Sponsors

Thank you to all our 2022 sponsors. Click on the logos to learn more about each organisation.

Diamond

Bitdefender  logo
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments...
Bitdefender  logo

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, Bitdefender is the industry’s trusted expert* for eliminating threats, protecting privacy and data, and enabling cyber resiliency. With deep investments in research and development, Bitdefender Labs discovers 400 new threats each minute and validates 30 billion threat queries daily. The company has pioneered breakthrough innovations in antimalware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 150 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170 countries with offices around the world. For more information, visit https://www.bitdefender.com.

Forcepoint logo
Forcepoint simplifies security for global businesses and governments. Forcepoint’s all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust and prevent the theft or loss of sensitive...
Forcepoint logo

Forcepoint

Forcepoint simplifies security for global businesses and governments. Forcepoint’s all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust and prevent the theft or loss of sensitive data and intellectual property no matter where people are working. Based in Austin, Texas, Forcepoint creates safe, trusted environments for customers and their employees in more than 150 countries. Engage with the Forcepoint team on www.forcepoint.com

Accenture logo
Accenture is a global professional services company with leading capabilities in digital, cloud and security. Combining unmatched experience and specialised skills across more than 40 industries, we o...
Accenture logo

Accenture

Accenture is a global professional services company with leading capabilities in digital, cloud and security. Combining unmatched experience and specialised skills across more than 40 industries, we offer Strategy and Consulting, Technology and Operations services and Accenture Song—all powered by the world’s largest network of Advanced Technology and Intelligent Operations centers. Our 710,000 people deliver on the promise of technology and human ingenuity every day, serving clients in more than 120 countries. We embrace the power of change to create value and shared success for our clients, people, shareholders, partners and communities. Visit us at accenture.com

CyberCX logo
CyberCX is Australia and New Zealand’s leading provider of professional cyber security services. With a workforce of over 1,000 professionals, we help private and public sector organisations realise t...
CyberCX logo

CyberCX

CyberCX is Australia and New Zealand’s leading provider of professional cyber security services. With a workforce of over 1,000 professionals, we help private and public sector organisations realise the opportunity of improved cyber security in an increasingly complex and challenging threat environment.

Through our end-to-end range of cyber capabilities, CyberCX empowers our customers to securely accelerate opportunities in the digital economy. Our services include:

  • Strategy and Consulting
  • Governance, Risk and Compliance
  • Security Testing and Assurance
  • Identity and Access Management
  • Network and Infrastructure Solutions
  • Cloud Security and Solutions
  • Managed Security Services
  • Digital Forensics and Incident Response
  • Cyber Capability, Education and Training
  • Privacy Advisory
  • Cyber Intelligence

Find out more at www.cybercx.com.au

PwC logo
At PwC Australia, our purpose is to build trust in society and solve important problems. In our increasingly complex world, we work with businesses, government and the community to deliver solutions a...
PwC logo

PwC

At PwC Australia, our purpose is to build trust in society and solve important problems. In our increasingly complex world, we work with businesses, government and the community to deliver solutions and sustained outcomes. To help Australia continue to thrive and grow.

We’re part of a network of firms in 156 countries with over 250,000 people. PwC is one of the top 50 brands worldwide and PwC Australia is among LinkedIn’s top companies for where Australians want to work.

Our Cyber and Digital Trust teams bring together a community of cyber solvers capable of strengthening systems and delivering continued confidence through uncertainty and change.

As security needs evolve, so do the capabilities of our teams and power of our technology, coming together to build, earn and share trust in your organisation, and the country.

From global business leaders to local government, regulators to researchers, our unexpected approach combines the unique capabilities required to solve - a step ahead of tomorrow’s cyber threats.

Platinum

Snyk logo
Snyk is a developer-first security company that helps software-driven businesses develop fast and build their cloud native applications securely. Only Snyk provides a platform to secure all of the cri...
Snyk logo

Snyk

Snyk is a developer-first security company that helps software-driven businesses develop fast and build their cloud native applications securely. Only Snyk provides a platform to secure all of the critical components of today’s cloud native application development. Snyk is securing industry leaders such as Google, Salesforce, Asos and Asurion. For more information or to get started with Snyk for free, visit https://snyk.io.
Securiti Ai logo
Securiti is the leader in multicloud data protection, privacy and governance. Organizations globally rely on Securiti to secure and govern data systems, meet global privacy regulations and stay compli...
Securiti Ai logo

Securiti Ai

Securiti is the leader in multicloud data protection, privacy and governance. Organizations globally rely on Securiti to secure and govern data systems, meet global privacy regulations and stay compliant. The solution leverages AI and ML to provide granular insights into sensitive data across hybrid and multicloud environments at scale. This intelligence is uniquely combined with automation and orchestration to address data privacy, governance and security obligations in a single, easy to use platform. Securiti was formed by industry veterans from Symantec, Elastica and Cisco. Securiti was named Gartner Cool Vendor in Data Security, “Most Innovative Startup” at RSA Conference 2020, winner of “IAPP Privacy Innovation Award”, Leader in both Forrester Wave and IDC Marketscape for Data Privacy Management Software.
KPMG logo
KPMG's Cyber Security creates a resilient and trusted digital world with you, even in the face of evolving risk. That’s because we bring a combination of technological expertise, deep business knowled...
KPMG logo

