CISO Brisbane

Avatar
[[{“value”:”

August 27, 2024Location: Hilton Brisbane, Australiawebsite: https://ciso-bris.coriniumintelligence.com/

Join us for CISO Brisbane on the 27 August at Hilton Brisbane! Immerse yourself in the best industry practices and solutions to embed security into your software development and operations. This is your one-stop shop to stay ahead in the rapidly evolving IT landscape.

Key themes and takeaways:

CYBER STRATEGY: Learn from your peers and overcome common challenges when strengthening your programs
EXECUTIVE MANAGEMENT BUY-IN: Learn how your peers are gaining company-wide support for their cybersecurity strategies
SOC AUTOMATION: Explore the pros & cons of automating the SOC by comparing the challenges and successes from small and large organisations
LEARNING FROM OTHERS’ EXPERIENCES: Do’s and don’ts when implementing ransomware protection strategies
DIVERSITY IN CYBER: Hear how to use D&I as a defensive weapon in advancing your company’s protection

As an EC-Council member, use our discount code for $500 off: CISOBRPAR500

Previous articleCISO Singapore

Next articleCISO Executive Network

“}]] 

Total
0
Shares
Previous Post

CISO Executive Network

Next Post

CISO Singapore

Related Posts

Thousands Download Malicious npm Libraries Impersonating Legitimate Tools

Threat actors have been observed uploading malicious typosquats of legitimate npm packages such as typescript-eslint and @types/node that have racked up thousands of downloads on the package registry. The counterfeit versions, named @typescript_eslinter/eslint and types-node, are engineered to download a trojan and retrieve second-stage payloads, respectively. "While typosquatting attacks are
Avatar
Read More

Embarking on a Compliance Journey? Here’s How Intruder Can Help

Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be daunting. Luckily, Intruder simplifies the process by helping you address the key vulnerability management criteria these frameworks demand, making your compliance journey much smoother. Read on to understand how to meet the requirements of each framework to keep your customer data safe. How Intruder
Avatar
Read More