CISO FSI ANZ

Avatar
[[{“value”:”

September 12, 2024
Location: Online
Time: 10 AM AEST | 12 PM NZT

Join us for the inaugural CISO FSI Online ANZ, a free online event taking place on the 12th of September 2024.

Brought to you by the same organisers of CISO Sydney, CISO Melbourne, and CISO New Zealand, CISO FSI Online ANZ is covering everything from cyber strategy, risk management, governance, program, and incident management, to leadership, and enabling business growth.

Key Themes & Takeaways:

Strategies to advance your company’s cyber security maturity models
How to align cyber risk management with the company’s goals
Complying with APRA regulations in Australia and MBIE in New Zealand
The impacts of the privacy act reform in information security
Successful practices to mitigate the increase of third-party risks
Bridging the talent gap by investing in culture, education and training
Navigating the “AI high” by leveraging its benefits while minimising its risks

It’s free! Register now: https://ciso-fsi-anz.coriniumintelligence.com/

The post CISO FSI ANZ appeared first on CISO MAG | Cyber Security Magazine.

“}]] 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

CISO Canberra

Next Post

Modern DevOps Melbourne

Related Posts

GitHub Actions Vulnerable to Typosquatting, Exposing Developers to Hidden Malicious Code

Threat actors have long leveraged typosquatting as a means to trick unsuspecting users into visiting malicious websites or downloading booby-trapped software and packages. These attacks typically involve registering domains or packages with names slightly altered from their legitimate counterparts (e.g., goog1e.com vs. google.com). Adversaries targeting open-source repositories across
Avatar
Read More

One More Tool Will Do It? Reflecting on the CrowdStrike Fallout

The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that by deploying a firewall, antivirus software, intrusion detection systems, identity threat detection and response, and other tools, they are adequately protected. However, this approach not only fails to address the fundamental issue of the attack surface but also introduces dangerous
Avatar
Read More