KPMG

KPMG's Cyber Security creates a resilient and trusted digital world with you, even in the face of evolving risk. That’s because we bring a combination of technological expertise, deep business knowledge and creative professionals who are passionate about protecting and building your business. Contact us today www.kpmg.com.au

Gold Stand

Mandiant Logo
Mandiant is recognized by enterprises, governments and law enforcement agencies worldwide as the market leader in threat intelligence and expertise gained on the frontlines of cyber security. To make...
Mandiant Logo

Mandiant

Mandiant is recognized by enterprises, governments and law enforcement agencies worldwide as the market leader in threat intelligence and expertise gained on the frontlines of cyber security. To make every organization confidently ready for cyber threats, Mandiant scales its intelligence and expertise through the Mandiant Advantage SaaS platform to deliver current intelligence, automation of alert investigation and prioritization and validation of security controls products from a variety of vendors.

FraudWatch Logo
FraudWatch is a leader in Digital Brand Protection industry. Founded in 2003, FraudWatch is a privately owned Internet Security company and is headquartered in Melbourne, Australia. FraudWatch service...
FraudWatch Logo

FraudWatch

FraudWatch is a leader in Digital Brand Protection industry. Founded in 2003, FraudWatch is a privately owned Internet Security company and is headquartered in Melbourne, Australia. FraudWatch services over 4000 brands in over 60 countries.

FraudWatch Digital Brand Protection Services protect client brands online from threats including Phishing, Malware, Online Brand Impersonation, Social Media Impersonation and Unauthorised Mobile Apps.

Each month, FraudWatch takes down thousands of phishing sites, Malware sites (command & control, credential drop sites, drive by download), fake Domains, Social Media Profiles and fake Mobile Apps. We provide the best site take down times in the industry, backed with financial penalty SLA’s.

Our mission is to deliver expert, innovative solutions to protect and defend our client’s online brands, reputation and financial losses from online fraud and abuse and to make the Internet a safer place.

Airlock Digital Logo
Airlock Digital is a software vendor that specialises in practical application allowlisting and execution control. The concept of allowlisting is to maintain a list of known good files that you trust...
Airlock Digital Logo

Airlock Digital

Airlock Digital is a software vendor that specialises in practical application allowlisting and execution control. The concept of allowlisting is to maintain a list of known good files that you trust and block the execution of everything else. This includes known, unknown, suspicious and malicious files.

Airlock has been purpose built from the ground up, by security practitioners with first hand experience implementing numerous application allowlisting technologies at scale. We understand the operational challenges intimately. As a result, allowlisting with Airlock has been designed to be simple to implement and maintain in complex and changing enterprise environments.

Airlock encompasses an intuitive application allowlisting framework that ensures the teams within an organisation responsible for software management are able to securely and successfully implement and maintain an effective allowlist inline with their existing software management practices. Additionally, the intuitive design and rapid policy distribution capability ensures the solution does not have an adverse impact on business continuity.

Jamf Logo
Jamf, the standard in Apple Enterprise Management, extends the legendary Apple experience people love to businesses, schools, and government organizations through its software and the world’s largest...
Jamf Logo

Jamf

Jamf, the standard in Apple Enterprise Management, extends the legendary Apple experience people love to businesses, schools, and government organizations through its software and the world’s largest online community of IT admins focused exclusively on Apple, Jamf Nation.

To learn more, visit www.jamf.com.

LogRhythm Australia Pty Ltd Logo
LogRhythm helps busy and lean security operations teams save the day - day after day. There’s a lot riding on the shoulders of security professionals - the reputation and success of their company, the...
LogRhythm Australia Pty Ltd Logo

LogRhythm Australia Pty Ltd

LogRhythm helps busy and lean security operations teams save the day - day after day. There’s a lot riding on the shoulders of security professionals - the reputation and success of their company, the safety of citizens and organizations across the globe, the security of critical resources - the weight of protecting the world.

LogRhythm helps lighten this load. The company is on the frontlines defending against many of the world’s most significant cyberattacks and empowers security teams to navigate an ever-changing threat landscape with confidence. As allies in the fight, LogRhythm combines a comprehensive and flexible security operations platform, technology partnerships, and advisory services to help SOC teams close the gaps.

Together, LogRhythm and our customers are ready to defend. Learn more at logrhythm.com.

Trustwave Logo
As a recognised global cyber defender that stops cyber threats all day, every day – we enable our clients to conduct their business, securely.Trustwave detects threats that others can’t see, enabling...
Trustwave Logo

Trustwave

As a recognised global cyber defender that stops cyber threats all day, every day – we enable our clients to conduct their business, securely.Trustwave detects threats that others can’t see, enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. We leverage our world-class team of security consultants, threat hunters and researchers, and our market-leading security operations platform, to relentlessly identify and isolate threats with the right telemetry at the right time for the right response.

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security. Our elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience in the age of advanced threats.

