Thank You to Our 2019 Sponsors

Click on the logos to learn more about each sponsor

Diamond Sponsors

  • BlackBerry/Cylance
    BlackBerry/Cylance
  • Vectra Corporation
    Vectra Corporation
  • BAE Systems
    BAE Systems
  • Pure Security
    Pure Security
  • IBM
    IBM
  • AustCyber
    AustCyber
  • ACSC
    ACSC
  • PwC
    PwC
  • Microsoft
    Microsoft
  • Thales
    Thales

Platinum Sponsors

  • KnowBe4
    KnowBe4
  • AUCloud
    AUCloud
  • EY
    EY
  • Cofense
    Cofense
  • Illumio
    Illumio
  • Forescout Technologies
    Forescout Technologies
  • Tenable
    Tenable
  • FireEye
    FireEye

Gold Sponsors

  • Palo Alto Networks
    Palo Alto Networks
  • DXC Technology
    DXC Technology
  • Airlock Digital
    Airlock Digital
  • Menlo Security
    Menlo Security
  • ManageEngine
    ManageEngine
  • Guardicore
    Guardicore
  • Unisys
    Unisys
  • Trustwave/Optus
    Trustwave/Optus
  • Recorded Future
    Recorded Future
  • Yubico
    Yubico
  • Huntsman Security
    Huntsman Security
  • ServiceNow
    ServiceNow
  • Vectra
    Vectra
  • Mimecast
    Mimecast
  • Tufin
    Tufin
  • FORCEPOINT
    FORCEPOINT
  • Cybereason
    Cybereason
  • Fortinet
    Fortinet
  • Anomali
    Anomali
  • Privasec
    Privasec
  • Crowdstrike
    Crowdstrike
  • Barracuda
    Barracuda

Silver Sponsors

  • Cloudflare
    Cloudflare
  • Tanium
    Tanium
  • SANS Institute
    SANS Institute
  • Okta
    Okta
  • Flashpoint
    Flashpoint
  • Attivo Networks
    Attivo Networks
  • Kaspersky
    Kaspersky
  • Ixia
    Ixia
  • Saviynt
    Saviynt
  • InfoTrust
    InfoTrust
  • Accenture
    Accenture
  • Infoblox
    Infoblox
  • Lookout
    Lookout
  • ExtraHop
    ExtraHop
  • Intensity Global
    Intensity Global
  • Sophos
    Sophos
  • Sonatype
    Sonatype
  • Thycotic
    Thycotic
  • LastPass by LogMeIn
    LastPass by LogMeIn
  • ThreatQuotient
    ThreatQuotient
  • Trend Micro
    Trend Micro
  • Netwrix
    Netwrix
  • Splunk
    Splunk
  • Tripwire
    Tripwire
  • LogRhythm
    LogRhythm
  • Entrust Datacard Corporation
    Entrust Datacard Corporation
  • CQR
    CQR
  • Sense of Security
    Sense of Security
  • AlgoSec
    AlgoSec
  • Carbon Black
    Carbon Black

Bronze Plus Sponsors

  • Digital Shadows
    Digital Shadows
  • Radware
    Radware
  • SonicWall
    SonicWall
  • Check Point Software Technologies Ltd.
    Check Point Software Technologies Ltd.
  • Securonix
    Securonix
  • Silobreaker
    Silobreaker
  • Venafi
    Venafi
  • Darktrace
    Darktrace
  • Intel 471
    Intel 471
  • ContentKeeper
    ContentKeeper
  • NETSCOUT SYSTEMS
    NETSCOUT SYSTEMS
  • RiskIQ
    RiskIQ
  • Fortian
    Fortian
  • Senetas
    Senetas
  • Exabeam
    Exabeam
  • Accellion
    Accellion
  • Varonis
    Varonis
  • Enosys Solutions
    Enosys Solutions

Bronze Sponsors

  • Government of South Australia
    Government of South Australia
  • Dtex
    Dtex
  • Bitdefender
    Bitdefender
  • Alyne
    Alyne
  • SSH Communications Security Limited
    SSH Communications Security Limited
  • Team T5
    Team T5
  • Endace
    Endace
  • Checkmarx
    Checkmarx
  • Qualys
    Qualys
  • ALC
    ALC
  • BSI
    BSI
  • CompTIA
    CompTIA

Copper Sponsors

  • Kroll
    Kroll
  • Intalock
    Intalock
  • Ivanti
    Ivanti
  • Deep Instinct
    Deep Instinct

Lanyard Sponsor

  • Privasec
    Privasec

Innovation Sponsor

  • Australian Computing Academy
    Australian Computing Academy
  • ANZ
    ANZ
  • RMIA
    RMIA
  • Penten
    Penten
  • CyberGRX
    CyberGRX
  • Crime Stoppers Victoria
    Crime Stoppers Victoria
  • Edith Cowan University
    Edith Cowan University
  • ALSID
    ALSID
  • FifthDomain
    FifthDomain
  • SecureDrive
    SecureDrive
  • XM Cyber
    XM Cyber
  • La Trobe
    La Trobe
  • UNSW Canberra
    UNSW Canberra
  • NAB
    NAB
  • Deakin University
    Deakin University

Keynote Speaker Sponsor

  • Mimecast
    Mimecast

Welcome Drinks Sponsor

  • Kroll/Duff & Phelps
    Kroll/Duff & Phelps

Pre Social Function Drinks Sponsor

  • NCC Group
    NCC Group

Catering Day 1 Sponsor

  • Proofpoint
    Proofpoint

Coffee Cart Sponsor

  • Mimecast
    Mimecast
  • Sentaris
    Sentaris
  • Dimension Data
    Dimension Data

Games Lounge Sponsor

  • ServiceNow
    ServiceNow

Partners

  • The Oceania Cyber Security Centre
    The Oceania Cyber Security Centre
  • ASPI
    ASPI
  • CyRise
    CyRise
  • (ISC)²
    (ISC)²
  • AusCERT
    AusCERT
BlackBerry/Cylance

BlackBerry is a trusted security software and services company that provides enterprises and governments with the technology they need to secure the Internet of Things. BlackBerry is unwavering in its commitment to safety, cybersecurity, data privacy, and leads in key areas such as AI, endpoint security and management, encryption and embedded systems. For more information, visit BlackBerry.com and follow @BlackBerry.

Vectra Corporation

Vectra Corporation (www.vectra-corp.com) provides cyber security services and solutions to more than 2,000 Australian organisations across a wide variety of market sectors including; local, state and federal governments, financial services, transport, telecoms, retail, leisure and gaming.Widely known as the leading provider of Payment Card Industry Data Security Standard (PCI DSS) compliance services in Australasia, Vectra’s portfolio of services also includes cyber security consulting, managed services and security solutions. Key managed service offerings include managed Security Information Event Management (SIEM) with 24/7 monitoring via the Vectra Security Operations Centre, managed network security, managed vulnerability scanning and managed sensitive data discovery. Consulting services include Risk and Compliance Management, Penetration Testing, Security Architecture, Compliance Assessments and Vulnerability Assessments. Vectra has partnered with key security vendors such as IBM, to tailor the best of breed security solutions to the needs of our customers.As a leading IBM Security partner, Vectra has worked with IBM to bring IBM Security solutions to the SMB market, by tailoring them to meet the needs of smaller organisations and making them more affordable. Vectra specialist resources can implement and support IBM Security solutions for all organisations, from small business to enterprise.

