CISO Perth 2025

Avatar

April 1, 2025
Location: Perth Convention and Exhibition Centre, Australia

Now in its fourth year, CISO Perth 2025 is the annual gathering of WA’s most senior InfoSec decision-makers. We’re proud to be a partner of this event that brings together some of the brightest minds in the industry to tackle key challenges and share their learnings.

This important event will cover everything from mitigation, response and recovery, GRC, cross-functional collaboration, leadership, to enabling business growth — providing you with critical insights to help propel your business forward.

Join us for a day of dynamic networking and collaborative problem-solving, as well as benchmarking sessions focused on exploring key strategies and technologies to drive transformative leadership in cybersecurity.

Special Offer:

Register now and receive 20% off the ticket price with discount code: APAC20. This offer is not valid for solution providers or consultants.

Who Should Attend:

CISO Perth 2025 is designed for CISOs, Directors, Heads, Managers of information and cybersecurity, and practitioners from across sectors in WA working in the security field.

If you specialise in information security, risk management, cloud security, incident response, IT, governance, compliance, or automation, this event offers a unique opportunity to engage with top professionals and expand your network in the cybersecurity field.

Learn more about the event and register today! We hope to see you there:

Register: https://hubs.ly/Q03bg16r0

More information: https://ciso-perth.coriniumintelligence.com

 

Total
0
Shares
Previous Post

Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

Next Post

5 Impactful AWS Vulnerabilities You’re Responsible For

Related Posts

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is found in 66% of cloud storage buckets. This data is vulnerable to ransomware attacks. The SANS Institute recently reported that these attacks can be performed by abusing the cloud provider’s storage security controls and default settings. “In just the past few months, I have witnessed two different methods for
Avatar
Read More