Sekuro Logo
Sekuro is a cyber security and digital resiliency solutions provider that helps CIOs and CISOs take a strategic approach to cyber security risk mitigation and digital transformation. Operating at the...
Sekuro Logo

Sekuro

Sekuro is a cyber security and digital resiliency solutions provider that helps CIOs and CISOs take a strategic approach to cyber security risk mitigation and digital transformation. Operating at the intersection of the digital technologies and cyber security industries, Sekuro reduces cyber risk while new technologies are adopted - ultimately building business resiliency and enabling fearless innovation.

Our five practise areas (Governance, Risk and Compliance, Technology and Platforms, Offensive Security, Team Augmentation, and Managed Security Services) are full of the brightest minds in the industry. They work together to look beyond the threat landscape of today and into an opportunity landscape.

Learn more at sekuro.io.

Silver Stand

Tenable Logo
Tenable® is the Cyber Exposure company. Approximately 40,000 organisations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its experti...
Tenable Logo

Tenable

Tenable® is the Cyber Exposure company. Approximately 40,000 organisations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform.

Tenable delivers everything you need for a comprehensive risk-based vulnerability management solution — built-in, integrated and ready to use.

We believe in a future where:

Every Security team will have a live view into their organisation’s Cyber Exposure at all times.

Cyber Exposure will arm the CISO and CIO with insight into cyber risk with the same accuracy and predictability as other organisational systems of record.

Every strategic business decision will factor in Cyber Exposure as a quantifiable metric of cyber risk, in the same as other business exposures.Cyber Exposure data will be a must-have for every Board of Directors meeting.

Entrust Logo
About Entrust Corporation Entrust keeps the world moving safely by enabling trusted identities, payments, and data protection. Today more than ever, people demand seamless, secure experiences, whether...
Entrust Logo

Entrust

About Entrust Corporation

Entrust keeps the world moving safely by enabling trusted identities, payments, and data protection. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, accessing e-government services or logging into corporate networks. Entrust offers an unmatched breadth of digital security and credential issuance solutions at the very heart of all these interactions. With more than 2,500 colleagues, a network of global partners, and customers in over 150 countries, it’s no wonder the world’s most entrusted organizations trust us. For more information, visit www.entrust.com.

VikingCloud Logo
VikingCloud provides end-to-end security and compliance solutions to businesses throughout the world, offering the latest in cloud-based solutions to secure networks and maintain compliance. Almost 5...
VikingCloud Logo

VikingCloud

VikingCloud provides end-to-end security and compliance solutions to businesses throughout the world, offering the latest in cloud-based solutions to secure networks and maintain compliance. Almost 5 million businesses use its award-winning platform, and the company maintains partnerships with many of the world’s leading acquirers and payment service providers. VikingCloud also works with the world’s largest brands helping them proactively mitigate evolving cyber threats and business risk. VikingCloud’s Asgard Platform™ processes billions of security events daily, providing real-time intelligence access to an organization’s cyber risk landscape. VikingCloud is headquartered in Dublin, Ireland, with operations in the United States, Australia, India, Philippines, Poland, Sweden, South Africa, and the United Kingdom. VikingCloud has clients in more than 100 countries and employs more than 1,000.

Rapid7 Logo
Rapid7 simplifies cybersecurity. With powerful automation and integrated threat intelligence from our industry-leading researchers and SOC analysts, our Insight Platform gives security teams the visib...
Rapid7 Logo

Rapid7

Rapid7 simplifies cybersecurity. With powerful automation and integrated threat intelligence from our industry-leading researchers and SOC analysts, our Insight Platform gives security teams the visibility they need to secure their environment no matter the size or complexity. Don’t just protect your business, drive it forward.

Allied Telesis International (Australia) Pty Ltd Logo
Founded in 1987, we've been serving the needs of the network communications industry for over 30 years. Although the technology we design and build has evolved significantly over time, our hard-earned...
Allied Telesis International (Australia) Pty Ltd Logo

Allied Telesis International (Australia) Pty Ltd

Founded in 1987, we've been serving the needs of the network communications industry for over 30 years.

Although the technology we design and build has evolved significantly over time, our hard-earned reputation for standards-based performance and product reliability has remained a constant, highly respected value to our customers and partners around the globe.

Allied Telesis offers advanced security solutions to meet the needs of today's modern business. Our solutions-based philosophy of producing products to deliver customer value, together with high-quality service and support, has resulted in an extensive worldwide customer presence.

In a society focused on Internet of Things, where devices are connected to a network with or without wires, a secure network infrastructure is not only necessary — it’s a requirement.

Allied Telesis #NetworkSmarter

Huntsman Security Logo
Since 1999, Huntsman Security has been on the cutting-edge of cyber security software development, serving some of the most sensitive and secure intelligence, defence and criminal justice environments...
Huntsman Security Logo

Huntsman Security

Since 1999, Huntsman Security has been on the cutting-edge of cyber security software development, serving some of the most sensitive and secure intelligence, defence and criminal justice environments in the world.

With offices in Australia and the UK, and operations in Japan and the Philippines, we deliver risk management, monitoring and response technology through utilising machine learning and high speed in stream processing to collect and contextualise security data in real time.

Our most sought-after products, used by government departments and commercial organisations worldwide include:

Essential 8 Auditor an on-demand cyber vulnerability & maturity assessment tool, for quick implementation and use.

Essential 8 Scorecard a continuous risk reduction & cyber security control measurement software enabling dynamic cyber risk management.