BAE Systems

We’ve used our intelligence-led insights for decades to help defend Governments, Nations and societies from cyber-attacks and financial crime. Our customers depend on our evolving capabilities to help them safely grow their organisations. Our unprecedented access to threat intelligence, world-leading analysts and market-leading technology means we can help them to adapt, evolve and stay ahead of the criminals.We solve complex data problems using our unique set of solutions, systems, experience and processes by analysing huge volumes of data. We defend our customers against cyber attacks, detect fraud, comply with laws and regulations, and conduct intelligence-led policing.

Pure Security

Building a strong reputation in cyber security is a tough gig for any business. We’re thankful our new brand comes with a 20 year history from our rich heritage in Pure Hacking, HackLabs, Certitude and Securus Global. While all of these businesses originally came from different backgrounds, our combined appetite for customer security will only continue to grow now under a single brand – Pure Security.

IBM

Traditional security defences are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, delivers integrated-AI infused solutions and services to help identify and protect critical assets, detect advanced threats, and respond to incidences. In a world where IT is your business and digital transformation and the journey to the hybrid cloud is essential for you to compete, get expert advice from a trusted partner to help you prevent the ‘if’, and respond and recover quickly from the ‘when’.

AustCyber

AustCyber – the Australian Cyber Security Growth Network – supports the development of a vibrant and globally competitive Australian cyber security sector and in doing so, enhances Australia’s future economic growth in a digitally enabled global economy.AustCyber works to align and scale Australian cyber security research and innovation related activities in the private sector, research community, academia and across Australian governments. Charged with building infrastructure to support the growth of a sector, AustCyber collaborates across the Australian economy to support a range of other government initiatives related to Australia’s cyber security readiness and resilience.Beyond our shores, AustCyber also works internationally with a range of partners to develop sustained export pathways for Australian solutions and capability. This further enables the rapidly growing Australian cyber security sector to tap into global hubs located within cyber security ‘hot spots’ around the world.

ACSC

The Australian Cyber Security Centre (ACSC) leads the Australian Government’s efforts to improve cyber security. Our role is to help make Australia the safest place to connect online. We monitor cyber threats across the globe 24 hours a day, seven days a week so we can alert Australians early on what to do.We provide advice and information about how to protect yourself and your business online. When there is a cyber security incident, we provide clear and timely advice to individuals, small to medium business, big business and critical infrastructure operators.We work with our business, government and academic partners and experts in Australia and overseas to investigate and develop solutions to cyber security threats.We have a national footprint of Joint Cyber Security Centres where we collaborate with nearly 200 industry, government and academic partners on current cyber security issues. We also work with law enforcement authorities to fight cybercrime.Cyber security is everyone’s responsibility. Let’s work together to make Australia the safest place to connect online.

PwC

In an increasingly complex world, PwC works with businesses, Government and the community to help Australia continue to thrive and grow. PwC Australia delivers quality in audit, assurance, consulting and tax services to more than 5,000 clients. We’re part of a network of firms in 158 countries with over 250,000 people.PwC leads the professional services sector as one of the top 50 brands worldwide and PwC Australia is ranked first on LinkedIn’s Top Companies list of where Australians want to work. We are bold about our commitment to diversity and inclusion, and we empower flexible working.Our purpose is to build trust in society and solve important problems.We believe the most important problems are better solved together. PwC is a powerful multiplier of connections and innovation. It’s what we do best: connecting people, businesses, technology and ideas to solve important problems.At PwC, we call this The Together Effect.

Microsoft

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more.

Thales

The people we all rely on to make the world go round – they rely on Thales. Our customers come to us with big ambitions: to make life better, to keep us safer. Combining a unique diversity of expertise, talents and cultures, our architects design and deliver extraordinary high technology solutions. Solutions that make tomorrow possible, today. From the bottom of the oceans to the depth of space and cyberspace, we help our customers think smarter and act faster – mastering ever greater complexity and every decisive moment along the way. With 65,000 employees in 56 countries, Thales reported sales of €16 billion in 2018.

KnowBe4

KnowBe4 is the world’s largest integrated platform for new-school security awareness training and simulated phishing. KnowBe4 was created to help organizations manage the ongoing problem of social engineering through a comprehensive new-school awareness training approach. Organizations leverage KnowBe4 to enable their employees to make smarter security decisions and create a human firewall as an effective last line of defense.

AUCloud

AUCloud is a sovereign cloud IaaS servicing the Australian Government and CNI communities. Owned, managed, operated and monitored in Australia by Australian citizens, security cleared to Australian Government standards, all data managed by AUCloud remains in Australia (including metadata, monitoring, and derived analytics data). IRAP assessed to the PROTECTED level controls of ASD’s ISM, AUCloud’s ODCE and PCDE environments meet or exceed these controls. We are ISO27001 certified, a VMware Cloud Verified provider and a Cisco Master Partner for Cloud and Managed Services. AUCloud operates from geo-resilient CDC Data Centres (Canberra and Sydney); designed to ASIO T4 standards for Zone 4 security.

australiacloud.com.au

EY

EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities.

Cofense

Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions worldwide. We deliver a collaborative approach to cybersecurity by enabling organization-wide engagement to active email threats. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. From driving awareness to security automation and orchestration, our solutions are designed to anticipate and disrupt the attack kill chain at delivery to quickly mitigate the impacts from spear phishing, ransomware, malware, and business email compromise.

Illumio

Illumio, the leader in micro-segmentation, prevents the spread of breaches inside data center and cloud environments. The Illumio Adaptive Security Platform® uniquely protects critical information with real-time application dependency and vulnerability mapping coupled with micro-segmentation that works across any data center, public cloud, or hybrid cloud deployment on bare-metal, virtual machines, and containers.

Forescout Technologies

Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environments and orchestrate actions to reduce cyber and operational risk. Forescout products deploy quickly with agentless, real-time discovery and classification of every IP-connected device, as well as continuous posture assessment. As of December 31, 2019, more than 3,700 customers in over 90 countries rely on Forescout’s infrastructure-agnostic solution to reduce the risk of business disruption from security incidents or breaches, ensure and demonstrate security compliance and increase security operations productivity.

forescout.com

 

Tenable

Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organisations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.

FireEye

The rules of engagement in today’s threat landscape are changing rapidly and as cyber-crime evolves, there is a security gap that can be exploited. As our dependency on technology further permeates our daily habits, the threats that exploit the security gap will have graver consequences.Every day at FireEye, we see firsthand the impact of cyber-attacks on real people. This is what inspires us to fulfill our mission to relentlessly protect our customers from the impact and consequences of cyber attacks.We have learned that technology alone isn’t enough to combat cyber attackers. Our fundamental belief is that hands-on front-line expertise and intelligence, combined with innovative technology, provides the best means to protect our customers from cyber threats.FireEye has created a unique learning system. Our real-time knowledge of the threat landscape ensures that our offerings provide the best means to protect our customers. We are constantly guided by our frontline expertise as we build our products, deliver threat intelligence and arm our services team to prepare for, respond to and prevent breaches.The FireEye Innovation Cycle was created by product teams embracing our world-class frontline threat expertise AND our frontline experts embracing our solutions. We use this innovation cycle to create the most effective cyber defense platform – a seamless, on demand extension of our customers security operations.That is our commitment, that is our difference.

