane, Australiawebsite: https://ciso-bris.coriniumintelligence.com/

Join us for CISO Brisbane on the 27 August at Hilton Brisbane! Immerse yourself in the best industry practices and solutions to embed security into your software development and operations. This is your one-stop shop to stay ahead in the rapidly evolving IT landscape.

Key themes and takeaways:

CYBER STRATEGY: Learn from your peers and overcome common challenges when strengthening your programs
EXECUTIVE MANAGEMENT BUY-IN: Learn how your peers are gaining company-wide support for their cybersecurity strategies
SOC AUTOMATION: Explore the pros & cons of automating the SOC by comparing the challenges and successes from small and large organisations
LEARNING FROM OTHERS’ EXPERIENCES: Do’s and don’ts when implementing ransomware protection strategies
DIVERSITY IN CYBER: Hear how to use D&I as a defensive weapon in advancing your company’s protection

As an EC-Council member, use our discount code for $500 off: CISOBRPAR500

Previous articleCISO Singapore

Next articleCISO Executive Network

“}]] 

Total
0
Shares
Previous Post

CISO Executive Network

Next Post

CISO Singapore

Related Posts

Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud. The activity, first detected by ReliaQuest in May 2025 targeting an unnamed customer in the manufacturing sector, is characterized by the use of fake login pages to access the employee payroll portal and redirect
Avatar
Read More

Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories’ CI/CD Secrets Exposed

The supply chain attack involving the GitHub Action "tj-actions/changed-files" started as a highly-targeted attack against one of Coinbase's open-source projects, before evolving into something more widespread in scope. "The payload was focused on exploiting the public CI/CD flow of one of their open source projects – agentkit, probably with the purpose of leveraging it for further compromises,"
Avatar
Read More