CISO Brisbane

Avatar
[[{“value”:”

August 27, 2024Location: Hilton Brisbane, Australiawebsite: https://ciso-bris.coriniumintelligence.com/

Join us for CISO Brisbane on the 27 August at Hilton Brisbane! Immerse yourself in the best industry practices and solutions to embed security into your software development and operations. This is your one-stop shop to stay ahead in the rapidly evolving IT landscape.

Key themes and takeaways:

CYBER STRATEGY: Learn from your peers and overcome common challenges when strengthening your programs
EXECUTIVE MANAGEMENT BUY-IN: Learn how your peers are gaining company-wide support for their cybersecurity strategies
SOC AUTOMATION: Explore the pros & cons of automating the SOC by comparing the challenges and successes from small and large organisations
LEARNING FROM OTHERS’ EXPERIENCES: Do’s and don’ts when implementing ransomware protection strategies
DIVERSITY IN CYBER: Hear how to use D&I as a defensive weapon in advancing your company’s protection

As an EC-Council member, use our discount code for $500 off: CISOBRPAR500

Previous articleCISO Singapore

Next articleCISO Executive Network

“}]] 

Total
0
Shares
Previous Post

CISO Executive Network

Next Post

CISO Singapore

Related Posts

Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages

Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russia-affiliated threat actor dubbed Void Blizzard (aka Laundry Bear) that it said is attributed to "worldwide cloud abuse." Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian government objectives,
Avatar
Read More

⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams

What do a source code editor, a smart billboard, and a web server have in common? They’ve all become launchpads for attacks—because cybercriminals are rethinking what counts as “infrastructure.” Instead of chasing high-value targets directly, threat actors are now quietly taking over the overlooked: outdated software, unpatched IoT devices, and open-source packages. It's not just clever—it’s
Avatar
Read More