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organisations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. With continuous innovation in artificial intelligence, analytics, automation, and orchestration, we help our customers to:Secure the Enterprise – Prevent attacks with the industry-defining network security platform that provides consistent protection across your network, cloud and mobile users.Secure the Cloud – Prisma provides the industry’s most complete cloud security offering to accelerate your cloud journey across public and private cloud, SaaS and mobile.Secure the Future – Cortex is the industry’s only open and integrated AI-based continuous security platform that stops sophisticated attacks by stitching together endpoint, cloud and network data.For more information visit www.paloaltonetworks.com

DXC Technology

DXC Technology, the world’s leading independent, end-to-end IT services company, manages and modernizes mission-critical systems, integrating them with new digital solutions to produce better business outcomes. The company’s global reach and talent, innovation platforms, technology independence and extensive partner network enable more than 6,000 private- and public-sector clients in 70 countries to thrive on change. For more information, visit dxc.technology

Airlock Digital

Airlock Digital, is the go to Application Whitelisting company for full control of executable binaries and scripts, without the operational overhead and business inhibitors normally associated with application whitelisting. Airlock Digital is an Australian company, founded with one goal, assist organisations to implement and maintain Application Whitelisting, simply and securely, in dynamic computing environments.Airlock Digital have spent years implementing Application Whitelisting technologies in enterprise organisations and deeply understand real-world Application Whitelisting challenges.Airlock was born out of necessity to address these cyber security challenges. Application Whitelisting is the number one cyber security solution according to the Australian Signals Directorate and Airlock was built specifically around the ASD’s controls but always with ease of use and minimisation to business disruption as the goal.

Menlo Security

Menlo Security protects organizations from cyber attacks by eliminating the threat of malware from the web, documents and email. Its cloud-based Isolation Secure Web Gateway scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end user-experience. The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway. Menlo Security is trusted by major global businesses, including Fortune 500 companies and financial services institutions, and backed by General Catalyst, Sutter Hill Ventures, Engineering Capital, Osage University Partners, American Express Ventures, Ericsson Ventures, HSBC and JP Morgan Chase. Menlo Security is headquartered in Palo Alto, California.

ManageEngine

ManageEngine crafts comprehensive IT management software with a focus on making your job easier. Our 90+ products and free tools cover everything your IT needs, at prices you can afford. From network and device management to security and service desk software, we’re bringing IT together for an integrated, overarching approach to optimize your IT.Web: manageengine.com.au

Guardicore

Guardicore is a data center and cloud security company that protects your organization’s core assets using flexible, quickly deployed, and easy to understand microsegmentation controls. Our solutions provide a simpler, faster way to guarantee persistent and consistent security — for any application, in any IT environment.Our mission goes beyond creating great technology. We continuously engage with our customers as a trusted partner, ensuring they maximize the value of their security investments beyond their original goals and expectations.

Unisys

Unisys is a global information technology company that builds high-performance, security-centric solutions for the most digitally demanding businesses and governments on Earth. Unisys offerings include security software and services; digital transformation and workplace services; industry applications and services; and innovative software operating environments for high-intensity enterprise computing. For more information on how Unisys builds better outcomes securely for its clients across the Government, Financial Services and Commercial markets, visit www.unisys.com

Trustwave/Optus

Trustwave, an Optus company, is global leader for managed security services and provider of security technologies. These global technology partner relationships can support the best available commercial rates for any of your hardware and software purchases and maintenance renewals. Our core set of managed security services and technologies are supported by local and international cyber security experts. These security services and solutions look at your business from a holistic perspective, to ensure your security measures and technology align to your business needs, security strategy and critical areas of concern. With Optus being one of Australia’s largest and most established providers of network and ICT solutions, customers include some of Australia’s largest retail and travel brands, as well as major financial institutions. Optus, together with Trustwave, an Optus Company, can help you to secure your business, communications and information systems

Recorded Future

Recorded Future arms security teams with the only complete threat intelligence solution powered by patented machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources and provides invaluable context in real time and packaged for human analysis or integration with security technologies.

recordedfuture.com

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.The company’s core invention, the YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services. The YubiHSM, Yubico’s ultra-portable hardware security module, protects sensitive data stored in servers.Yubico is a leading contributor to both the FIDO2 and FIDO Universal 2nd Factor open authentication standards, and the company’s technology is deployed and loved by 9 of the top 10 internet brands and by millions of users in 160 countries.Founded in 2007, Yubico is privately held, with offices in Sweden, UK, Germany, USA, Australia, and Singapore. For more information:

yubico.com

Huntsman Security

Huntsman Security, an Australian owned SME, has provided security monitoring capabilities to Australian Government agencies since 2006. In 2018 they developed an entirely new set of products aimed at providing visibility of an organisation’s performance against the ACSC Essential Eight framework. The Essential 8 Scorecard provides continuous monitoring of an environment and automated compliance reporting.  It was recognised as the best new cyber security product at the 2019 Australian Technologies Competition.  In April 2020 the Essential 8 Auditor was released; a self-install security audit tool that executes point-in-time audits, it enables organisations to conduct self-assessments objectively, comprehensively and systematically.

huntsmansecurity.com

ServiceNow

ServiceNow® makes work, work better for people. Our cloud-based platform and solutions deliver digital experiences that help people do their best work. Now, security, risk and IT teams can identify and prioritize security incidents, vulnerabilities, and enterprise risks quickly, and respond faster using digital workflows, automation, and orchestration.

Vectra

Vectra® is transforming cybersecurity by applying advanced AI to detect in-progress attacks and hunt for hidden threats. Vectra and its flagship Cognito® platform enable the world’s most consequential organisations to detect cyberattacks in real time and empower threat hunters to perform highly conclusive incident investigations. Vectra reduces business risk by eliminating security gaps in cloud, data centre and enterprise environments. Behind the Cognito platform, Vectra threat researchers identify and investigate cyberattacks, vulnerabilities and malicious behaviours that are unknown to the world. With data sets from this research, data scientists develop the machine learning algorithms and behavioural analysis that drive Cognito. Visit vectra.ai to find out more and discover “Security that thinks”.

Mimecast

Most businesses are afraid of dangerous cyber threats, technology failures, and human technology errors. At Mimecast we use cloud technology to provide a suite of products that are powerful, integrated and easy to use that restores trust, bolsters business resilience and allows employers to be more productive. Our proprietary cloud architecture offers comprehensive email security, service continuity, archiving and awareness training in a single subscription service. Our goal is to make it easier to protect your business in today’s fast-changing security and risk environment. Learn more or schedule a demo at mimecast.com

Tufin

Tufin® is the leader in Security Policy Orchestration for enterprise cybersecurity. More than half of the top 50 companies in the Forbes Global 2000 turn to Tufin to simplify management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the company’s award-winning Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. The Suite reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin serves over 2,300 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries. Find out more at www.tufin.com

FORCEPOINT

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint.com and follow us on Twitter at @ForcepointSec.

