The pandemic has forced organisations to adapt to a new era of distributed work—and cyber threats have adapted right along with them.
What are the best-practice Zero Trust models for securing your business? What are the steps you must take to implement Zero Trust across your ecosystem?
What are the top trends in Identity Management and how can your organisation leverage these internally and for customer success?
To help you find the answers to these – and many other – questions, we’re organising CISO Zero Trust Online ANZ, taking place virtually on 8 & 9 March 2022.
The event is part of our CISO series, attended by thousands of senior InfoSec leaders from large and medium organisations. CISO Zero Trust Online ANZ is exclusively designed to address the specific challenges you and your team are facing when implementing the strategy.
Join us for two days of engaging discussions on how to effectively protect your organisation’s most valuable digital assets by adopting a practical Zero Trust approach, advancing your strategy through risk intelligence, strengthening your Data Privacy and Security framework, and scaling business.
It’s your opportunity to ask questions to experts, explore technology innovations, interact online with our speakers, and re-connect with the cybersecurity community.
What are the best-practice Zero Trust models for securing your business? What are the steps you must take to implementing Zero Trust across your ecosystem? During the event, you’ll discover the top trends in Identity Management and how your organisation can leverage them internally and for customer success.
Join us for a series of engaging discussions on how to effectively protect your organisation’s most valuable digital assets by adopting a practical Zero Trust approach, advancing your strategy through risk intelligence, strengthening your Data Privacy and Security framework, and scaling business.
WHAT IS ZERO TRUST: Secrets to adopt a practical approach
PEOPLE: Enhancing commitment and reliability when creating a Zero Trust environment
IMPROVING EXPERIENCE: How Zero Trust enables greater remote workforce flexibility and improved costumer experience
RISK MANAGEMENT: Advance your practices through risk intelligence
IDENTITY: Embracing a comprehensive, identity-first approach from the get-go
LIGHTENING TALKS: No waffle, all substance. Practical cases, challenges, results, lessons learned
Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers while giving CISOs the confidence and control they need. As the AppSec testing leader, we provide the industry’s most comprehensive solutions,
giving development and security teams unparalleled accuracy, coverage, visibility, and guidance to reduce risk across all components of modern software – including proprietary code, open source, APIs, and infrastructure as code. Over 1,600 customers, including half of the Fortune 50, trust our
security technology, expert research, and global services to securely optimize development at speed and scale. For more information, visit our website, check out our blog, or follow us on LinkedIn.
Lateral movement occurs in every single breach. An intruder breaches the perimeter then moves laterally across the network until they reach what they’re after.
Illumio solves this problem for organizations by preventing the lateral movement of attackers across any organization. Founded on the principle of least privilege in 2013, Illumio provides visibility and segmentation for endpoints, data centers or clouds. The world’s leading organizations, including Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite, trust Illumio to reduce cyber risk. For more information, visit https://www.illumio.com/what-we-do and engage us on LinkedIn and Twitter.
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 8,400 organizations, including Engie, JetBlue, Nordstrom, Takeda Pharmaceutical, Teach for America, T-Mobile and Twilio, trust Okta to help protect the identities of their workforces and customers.
Organisations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Learn more at www.rapid7.com.
Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant.
Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside.
By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.
The Australian Information Industry Association (AIIA) is Australia’s peak representative body and advocacy group for those in the digital ecosystem. We are a not-for-profit organisation to benefit members, and AIIA membership fees are tax deductible. Since 1978 the AIIA has pursued activities to stimulate and grow the digital ecosystem, to create a favourable business environment for our members and to contribute to Australia’s economic prosperity.
We do this by delivering outstanding member value by:
Information Technology Professionals Association (ITPA) is a not-for-profit organisation established to advance the understanding of ICT matters within the community, corporate and government sectors in Australia.
Our members are professionals within the IT Industry in Australia and abroad who aim to advance the practice of Information Technology as a profession.
Our vision is for our members to deliver outcomes which enhance and enrich society through the understanding and application of technology in an increasingly online world.
The Business of InfoSec is a global community designed to inspire and support the senior executives focused on data security, identity access management, cyber/risk insurance & IoT security and much more.
On our new platform, Business of InfoSec, we have curated a wealth of thought-leading insights, via video podcasts, in-depth articles, reports, and interviews. Find out how other senior security and risk leaders are tackling the challenges we’re facing today and adapting to ever-evolving threats.
For a limited time, subscribing to Business of InfoSec is free, so make sure to do so today for complimentary access to exclusive insights you just can’t find anywhere else.
Datafloq offers information, insights and opportunities to drive innovation with big data, blockchain, artificial intelligence and other emerging technologies. It is the best place to find talent, receive leads or share your knowledge with millions of users. Visit Datafloq.com today for more information.
MySecurity Media is an integrated media provider for the Security, Technology, Risk and Governance sectors with market reach via newsletters, digital magazines, podcasts, article mixes, web-channels and highly targeted event exposure, including roundtables and Meetups.
For more information visit: https://mysecuritymedia.com/
Wire19 is a leading news portal dedicated to the digital transformation, brought about by cloud and advanced technologies like Artificial Intelligence, IoT and more, driving innovation in different industry verticals, including ICT, healthcare, retail, managed services etc.
Wire19 are the IT magazine for key decision makers, services providers and managed service providers in the cloud business.
The content of Wire19 is regularly updated with the latest industry news and innovations built around AI, IoT, Robotics and other modern age technologies.
1. Learn from the most successful leaders in the information security world, and explore the strategic issues that matter to you. We have years of experience in creating events that deliver valuable insights.
2. Enjoy the convenience of an online event. There’s no need to spend time & money on travel, no time out of the office, and you can fit the short webinars around your schedule.
3. Interact with the information security community’s leading executives. Our technology and live broadcasts mean you can put your specific pain points & questions to our expert speakers, and get direct, actionable answers.
4. Can't attend all the sessions live? Catch up later at the time most convenient to you, On-Demand. Approved recordings will be shared with all registrants, post-event.
5. All for free! There’s no fee to register and no travel costs. All you need is access to the internet, from anywhere in the world, on any device!
Having run events, we know that those attending as a team get so much more value, whether it be more insights and knowledge is covered and absorbed, or ensuring the buy-in from your team to accelerate and progress your next project.
Share the event on by clicking the Share buttons here:
|Share on Facebook||Share on Linkedin|
Across 2 days, we broadcast a 5 hour webinar session directly to your desk. Throughout the week you will benefit from our insightful sessions, delivered by outstanding data and analytic specialists, covering your most pertinent challenges.
CISO Zero Trust Online A/NZ uses the latest browser-based technology meaning you won't need to download any software to join the event. Simply ensure you have a wifi connection and a web browser such as Chrome, Safari, Edge or Internet Explorer.
All sessions will be accessible LIVE, during the event hours, and on-demand for 2 weeks after the event.
Terms & Conditions
The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.
Disclosure of your information
You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:
- Business partners
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Bigmarker
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing email@example.com
The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at firstname.lastname@example.org