Enterprise SIEM & MSSP SIEM an ‘always on’ cyber security analytics software, providing a complete cyber threat detection, analysis, incident management and reporting system.

SmartCheck for Ransomware an on-demand application that rapidly assesses an organisation’s ransomware risk exposure.

Skillfield Logo
Skillfield is an Australian IT consultancy and professional services company passionate about harnessing technology to solve complex problems with simplified IT solutions. The company has two practice...
Skillfield Logo

Skillfield

Skillfield is an Australian IT consultancy and professional services company passionate about harnessing technology to solve complex problems with simplified IT solutions. The company has two practices, Cyber Security and Data Engineering & Science. Each practice has a substantial depth of knowledge in its domain and has built and supported solutions to solve critical business problems for some of Australia's largest corporates. Our services enable our customers to unlock business insights and utilise predictive analytics to help them achieve market leadership, regulatory compliance, and operational excellence. Our name represents our vision of being a field filled with skilled professionals, like a gold field filled with gold. Our engineers and developers bring many years of diverse experience to our team. Their varied professional history and broad skillset mean that Skillfield can bring original ideas and innovative solutions to customers.
Cybergym Control Ltd Logo
Leveraging the experience and knowhow gained by Israel Electric Company as it defends against endless cyberattacks, we have created a comprehensive suite of cutting-edge training solutions, defense pr...
Cybergym Control Ltd Logo

Cybergym Control Ltd

Leveraging the experience and knowhow gained by Israel Electric Company as it defends against endless cyberattacks, we have created a comprehensive suite of cutting-edge training solutions, defense products, and value-added services. Taking into account the work environment and threat models faced by critical infrastructure companies, we ensure that people, products, and processes are prepared and ready to overcome the next attack.

CybergymIEC PROVIDES TAILORED CYBER-TRAINING SOLUTIONS TO ORGANIZATIONS AROUND THE WORLD.With the most relevant threat model and a technological environment configured to your technological setup, we make sure your people gain the experience they need as individuals and as a team.

CybergymIEC further qualifies your general workforce and executives, delivering an all-inclusive, organization-wide solution.

Founded in 2013 by experienced veterans of Israel’s prestigious intelligence organizations, CybergymIEC gives you the peace of mind of knowing that your teams are always ready, and cyber investments are maximized.

Aqua Security Logo
Aqua Security stops cloud native attacks and is the only company with a $1M Cloud Native Protection Warranty to guarantee it. Aqua is a complete solution to cloud native security for transformational...
Aqua Security Logo

Aqua Security

Aqua Security stops cloud native attacks and is the only company with a $1M Cloud Native Protection Warranty to guarantee it. Aqua is a complete solution to cloud native security for transformational teams.

Nozomi Networks Logo
Nozomi Networks is the leader in OT and IoT security and visibility. We accelerate digital transformation by unifying cybersecurity visibility for the largest critical infrastructure, energy, manufact...
Nozomi Networks Logo

Nozomi Networks

Nozomi Networks is the leader in OT and IoT security and visibility.

We accelerate digital transformation by unifying cybersecurity visibility for the largest critical infrastructure, energy, manufacturing, mining, transportation, building automation and other industrial sites around the world.

Our innovation and research laboratory make it possible to tackle escalating cyber risks through exceptional network visibility, threat detection and operational insight.

Nozomi Networks are the leaders in OT & IoT security and visibility because they allow you to:
• See all OT and IoT assets and behavior on your networks for unmatched awareness
• Detect Cyber threats, vulnerabilities, risks and anomalies for faster response
• Unify security, visibility and monitoring across all your assets for improved resilience

Bugcrowd Inc Logo
Security Without Shadows More enterprise organisations trust Bugcrowd to manage their pen test, bug bounty, vulnerability disclosure and attack surface management programs. By combining the largest, m...
Bugcrowd Inc Logo

Bugcrowd Inc

Security Without Shadows

More enterprise organisations trust Bugcrowd to manage their pen test, bug bounty, vulnerability disclosure and attack surface management programs. By combining the largest, most experienced triage team with the most trusted hackers around the world, Bugcrowd generates better results, reduces risk and empowers organisations to release secure products to market faster - with no hidden fees.

Founded in Australia and based in San Francisco, Bugcrowd’s customers can be found in all industry sectors and include National Australia Bank (NAB), Monash University, Canva, Atlassian and SEEK.

Wiz Cloud Limited Logo
Wiz is the fastest growing cybersecurity company in the world. We’re on a mission to help every organization rapidly identify and remove the critical risks in their cloud environments. Purpose-built f...
Wiz Cloud Limited Logo

Wiz Cloud Limited

Wiz is the fastest growing cybersecurity company in the world. We’re on a mission to help every organization rapidly identify and remove the critical risks in their cloud environments. Purpose-built for the unique complexities of multi-environment, multi-workload, and multi-project cloud estates, Wiz automatically correlates the critical risk vectors to deliver actionable insights on the security issues that matter.

Wiz connects in minutes using a 100% API-based approach that scans both platform configurations and inside every workload. We perform a deep assessment that goes beyond what standalone CSPM and CWPP tools offer and find the toxic combination of flaws that together create the actual risk of a breach. Security and DevOps teams use Wiz workflows to proactively remove risks and prevent them from becoming breaches. For more information, visit www.wiz.io.