Cybereason

Cybereason is the world’s most powerful cybersecurity analytics platform, built from the ground up, to secure your enterprise. Our full-stack, behavior-based hunting system analyzes more data, more deeply, than anyone else on the market — giving you unprecedented visibility and the power to stay one step ahead of the ever-evolving threat. EDR | MDR | NGAV | 24×7 MONITORING & RESPONSE | IR SERVICES

Fortinet

Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network – today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 400,000 customers trust Fortinet to protect their businesses. Learn more at fortinet.com, the Fortinet Blog, or FortiGuard Labs.

Anomali

Anomali detects adversaries and tells you who they are. Organizations rely on the Anomali Threat Platform to detect threats, understand the adversary, and respond effectively. Anomali arms security teams with machine learning optimized threat intelligence and identifies hidden threats targeting their environments. Anomali enables organizations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs worldwide.

Privasec

Privasec is a fast growing & leading independent provider of Cyber Security services to Government, Financial Services, Retail, IT, Health, Entertainment and Not-for-Profit sectors. We have two lines of businesses across GRC and RED and have offices in Singapore, Australia and New Zealand. – Privasec GRC are the specialists in Governance, Risk and Compliance which covers PCI DSS, ISO27001, ISO31000, IRAP, Essential 8 and other key regulations required to operate in today’s market.- Privasec RED are leaders in Penetration Testing, Drone Security, Red Team Attack simulations, SCADA & ICS Security, Physical Intrusions, Theft simulations, Open Source Intelligence Gathering (OSINT), Social Engineering, and Phishing. We are CREST certified.We believe in partnering with our customers and building long-lasting relationships, based on trust, integrity and care. We hold numerous accreditations and are ISO27001:2013 certified. We are on several State and Federal Government panels. Visit www.privasec.com.au or call +65 6631 8375 for more information.

Crowdstrike

CrowdStrike® Inc. (Nasdaq: CRWD), a global cybersecurity leader, is redefining security for the cloud era with an endpoint protection platform built from the ground up to stop breaches. The CrowdStrike Falcon® platform’s single lightweight-agent architecture leverages cloud-scale artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints on or off the network. Powered by the proprietary CrowdStrike Threat Graph®, CrowdStrike Falcon correlates over two trillion endpoint-related events per week in real time from across the globe, fueling one of the world’s most advanced data platforms for security. With CrowdStrike, customers benefit from better protection, better performance and immediate time-to-value delivered by the cloud-native Falcon platform. There’s only one thing to remember about CrowdStrike: We stop breaches.

Barracuda

At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-enabled, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data and applications with innovative solutions that grow and adapt with our customers’ journey. More than 150,000 organizations worldwide trust Barracuda to protect them — in ways they may not even know they are at risk — so they can focus on taking their business to the next level. For more information, visit barracuda.com.

Cloudflare

Cloudflare, Inc. (www.cloudflare.com / @cloudflare) is on a mission to help build a better Internet. Cloudflare’s platform protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine’s Top Company Cultures 2018 list and ranked among the World’s Most Innovative Companies by Fast Company in 2019. Headquartered in San Francisco, CA, Cloudflare has offices in Austin, TX, Champaign, IL, Seattle, WA, New York, NY, San Jose, CA, Washington, D.C., Lisbon, London, Munich, Beijing, Singapore, and Sydney.

www.cloudflare.com

Tanium

Tanium offers a proven platform for endpoint visibility and control that transforms how organizations manage and secure their computing devices with unparalleled speed and agility. Many of the world’s largest and most sophisticated organizations, including more than half of the Fortune 100, top retailers and financial institutions, and four branches of the US Armed Forces rely on Tanium to make confident decisions, operate efficiently and effectively, and remain resilient against disruptions.

SANS Institute

New courses, new events and three amazing SANS NetWars Tournaments in 2020!

Visit our booth to save US$350* at SANS Sydney

Get the skills you need with SANS, the world’s most trusted source for information security training and certification. SANS can launch your career in 2020 with 58 hands-on courses delivered by incomparable instructors at 8 training events in Canberra, Melbourne, Perth, Wellington and Sydney, and three amazing NetWars tournaments.

Visit SANS at Booth 1 to validate your exclusive CyberCon 2019 delegate’s US$350 gift certificate*! ?? @SANSAPAC

linkedin.com/company/sans-apac

sans.org

(02) 6198 3352
[email protected]
(*Some very reasonable conditions apply)

Okta

Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the world’s largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enable ssimple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox,LinkedIn, Flex, News Corp, Dish Networks and Adobe trust Okta to work faster, boost revenue and stay secure. Okta helps customers fulfill their missions faster by making it safe and easy to use the technologies they need to do their most significant work. For more information, go to okta.com

Flashpoint

Flashpoint delivers Business Risk Intelligence (BRI) to empower organisations worldwide with meaningful risk intelligence and information that combats threats and adversaries. The US based company’s sophisticated technology, advanced data collections, and human-powered analysis uniquely enables large enterprises and the public sector to bolster cybersecurity, confront fraud, detect insider threats. Flashpoint’s Intelligence platform is a critical tool to build insider threat programs, enhance physical security, improve executive protection, and address vendor risk and supply chain integrity.

Attivo Networks

Attivo Networks®, the leader in deception technology, provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments. Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves. With no dependencies on signatures or attack pattern matching, the BOTsink deception server is designed to accurately and efficiently detect the reconnaissance and lateral movement of advanced threats, stolen credential, ransomware, man-in-the-middle, and phishing attacks. The company has won over 80 awards for its technology innovation and leadership.

Kaspersky

Kaspersky is one of the world’s fastest-growing cybersecurity companies and the largest one that is privately-owned. We are agile, think differently and act fast. We are forever innovating, delivering protection that’s effective, usable and accessible. We pride ourselves on developing world-leading security that keeps us – and every one of our 400 million users protected by our technologies, and 270,000 corporate clients – one-step ahead of potential threats. Endpoint security has always been the core of our business, especially in the SMB segment. At the same time, over the next few years, we expect one of our main growth drivers to be in the enterprise market, particularly in the area of non-endpoint security. Our customers’ needs change in line with the evolution of the threat landscape. Therefore, we are constantly expanding our enterprise portfolio with security solutions and services strengthened by Kaspersky’s global cybersecurity intelligence.For more on Kaspersky, visit us at www.kaspersky.com.au

Ixia

Ixia, a Keysight Business, provides security solutions that make networks and applications stronger through rigorous testing and use of a powerful network visibility platform that delivers security resilience and application intelligence. Enterprises, governments and service providers use Ixia solutions to improve network and security operations (NetOps and SecOps) and IT management through an end-to-end visibility infrastructure that includes physical and virtual networks, applications, and security. For more information, visit ixiacom.com

Saviynt

Saviynt is an innovative leader in providing infrastructure, application and data access governance and intelligence for Cloud and Enterprise. Saviynt delivers IGA 2.0 by integrating advanced usage & risk analytics with fine-grained privilege management. Saviynt secures critical assets such as AWS, Azure, SAP, Office 365, Google Apps, Salesforce.com, Workday, SAP and Oracle EBS.

InfoTrust

InfoTrust is a specialised cybersecurity practice that combines best in class controls, expert services, and a complimentary ongoing engagement model that we call The InfoTrust Way. Collectively, this approach creates secure and more productive clients. We are experts in securing the Email Ecosystem, Threat Detection & Response and Cloud Security. We combine this solution-centric approach with a holistic risk-reduction approach we call “CISO-as-a-Service”.

Accenture

Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialised skills across more than 40 industries and all business functions — underpinned by the world’s largest delivery network — Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With 469,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Our Security team helps organisations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging a global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture Security helps organisations protect their valuable assets, end-to-end. With services that include strategy and risk management, cyber defence, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit us at accenture.com.au/security.

Infoblox

Infoblox leads the way to next-level DDI with its Secure Cloud-Managed Network Services with 8,000 customers including 350 of the Fortune 500. Infoblox brings next-level security, reliability and automation to cloud and hybrid systems, setting customers on a path to a single pane of glass for network management. Next-level security helps protect against the rising flood of cyberattacks, leveraging 14 billion threat indicators and 30 plus API security integrations. Next-level reliability provides a Tier 1 foundation with five nines availability, delivered as software-defined services. Next- level automation reduces manual tasks by 70% and annual costs by more than $1 million. Learn more at Infoblox.com

Lookout

Lookout has amassed one of the world’s largest mobile security datasets due to our global scale and mobile focus. Lookout has collected security data from over 170M devices worldwide and over 70M apps, with up to 90K new apps added daily. Only Lookout delivers comprehensive mobile security to federal agencies to secure both devices and internal app stores while protecting employee privacy. Lookout works with many partners including BlackBerry, Microsoft Intune, VMware AirWatch, and MobileIron. Lookout is FedRAMP In Process, and NIST 800-53.

ExtraHop

ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your cloud investment, ExtraHop’s breakthrough approach helps you rise above the noise so you can protect and accelerate your business.

Intensity Global

Intensity Global Australia brings to Australia and New Zealand leading game changing cyber-security software solutions.- Breach and Attack simulation – tells you within a few hours if your cyber security withstand a multi vector attack- Phishing and awareness training that can be delivered as a managed service and effectively reduces email threats by an order of 10- Incident response team’s ultimate Genetic Malware Analysis at scale- Web Application testing – AI powered application security testing- Mobile security -protect your organisation with a seamless experience to all employees.

Sophos

Sophos makes IT security simple, delivering the next generation of IT security solutions that protect millions of people against known and unknown threats worldwide. We give you protection wherever you need it: computers, laptops, mobile devices, virtual desktops and servers, as well as your network, and your web and email gateways. Complete security means we don’t just detect threats—we help you address every point in the security lifecycle. That’s why industry analysts such as Gartner recognize us as a market leader for malware protection, data security, and network security.

Sonatype

Our integrated open source governance platform (Nexus) helps more than 1,000 organizations and 10 million software developers simultaneously accelerate innovation and improve application security.Our machine learning engine (Nexus Intelligence) has analyzed more than 20 million open source libraries, and we continuously feed this intelligence to our customers so they make better innovation decisions early and everywhere across their development lifecycle. DevOps teams eliminate friction associated with manual governance and ship secure software faster than ever — which makes everyone happy: developers, security professionals, and IT ops.

Thycotic

The easiest to manage and most readily adopted privilege management solutions are powered by Thycotic. Thycotic’s security tools empower over 10,000 organizations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control. Headquartered in Washington, D.C., Thycotic operates worldwide with offices in the UK and Australia. For more information, please visit thycotic.com

LastPass by LogMeIn

LastPass provides simple control and unified visibility across every entry point to your business. From single sign-on and password management to adaptive authentication, LastPass Identity gives superior control to IT and frictionless access to users.

ThreatQuotient

ThreatQuotient’s mission is to improve the efficiency and effectiveness of security operations through a threat-centric platform. By integrating an organization’s existing processes and technologies into a single security architecture, ThreatQuotient accelerates and simplifies investigations and collaboration within and across teams and tools. Through automation, prioritization and visualization, ThreatQuotient’s solutions reduce noise and highlight top priority threats to provide greater focus and decision support for limited resources. ThreatQuotient is headquartered in Northern Virginia with international operations based out of Europe and APAC. For more information, visit threatquotient.com

Trend Micro

Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centres, cloud workloads, networks, and endpoints. Our connected threat defence enables seamless sharing of threat intelligence and provides centralised visibility and investigation to make organisations their most resilient.With over 6,500 employees in 50 countries and the world’s most advanced global threat research and intelligence, Trend Micro enables organisations to secure their connected world. www.trendmicro.com.au.

Netwrix

Netwrix is a software company that enables information security and governance professionals to reclaim control over sensitive, regulated and business-critical data, regardless of where it resides. Over 10,000 organisations worldwide rely on Netwrix solutions to secure sensitive data, realise the full business value of enterprise content, pass compliance audits with less effort and expense, and increase the productivity of IT teams and knowledge workers. Founded in 2006, Netwrix has earned more than 150 industry awards and been named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S.For more information, visit netwrix.com.

Splunk

Splunk Inc. (NASDAQ: SPLK) was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Organisations use market-leading Splunk solutions with machine learning to monitor, investigate and act on all forms of business, IT, security, and Internet of Things (IoT) data. Use Splunk software in the cloud and on-premises to improve service levels, reduce operations costs, mitigate security risks, enable compliance, enhance DevOps collaboration and create new product and service offerings. Join millions of passionate users by trying Splunk software for free: splunk.com

Tripwire

Tripwire is a leading provider of integrity assurance solutions that drive security, compliance and operational excellence. As the inventor of file integrity monitoring (FIM), Tripwire has a 20-year history of innovation. Today, Tripwire helps organizations, including half of the Fortune 500, achieve visibility across their networks, reduce their attack surfaces, and stay on top of suspicious changes – steps considered foundational to system and data integrity. Tripwire’s award-winning portfolio includes configuration management, file integrity management, asset discovery, vulnerability management and log collection. Learn more at tripwire.com

LogRhythm

LogRhythm is a world leader in NextGen SIEM, empowering thousands of enterprises on six continents to successfully reduce cyber and operational risk by rapidly detecting, responding to and neutralizing damaging cyberthreats. The LogRhythm NextGen SIEM Platform combines advanced security analytics; user and entity behavior analytics (UEBA); network detection and response (NDR); and security orchestration, automation, and response (SOAR) in a single end-to-end solution. LogRhythm’s technology serves as the foundation for the world’s most modern enterprise security operations centers (SOCs), helping customers measurably secure their cloud, physical, and virtual infrastructures for both IT and OT environments. Built for security professionals by security professionals, the LogRhythm NextGen SIEM Platform has won countless customer and industry accolade including being positioned as a Leader in Gartner’s SIEM Magic Quadrant.