UpGuard Logo
UpGuard is a cybersecurity platform that helps global organizations prevent data breaches, monitor third-party vendors, and improve their security posture. Using proprietary security ratings, world-cl...
UpGuard Logo

UpGuard

UpGuard is a cybersecurity platform that helps global organizations prevent data breaches, monitor third-party vendors, and improve their security posture. Using proprietary security ratings, world-class data leak detection capabilities, and powerful remediation workflows, we proactively identify security exposures for companies of all sizes.

Bronze Stand

Cisco Secure logo
Cisco has long established itself as the networking leader, while building an open, integrated portfolio of cybersecurity solutions along the way.Cisco Secure is built on the principle of better secur...
Cisco Secure logo

Cisco Secure

Cisco has long established itself as the networking leader, while building an open, integrated portfolio of cybersecurity solutions along the way.Cisco Secure is built on the principle of better security, not more. It delivers a streamlined, customer centric approach to security that ensures it’s easy to deploy, easy to manage, and easy to use – and that it all works together.We’re driven by the fact that people and our customers are at the heart of what we do. Cisco Secure empowers the security community with the reliability and confidence that they’re safe from threats now and in the future on the SecureX platform. We help 100 percent of the Fortune 100 companies protect what’s now and what’s next with the most comprehensive, integrated cybersecurity platform on the planet. Learn more about how we simplify experiences, accelerate success, and protect futures at cisco.com/go/secure.

Yubico logo
As the inventor of the YubiKey, Yubico makes secure login easy and available for everyone. The company has been a leader in setting global standards for secure access to computers, mobile devices, and...
Yubico logo

Yubico

As the inventor of the YubiKey, Yubico makes secure login easy and available for everyone. The company has been a leader in setting global standards for secure access to computers, mobile devices, and more.

Yubico is a creator and core contributor to the FIDO2, WebAuthn, and FIDO Universal 2nd Factor (U2F), and open authentication standards.

YubiKeys are the gold standard for phishing-resistant multi-factor authentication (MFA), enabling a single device to work across hundreds of consumer and enterprise applications and services. Yubico is privately held, with a presence around the globe. For more information, please visit: www.yubico.com.

TeamT5 Inc logo
TeamT5 consists of top cyber threat analysts. Leveraging our geographic and cultural advantages, we have the best understanding of cyber attackers in Asia Pacific. We’re also frequently invited to sha...
TeamT5 Inc logo

TeamT5 Inc

TeamT5 consists of top cyber threat analysts. Leveraging our geographic and cultural advantages, we have the best understanding of cyber attackers in Asia Pacific. We’re also frequently invited to share our insights in top cybersecurity conferences.

Based on our research in malware & Advanced Persistent Threat (APT), we provide cyber threat intelligence reports and anti-ransomware solutions to clients in the USA, Japan, and Taiwan. Clients include government agencies, financial business, and high-tech enterprises.

OPSWAT logo
OPSWAT protects critical infrastructure (CIP). Our goal is to eliminate malware and zero-day attacks. We believe that every file and every device pose a threat. Threats must be addressed at all locati...
OPSWAT logo

OPSWAT

OPSWAT protects critical infrastructure (CIP). Our goal is to eliminate malware and zero-day attacks. We believe that every file and every device pose a threat. Threats must be addressed at all locations at all times—at entry, at exit, and at rest. Our products focus on threat prevention and process creation for secure data transfer and safe device access. The result is productive systems that minimize risk of compromise. That’s why 98% of U.S. nuclear power facilities trust OPSWAT for cybersecurity and compliance. OPSWAT. Trust no file. Trust no device.
ALC Training Pty Ltd logo
Celebrating over 28 years of training excellence - ALC offers the widest range of Information & Cyber Security courses in the Asia-Pacific region. Currently, Security offers one of the best career...
ALC Training Pty Ltd logo

ALC Training Pty Ltd

Celebrating over 28 years of training excellence - ALC offers the widest range of Information & Cyber Security courses in the Asia-Pacific region. Currently, Security offers one of the best career paths in IT today, and ALC offers one of the best ways to get there. You can now also choose the training platform that suits you: Live Virtual, Face-to-Face or Private courses. For beginners we offer the only entry level course on the market designed for anyone wanting an understanding of Info/Cyber Security and gain a solid base on which to build a career ALCs CSF+P Cyber Security Foundation+Practitioner™ course as well as the only NIST Cybersecurity Framework Practitioner™ course designed specifically for the Australian market. For intermediate/advanced professional we offer these leading internationally accredited certifications:

  • SABSA® (Sherwood Applied Business Security Architecture)
  • CISM® (Certified Information Security Manager)
  • CRISC® Certified in Risk and Information Systems Control
  • CISSP® (Certified Information Systems Security Professional)
  • CISA® (Certified Information Systems Auditor)
  • CCSP® (Certified Cloud Security Professional)
  • ISO/IEC 27001 Lead Implementer
  • ISO/IEC 27001 Lead Auditor
  • ALC courses are taught by leading international practitioners with extensive real-world experience. You don't get just the theory & exam preparation. You get the full learning experience!