Entrust Datacard Corporation

Consumers, citizens and employees increasingly expect anywhere-anytime experiences — whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications. With more than 2,000 Entrust Datacard colleagues around the world, and a network of strong global partners, the company serves customers in 150 countries worldwide. (Since 1968).

CQR

In 2004, a group of cyber security professionals working for multinational corporations, could no longer ignore that these companies were operating first and foremost for their bottom line, while placing the needs of their clients last. Seeing the real need for a totally independent company whose values and advice are always about the client, these cyber security professionals founded CQR.Now CQR is a world-class, proudly independent provider of cyber security services, operating globally from offices in Australia, UK and USA. Our people are our greatest asset; we are all of one mind – smart, highly qualified and passionate.

We live and breathe cyber security.

Our specialists are the best in the business, with pragmatic minds that produce top quality opinions and strategies, and work with our clients to achieving great outcomes. Our passion is continually fuelled as we keep ahead of rapidly evolving targets and ever-changing landscapes to identify, manage and lower the risks of our clients, not just so their businesses and people will survive, but so they can thrive.

Our Commitment To Our Clients – Being independent we’re not tied to any vendor or product and are free to give impartial and pragmatic advice and find solutions for every project we undertake. We pride ourselves on forging long-term partnerships that benefit our clients. It’s why we started our company. We work as a team to ensure our clients are protected, giving them the confidence to get on with running their organisation and leveraging their information technology to its greatest potential. Everyone at CQR has the rare combination of technical expertise and business acumen as well as hands-on experience of business issues across a broad range of industries and technical environments. We proudly deliver our services from a business-focused point of view and can communicate effectively with clients at all levels from general staff, the IT team up to company executives.

Our Mission – CQR was founded with the mission of making the world a safer place. We exist only to ensure our clients’ businesses and people are protected, so they can thrive.

cqr.com

Sense of Security

Sense of Security is an Australian based specialist IT cyber security and risk management consulting practice. SOS is in our 16th year of operation and as a “pure-play” information security specialist. As industry thought leaders we provide expertise in governance & compliance, risk assessment, strategy & architecture through to, assurance & technical security testing. Our strategic approach to security provides you with a capability to assess your risk and deliver qualified guidance on how to protect your information assets. Technically outstanding and exceptionally detail oriented, we view our accountability to our clients and the wider community extremely seriously and we do our utmost to conduct our business in a sustainable manner. Working extensively with Australian based corporations and State and Federal Government agencies, SOS provides security services that deliver, no matter the standard or framework selected including NIST, CIS, ISO 27001, ISM and PCI DSS. We are one of the first consulting firms in the APAC region that is a CREST Approved Company.

senseofsecurity.com.au

AlgoSec

AlgoSec enables the world’s largest organizations to align business and security strategies, and manage their network security based on what matters most — the applications that power their businesses. Through a single pane of glass, the AlgoSec Security Management Solution provides holistic, business-level visibility across the entire network security infrastructure, including business applications and their connectivity flows — in the cloud and across SDN and on-premise networks. With AlgoSec users can auto-discover and migrate application connectivity, proactively analyze risk from the business perspective, tie cyber-attacks to business processes and intelligently automate time-consuming security changes— all with zero-touch, and seamlessly orchestrated across any heterogeneous environment. Over 1,800 leading organizations, including 20 of the Fortune 50, have relied on AlgoSec to drive business agility, security and compliance. AlgoSec has provided the industry’s only money-back guarantee since 2005. For more information, visit www.AlgoSec.com

Carbon Black

Carbon Black (CBLK) is a leader in cloud endpoint protection dedicated to keeping the world safe from cyberattacks. The CB Predictive Security Cloud® (PSC) consolidates endpoint security and IT operations into an endpoint protection platform (EPP) that prevents advanced threats, provides actionable insight and enables businesses of all sizes to simplify operations. By analysing billions of security events per day across the globe, Carbon Black has key insights into attackers’ behaviours, enabling customers to detect, respond to and stop emerging attacks.More than 5,300 global customers, including 35 of the Fortune 100, trust Carbon Black to protect their organisations from cyberattacks. The company’s partner ecosystem features more than 500 MSSPs, VARs, distributors and technology integrations, as well as many of the world’s leading IR firms, who use Carbon Black’s technology in more than 500 breach investigations per year.

Digital Shadows

Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight™ helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get a free test drive of SearchLight visit www.digitalshadows.com

Radware

Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Its solutions secure the digital experience by providing infrastructure, application, and corporate IT protection and availability services to enterprises globally. For more information, please visit www.radware.com

SonicWall

SonicWall has been fighting the cybercriminal industry for over 27 years defending small and medium businesses, enterprises and government agencies worldwide. Backed by research from SonicWall Capture Labs, our awardwinning, real-time breach detection and prevention solutions secure more than a million networks, and their emails, applications and data, in over 215 countries and territories. These organizations run more effectively and fear less about security. For more information, visit sonicwall.com or follow us on Twitter, LinkedIn, Facebook and Instagram.

Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

Securonix

Securonix redefines the next generation of security monitoring. Securonix Next-Gen SIEM uses big data architecture to provide unlimited scalability and data retention on a non-proprietary open platform. It leverages machine learning and behavior analytics to detect the most advanced cyber threats. The solution comes packaged with out-of-the-box content for insider threats, cyber threats, cloud threats, and fraud. It also comes with Securonix Spotter, which supports text-based search, ad-hoc reporting, link analysis, and threat hunting capabilities across massive data sets. Securonix provides incident orchestration and response capabilities with built-in incident response playbooks and case management. The Securonix solution is available in the cloud as a fully-managed SaaS platform. Securonix is SOC2 certified and supports complete SIEM functionality in the cloud with minimal operational overhead. For more information visit securonix.com.

Silobreaker

Silobreaker is a technology company that helps business, security and intelligence professionals make sense of the overwhelming amount of unstructured data on the web. By providing powerful visualisations that cut through the noise and analyse data from millions of sources, Silobreaker makes it easy for users to monitor companies, industries, threats and incidents. https://www.silobreaker.com/

Venafi

Venafi is the cyber security market leader in machine identity protection, securing connections and communications between machines. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, mobile and SSH. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted. To learn more visit, www.venafi.com

Darktrace

Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems.

The company has over 900 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.

Intel 471

Intel 471 is the premier provider of cybercrime intelligence for the world’s leading security, fraud, and intelligence teams. Intel 471 delivers collection, research and analysis capabilities covering a wide variety of adversary and malware threats operating in the cybercrime underground. To read more about Intel 471, see https://intel471.com and https://www.scmagazine.com/sc-lab-approved-one-year-later-intel-471/article/633822.