ALC Training Pty Ltd
9 McInroy Street
Taringa, QLD, 4068
Phone: 1300 767 592
Email:
Web: https://www.alctraining.com.au/

ThreatQuotient logo
ThreatQuotient improves security operations by fusing together disparate data sources, tools and teams to accelerate threat detection and response. ThreatQuotient’s data-driven security operations pla...
ThreatQuotient logo

ThreatQuotient

ThreatQuotient improves security operations by fusing together disparate data sources, tools and teams to accelerate threat detection and response. ThreatQuotient’s data-driven security operations platform helps teams prioritize, automate and collaborate on security incidents; enables more focused decision making; and maximizes limited resources by integrating existing processes and technologies into a unified workspace. The result is reduced noise, clear priority threats, and the ability to automate processes with high fidelity data. ThreatQuotient’s industry leading data management, orchestration and automation capabilities support multiple use cases including incident response, threat hunting, spear phishing, alert triage and vulnerability prioritization, and can also serve as a threat intelligence platform. ThreatQuotient is headquartered in Northern Virginia with international operations based out of Europe, MENA and APAC.

AlgoSec logo
AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity by automating connectivity flows and security policy, anywhere. The AlgoSec platform enables the world...
AlgoSec logo

AlgoSec

AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity by automating connectivity flows and security policy, anywhere.

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

Over 1,800 of the world’s leading organizations trust AlgoSec to help secure their most critical workloads across public cloud, private cloud, containers, and on-premises networks, while taking advantage of almost two decades of leadership in Network Security Policy Management. See what securely accelerating your digital transformation, move-to-cloud, infrastructure modernization, or micro-segmentation initiatives looks like at www.algosec.com

BSI Group logo
BSI Group Digital trust is a domain of organizational resilience which empowers organizations to safeguard their information, people, systems, and technology, to ensure safety, security, compliance, p...
BSI Group logo

BSI Group

BSI Group Digital trust is a domain of organizational resilience which empowers organizations to safeguard their information, people, systems, and technology, to ensure safety, security, compliance, privacy, ethical requirements, and brand reputation to enable business effectiveness and efficiencies.

BSI is at the cornerstone of shaping such resilience, sharing and embedding best practice for organizations across the globe. Our unique combination of standards, assurance, training and qualifications, and regulatory and consultancy* services are designed to enable you to become trusted, sustainable and resilient. We partner with clients and establish digital trust with their employees, customers, shareholders, and communities.

Given today’s cyber threat landscape and the emergence of new technologies, it is imperative that organizations have the correct protocols, policies, and procedures in place to keep their information safe, data secure, infrastructure robust and ultimately, make them resilient. When it comes to meeting your compliance obligations and delivering on your strategic goals, we can help you become future ready. For more information visit: www.bsigroup.com/en-AU

*As an independent certification body, we do not offer consultancy to clients when they also seek certification to the same management system.

Malwarebytes Australia Pty Ltd logo
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes comple...
Malwarebytes Australia Pty Ltd logo

Malwarebytes Australia Pty Ltd

Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions.

Malwarebytes completely replaces antivirus with artificial intelligence-powered technology that stops cyberattacks before they can compromise home computers and business endpoints.

Malwarebytes’ comprehensive protection catches increasingly sophisticated threats by monitoring and analyzing behavior, where many traditional solutions fall short by focusing on file-basedmalware and signature tracking for established threats. Further differentiating from standard security solutions,

Malwarebytes allows devices attacked by ransomware to rollback up to three days to restore conditions prior to the attack.

Learn More: www.malwarebytes.com

Email us:

Follow Malwarebytes on social media Twitter: @malwarebytes

Instagram and TikTok: @malwarebytesofficial

FORT logo
Fortian is a specialist Australian provider of IT security, privacy and risk services. We help organisations operate confidently and safely online – in short, we build digital trust. Trust, underpinne...
FORT logo

FORT

Fortian is a specialist Australian provider of IT security, privacy and risk services. We help organisations operate confidently and safely online – in short, we build digital trust.

Trust, underpinned by IT security and privacy, is the currency of the online world. Our expertise in these disciplines is unique and backed by decades of experience protecting real value in large Australian organisations.

We focus on achieving practical, positive outcomes for our customers by blending deep technical expertise with a strategic, business-focused approach.

Our services include security strategy & architecture, security assurance, security governance, managed security services & forensics and incident response.

Noname Security logo
Noname Security is the only company taking a complete, proactive approach to API Security. Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars - Post...
Noname Security logo

Noname Security

Noname Security is the only company taking a complete, proactive approach to API Security. Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars - Posture Management, Runtime Security, and API Security Testing. Noname Security is privately held, remote-first with headquarters in Silicon Valley and offices in Tel Aviv and Amsterdam.

Innovation

(ISC)²  logo
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP)...
(ISC)²  logo

(ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, more than 168,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the public through our charitable foundation – The Center for Cyber Safety and Education™. Visit www.isc2.org.
Offensive Security  logo
Offensive Security is the world's most trusted provider of cybersecurity training and certification. Our rigorous training programs are industry-standard, and our certified alumni are highly sought-af...
Offensive Security  logo

Offensive Security

Offensive Security is the world's most trusted provider of cybersecurity training and certification. Our rigorous training programs are industry-standard, and our certified alumni are highly sought-after. We help businesses, governments, and educational institutions become more secure. We help individuals enter or advance their careers in cybersecurity.

Start Up

MyRisk Management Pty Ltd logo
We are an Australian data analytics company focussed on cybersecurity governance, risk, and compliance. Our product, myRISK® is a software-as-a-service GRC platform designed for today’s cyber security...
MyRisk Management Pty Ltd logo

MyRisk Management Pty Ltd

We are an Australian data analytics company focussed on cybersecurity governance, risk, and compliance. Our product, myRISK® is a software-as-a-service GRC platform designed for today’s cyber security governance and risk professional. We are on a mission for myRISK® to enable a $1billion reduction in cyber security risk across our customers over the next 2 years.

Due to the pervasive and complex nature of enterprise IT and the growing cyber security threat, cyber risk professionals don't have complete information about assets and threat actors, can't consistently determine which control improvements to make next, and can't find resources to make those improvements. This is where myRISK® comes in. We use machine learning and workflow to close cyber governance and risk knowledge gaps, quantify the risk, determine the most effective next steps to take, and help deliver them.

As well as all the cyber risk management, third-party risk management, and integration functionality needed in a GRC, our product is built in a Machine Learning environment, not just using Machine Learning for text matching. We also have a full implementation of Open-FAIR, that can be customised to your approach to cyber risk.

We will continue to have unique applications of machine learning to cyber security governance and risk. We are an Oracle Startup, and use a data centric architecture, hosting our entire platform inside Oracle Autonomous Database technology alongside Oracle Machine Learning. This gives us quick to market adoption of any machine learning model identified by our user group for inclusion on our roadmap.

Visit stand 37 in the Ground Floor Start Up area, for a demo of how myRISK® can help approve, scope, and monitor your cyber security program.

CyberStash logo
Pushing the Boundaries of Cyber Defense The independent cyber defense platform eclipse.xdr acts as a force multiplier to dramatically reduce an organization’s exposure to cyber-attacks and minimize th...
CyberStash logo

CyberStash

Pushing the Boundaries of Cyber Defense
The independent cyber defense platform eclipse.xdr acts as a force multiplier to dramatically reduce an organization’s exposure to cyber-attacks and minimize the likelihood of business impact.
Engrained into the platform is a defense-in-depth threat intelligence architecture that reduces an organization’s exposure to a massive number of cyber-threats, and a methodology that minimizes the breach dwell-time through periodic forensic-depth compromise assessments.
Speak to us today to learn how eclipse.xdr can help your organization maintain trust in its IT environment.
Loris Minassian
Founder & CEO

IT Junction Pty Limited logo
Established in 2018 - An Individual, with a Harmonious Passion to work with his Customers closely & introduce new software technologies in this ever changing IT World that can help customers drive...
IT Junction Pty Limited logo

IT Junction Pty Limited

Established in 2018 - An Individual, with a Harmonious Passion to work with his Customers closely & introduce new software technologies in this ever changing IT World that can help customers drive successful business outcomes and be first to market and remain competitive ! Hence the name IT JUNCTION !
We provide a platform to introduce customers with upcoming technologies that will change the way we do things today and for Customers who intends to embark on AI & Deep Learning journey...
CYBER SECURITY an Ever Challenged space, and a Never Ending Journey. Simply put, Good vs Evil!!
To address this challenge, we work with our customers in following space !
1. Help customers gain visibility of their IT Security posture
2. Help find Security gaps
3. Endpoint Security
4. Email Security
5. Networking Security & Remote Access
6. Cloud Security
7. Identity Access and Governance
8. Data Protection (Backup, DR and Restore)
9. Security Compliance
And on this journey, we have partnered with great vendors to bring best of the best in this ecosystem...
IT Junction also has a Channel Business for MSP/MSSPs: IT Junction is the MSP/MSSP Aggregator in Australia of Deep Instinct to introduce Cybersecurity solution that has been built on Deep Learning based technology which is Redefining the Cybersecurity Landscape...
IT Junction is also in process of bringing and becoming a Distributor of an Automated Pen testing tool. The only fully automated pentest robot that ethically hacks your systems to verify vulnerabilities. Watch this space…
Visit us at booth 25 Ground floor in Start-Up area to discuss how we can help you on your Cyber Security Journey.
If the need is urgent, please send an email:
IT Junction Pty Limited
Email:
www.it-junction.com

Cyber Aware logo
CyberAware.com is a award-winning, next-generation security awareness training platform that empowers technology/security professionals to change a organisations culture and address its human risk.Fun...
Cyber Aware logo

Cyber Aware

CyberAware.com is a award-winning, next-generation security awareness training platform that empowers technology/security professionals to change a organisations culture and address its human risk.
Fun and engaging training videos combined with realistic real-world phishing simulations, with a focus on starting a conversation, not scaring and shaming people.
Get people talking about security, foster a safe and open cyberculture, free from trickery and finger-pointing. Empower your staff to make better decisions with a greater understanding of what cybersecurity is and how it impacts them in both their personal and professional lives.
Cyber Aware is built and run by a passionate team in Melbourne, with over 500 partners spanning APAC, USA, Europe and Africa.
Our unique white-label platform empowers IT service providers to not just deliver automated training but generate and retain business.
Contact our team today for free trial or demonstration of our white-label partner program!
Phone: 1300 29 29 67
Email:
Website: https://cyberaware.com