ContentKeeper

ContentKeeper helps secure enterprises, educational institutions and government agencies worldwide. Our Multi-layered Gateway Security Platform delivers a powerful combination of innovative security technologies, enabling organisations to protect their networks and users from cyber threats as they continually shift to new technologies and platforms. At ContentKeeper, our mission is to innovate the world’s best high-speed web security solutions. The company is headquartered in Canberra, Australia and maintains U.S based operations in Anaheim Hills, California. For more information, visit www.contentkeeper.com.

NETSCOUT SYSTEMS

NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) assures digital business services against disruptions in availability, performance, and security. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility, and insights customers need to accelerate, and secure their digital transformation. Our approach transforms the way organizations plan, deliver, integrate, test, and deploy services and applications. Our nGenius service assurance solutions provide real-time, contextual analysis of service, network, and application performance. Arbor security solutions protect against DDoS attacks that threaten availability, and advanced threats that infiltrate networks to steal critical business assets. To learn more about improving service, network, and application performance in physical or virtual data centers, or in the cloud, and how NETSCOUT’s performance and security solutions, powered by service intelligence can help you move forward with confidence, visit www.netscout.com or follow @NETSCOUT and @ArborNetworks on Twitter, Facebook, or LinkedIn.

RiskIQ

RiskIQ is the global leader in attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social and mobile exposures. Trusted by tens of thousands of security analysts, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk and take action to protect the business, brand and customers. RiskIQ data and technology help power 49 of the world’s leading security vendors including FireEye, Fortinet, and Rapid 7. Based in San Francisco, the company is backed by Summit Partners, Battery Ventures, Georgian Partners and MassMutual Ventures.

Fortian

Fortian is a specialist Australian provider of IT security, privacy and risk services. Our vision is to help our customers build digital trust.

Digital trust is the currency of the online world. Organisations that have built enhanced trust enjoy deeper, more beneficial relationships with their customers and the community. Trust is underpinned by IT security and privacy, and an understanding of technology and risk. Our expertise and thought leadership in these disciplines is unmatched.

We have created an industry-leading team with real-life experience in protecting and creating digital trust in some of Australia’s largest organisations. We partner with our customers to help them solve complex IT security and privacy issues and in doing so, apply a unique, multi-disciplinary approach that brings together strategic, business and technical perspectives.

Senetas

Senetas leads in data encryption solutions for enterprise and government organisations. From high-assurance encryption hardware and virtualised network encryption, to SureDrop encrypted file-sharing, Senetas leverages state-of-the-art encryption key management and crypto-agility, providing long-term data protection in a post-Quantum world.SureDrop + Votiro Disarmer provide encrypted file-sharing, data sovereignty control and award-winning Content Disarm and Reconstruct (CDR) technology. SureDrop + Votiro Disarmer protect all files against unknown zero-day malware attacks before they attack your systems – the strongest malware protection available. Senetas solutions do not compromise performance or users’ experience and protect much of the world’s most sensitive data in 35+ countries.

Exabeam

Exabeam is the Smarter SIEMTM company. We empower enterprises to detect, investigate and respond to cyberattacks more efficiently so their security teams can work smarter. With the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident response.

Accellion

The Accellion secure file sharing and governance platform empowers millions of corporate executives, attorneys, healthcare providers, investment advisors, government employees, and other professionals all over the world to share sensitive information with external partners simply, securely, and in compliance.When users click the Accellion button inside an email, mobile or enterprise app, they know it’s the simplest way to securely share sensitive information with the outside world. By giving users an easy, secure external communication channel, CISOs prevent data leaks, protect against malicious attacks, and eliminate shadow IT.Accellion’s solutions have been used by more than 25 million end users and have been installed at more than 3,000 of the world’s leading corporations and government agencies including NYC Health + Hospitals; KPMG; Kaiser Permanente; Latham & Watkins; National Park Service; Umpqua Bank; Tyler Technologies; and the National Institute for Standards and Technology (NIST).

Varonis

Varonis is a pioneer in data security and analytics, fighting a different battle than conventional cybersecurity companies. Varonis focuses on protecting enterprise data on-premises and in the cloud: sensitive files and emails; confidential customer, patient and employee data; financial records; strategic and product plans; and other intellectual property. The Varonis Data Security Platform detects insider threats and cyberattacks by analyzing data, account activity, perimeter telemetry, and user behavior; prevents and limits disaster by discovering, classifying and locking down sensitive, regulated and stale data; and efficiently sustains a secure state with automation. With a focus on data security, Varonis serves a variety of use cases including data protection, threat detection and response, and compliance. Varonis started operations in 2005 and, as of December 31, 2018, had approximately 6,600 customers worldwide — comprised of industry leaders in many sectors including technology, consumer, retail, financial services, healthcare, manufacturing, energy, media, and education.

Enosys Solutions

Enosys Solutions is an IT security specialist with a highly skilled professional services team and 24×7 on-shore security operations centre (SOC) servicing corporate and public sector organisations across Australia. Our 30 technical-based staff have strong expertise and collectively hold over 90 industry certifications. Combined with decades of cross industry experience of our senior consultants, architects and engineers, Enosys is continually recognised and awarded for delivering measurable outcomes that help our customers enhance their security posture in an ever-evolving threat landscape. Additionally, with certification to three ISO standards, our customers are confident that our approaches and methodologies from design, implementation and operation is proven, documented and continually refined.

Government of South Australia

South Australia’s Department for Trade, Tourism and Investment (DTTI) helps industry, business and communities identify and capitalise upon opportunities for job creation and economic growth.A strong economic future for South Australia depends on growing exports and making it easier for international partners to do business.DTTI works with South Australian businesses and stakeholders to help grow the state’s international engagement and showcase South Australia to the world.

Dtex

Dtex provides organizations across the globe with the complete, user-focused visibility needed to strengthen enterprise security posture and more effectively manage insider threats. Dtex’s Enterprise User Intelligence combines high-fidelity user activity data with machine learning and advanced analytics to pinpoint anomalies in real time, elevate areas of risk, generate actionable insights, and provide answers quickly. Collecting only the lightweight data needed to identify risky behaviors, Dtex can be deployed and scaled quickly with no impact on network, endpoint or human performance. Patented features protect user privacy and ensure compliance. Organizations spanning the Fortune 500, government agencies, leading banks, and SMBs use Dtex to gain visibility over hundreds of thousands of users and their endpoints to reduce the risk of data breaches, ransomware, espionage, and IP theft. Investors include Wing Venture Capital and Norwest Venture partners. The Defense Information Systems Agency (DISA), Williams Formula 1 Racing, and Freshfields Bruckhaus Deringer are among customers using Dtex to reduce insider threat risk. dtexsystems.com

Bitdefender

Bitdefender is a global cybersecurity and antivirus software leader protecting over 500 million systems in more than 150 countries. Since 2001, Bitdefender innovation has consistently delivered award-winning security products and threat intelligence for people, homes, businesses and their devices, networks and cloud services. Today, Bitdefender is also the provider-of-choice, used in over 38% of the world’s security solutions. Recognized by industry, respected by vendors and evangelized by our customers, Bitdefender is the cybersecurity company you can trust and rely on.