Hyprfire Pty Ltd logo
Hyprfire’s Firebug provides Network Threat Hunting as a Service to find threats before they find you. Pinpoint the needles in your haystack and get high fidelity, high priority events delivered to you...
Hyprfire Pty Ltd logo

Hyprfire Pty Ltd

Hyprfire’s Firebug provides Network Threat Hunting as a Service to find threats before they find you. Pinpoint the needles in your haystack and get high fidelity, high priority events delivered to you.
Firebug enables you to:
• Add threat hunting capability to your existing team.
• Know exactly who and what is on your network.
• Identify needles like Lateral Movement, Alien Computers & Baseline Anomalies.
• Easily report on the threats you have found & eliminated.
Find threats before they find you.
Book a demo today.

BigID AU Pty Ltd logo
BigID’s data intelligence platform enables organizations to know their enterprise data and take action for privacy, protection, and perspective. Customers deploy BigID to proactively discover, manage,...
BigID AU Pty Ltd logo

BigID AU Pty Ltd

BigID’s data intelligence platform enables organizations to know their enterprise data and take action for privacy, protection, and perspective. Customers deploy BigID to proactively discover, manage, protect, and get more value from their regulated, sensitive, and personal data across their data landscape.

BigID has raised over $280 million in funding since its founding in 2016 and is recognized for its data intelligence innovation as a 2019 World Economic Forum Technology Pioneer, named to the 2020 Forbes Cloud 100, a Business Insider 2020 AI Startup to Watch, #1 Fastest Growing Security Company on the 2021 Inc 5000, #27 on the 2021 Deloitte 500, and an RSA Innovation Sandbox winner.

Cythera Pty Ltd logo
Cythera is an Australian cyber security company with in-house cyber security professionals providing world-class cyber protection to medium to large companies and businesses all over Australia from th...
Cythera Pty Ltd logo

Cythera Pty Ltd

Cythera is an Australian cyber security company with in-house cyber security professionals providing world-class cyber protection to medium to large companies and businesses all over Australia from the Cythera offices in Melbourne CBD.

All Cythera team members are passionate advocates of the belief all Australian businesses should have affordable access to world-class cyber security solutions to protect from online threats and cyber criminals.

Cythera has built a business focused on delivering cyber security outcomes, purely as a service, which can be consumed on a month-by-month basis by our customers.

Secolve logo
Secolve is Australia’s next generation OT specialist cyber security firm, working with key industries to protect the nation’s critical infrastructure by assisting organisations, large and small, to up...
Secolve logo

Secolve

Secolve is Australia’s next generation OT specialist cyber security firm, working with key industries to protect the nation’s critical infrastructure by assisting organisations, large and small, to uplift their OT security.

Secolve’s exclusive focus on OT ensures our team is at the cutting edge of all the latest developments in the cyber security space, be it software security enhancements, threat actors or regulatory and legislative requirements.

Human intelligence is at the forefront of everything we do. We understand adversaries and their motives, which allows us to out-think them and ensure our clients are a step ahead in the cyber war. We recognise that every organisation’s cyber maturity is different and requires a tailored and strategic response that meets short and long-term needs. Regardless of where you are on your cyber security journey, the Secolve team will be able to advise on the best way forward in protecting your organisation now, and into the future.

We have young families and believe the world should be safe for our children and future generations. Join us on this journey and let's work hand in hand to secure the nation’s critical infrastructure.

SecureDrive Australasia logo
SecureDrive is an Australian company and supplier of PIN activated, hardware encrypted, portable data storage solutions. We provide government departments, private institutions and consumers with ultr...
SecureDrive Australasia logo

SecureDrive Australasia

SecureDrive is an Australian company and supplier of PIN activated, hardware encrypted, portable data storage solutions.

We provide government departments, private institutions and consumers with ultra-secure data storage products that enable them protect confidential data against theft or loss in adherence with Government Data Privacy Laws.

SureCity Networks logo
SureCity Networks is a MSSP delivering cyber and network security solutions to large scale organisations. Founded in 2018 by Tim Kirk, SCN are a passionate team who challenge the status quo and aim to...
SureCity Networks logo

SureCity Networks

SureCity Networks is a MSSP delivering cyber and network security solutions to large scale organisations. Founded in 2018 by Tim Kirk, SCN are a passionate team who challenge the status quo and aim to be the best. What sets them apart is their focus on preventing threats at the earliest opportunity. This involves business context aware solutions. SCN have developed a number of internal systems and programs that help restrict access to clients’ systems from adversaries in an automated fashion.

Charging Station

Snyk logo
Snyk is a developer-first security company that helps software-driven businesses develop fast and build their cloud native applications securely. Only Snyk provides a platform to secure all of the cri...
Snyk logo

Snyk

Snyk is a developer-first security company that helps software-driven businesses develop fast and build their cloud native applications securely. Only Snyk provides a platform to secure all of the critical components of today’s cloud native application development. Snyk is securing industry leaders such as Google, Salesforce, Asos and Asurion. For more information or to get started with Snyk for free, visit https://snyk.io.