Alyne

Alyne is a next generation B2B RegTech offering organisations extensive capabilities in managing their Cyber, Governance, Risk and Compliance processes through a Software as a Service platform. Alyne enables industries of all sizes to gain actionable insights through our content-rich library of structured controls and risk information, all mapped to relevant regulations, laws and industry standards. Our technology is powered by industry experts, empowering risk and assurance professionals to easily understand complex data and manage Risk and Compliance processes effectively. Visit us at Stand 98 to learn more on how you can keep your organisation at the forefront of Cyber Security, Risk Management and Compliance with Alyne as your mission control. Visit www.alyne.com Connect with us on LinkedIn or follow us on Twitter: @alyne

SSH Communications Security Limited

We at SSH.COM deliver some of the most advanced security and access software technology in the world. Our industry-leading solutions and expertise are used by Fortune 500 companies and federal agencies. The Secure Shell protocol that we invented in 1995 is vital to how people and machines access valuable resources and data everyday. We’ve been safeguarding the data economy ever since.

Team T5

Team T5 started with an outstanding research and has been delivering their cyber threat intelligence (CTI) for more than 5 years. Comparing with other CTI vendors, Team T5 has the most and best understanding of cyber attackers in Asia. With the leading intelligence and knowledge of cyber espionage attackers, Team T5 designed an unique technology and invented a methodology to help clients dealing with targeted attacks. The solution has been verified and helped many victims in Taiwan and Japan solve the problem.

Team T5 offers an advanced threat hunting technology – ThreatSonar. It has already scanned more than 500K endpoints and kept helping people to discover threats that their existing security solutions couldn’t see. www.teamt5.tw

Endace

Endace’s multifunctional Analytics Platform can host 3rd-party network analytics applications while simultaneously recording a 100% accurate Network History, providing definitive evidence for investigating cybersecurity threats, quantifying data breaches and analyzing network or application performance problems. Deploying a dedicated Analytics Platform enables agile deployment of analytics functions on-demand and dramatically reduces OPEX and CAPEX costs by consolidating datacenter hardware. Hosted analytics applications can analyze live traffic at full line rate, or use Playback to analyze historical traffic for powerful, back-in-time analysis. Global customers include banks, hospitals, telcos, broadcasters, retailers, web giants, governments and military.

Checkmarx

Checkmarx is the Software Exposure Platform for the enterprise. Over 1,400 organizations around the globe rely on Checkmarx to measure and manage software security risk at the speed of DevOps. Checkmarx serves five of the world’s top 10 software vendors, four of the top American banks, and many government organizations and Fortune 500 enterprises, including SAP, Samsung, and Salesforce.com. Visit the Checkmarx team @Stand 93 and learn how we can help you unify your application security into a single platform and release secure software, fast! Visit Checkmarx.com or follow us on Twitter: @checkmarx.

Qualys

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 12,200 customers and active users in more than 130 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, DXC Technology, Fujitsu, HCL Technologies, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit qualys.com.

ALC

Celebrating 26 years of training excellence – ALC offers the widest range of Information & Cyber Security courses in the Asia-Pacific region. Currently, Security offers one of the best career paths in IT today, and ALC offers one of the best ways to get there.

For beginners we offer the only entry level course on the market designed for anyone wanting an understanding of Info/Cyber Security and gain a solid base on which to build a career ALCs Cyber Security Foundation+Practitioner course.

For intermediate/advanced professional we offer these leading internationally accredited certifications: SABSA, CISM, CRISC, CISSP.

ALC courses are taught by leading international practitioners with extensive real-world experience. You don’t get just the theory & exam preparation. You get the full learning experience!

alctraining.com.au

BSI

BSI is the business improvement company that enables organizations to turn standards of best practice into habits of excellence. For over a century BSI has championed what good looks like and driven best practice in organizations around the world. Working with 84,000 clients across 193 countries, it is a truly international business with skills and experience across a number of sectors including aerospace, automotive, built environment, food, and healthcare. Through its expertise in Standards Development and Knowledge Solutions, Assurance, Regulatory Services, and Professional Services, BSI improves business performance to help clients grow sustainably, manage risk and ultimately be more resilient. We are proud to collaborate with AISA and see this partnership as a reinforcement of our alignment to advance the information resilience of governments, businesses and the general public of Australia. To learn more, please visit: bsigroup.com/en-au

CompTIA

CompTIA is a leading voice and advocate for the $5 trillion global information technology ecosystem; and the more than 50 million industry and tech professionals who design, implement, manage, and safeguard the technology that powers the world’s economy. Through education, training, certifications, advocacy, philanthropy, and market research, CompTIA is the hub for advancing the tech industry and its workforce. Visit www.comptia.org to learn more.

Kroll

Kroll is the leading global provider of risk solutions. For more than 45 years, Kroll has helped clients make confident risk management decisions about people, assets, operations and security through a wide range of investigations, cyber security, due diligence and compliance, physical and operational security, and data and information management services.

Intalock

Intalock is one of Australia’s leading providers of cyber security managed services. We pride ourselves on being uniquely different; we not only deliver world class cyber security managed services, we have a wealth of experience in understanding data – the lifeblood of any organisation. At Intalock we take a unique approach: We want to understand your data, it’s sensitivity, how you use, store and share it – in fact, we want to understand data in its entirety. By doing this, we help our clients build and manage innovative solutions to reduce their risk by taking a strategic data centric approach to cyber security. With presence in Brisbane, Sydney, Melbourne and Manila we work with medium to large enterprises across the Asia Pacific region. Our aim is to help our clients grow their businesses without the need to compromise on security.

Ivanti

COMPLY WITH THE ASD TOP 4 WITH A SINGLE VENDOR.

Ivanti unifies IT and Security Operations to better manage and secure the digital workplace. From PCs to mobile devices, VDI, and the data center, Ivanti discovers IT assets on-premises and in the cloud, improves IT service delivery, and reduces risk with insights and automation.

If your business is moving towards ASD Top 4 or Essential 8 compliance, Ivanti can help you get there. Ivanti Security Controls combines the full Ivanti Patch for Windows feature set with the privilege management, application whitelisting, and browser control features of Ivanti Application Control. While mandatory for government agencies, organisations in the private sector are increasingly looking to the ASD Top 4 and Essential 8 as best practices to secure their environments. Among the most effective security measures available, implementing the ASD Top 4 will help protect your organisation from 85% of the intrusion techniques to which the Australian Cyber Security Centre responds.

Ivanti is headquartered in Salt Lake City, Utah and has offices all over the world. For more information, visit www.ivanti.com and follow @GoIvanti.

Deep Instinct

Deep Instinct is the first and only company to apply end-to-end deep learning to cybersecurity. Deep learning is inspired by the brain’s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial neural network brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, any kind of malware; known and new, first-seen malware, zero-days, ransomware and APT attacks, are predicted and prevented in real-time with unmatched accuracy.Using deep learning, Deep Instinct offers a predictive threat prevention platform with multi-layer protection against any known or unknown threat from any file or fileless attack. Deep Instinct’s solution can be applied on any device (endpoints, mobile devices and servers) with any operating system.Deep Instinct™ continuously trains to recognize new malware in order to optimize its prediction model (D-Brain), which is then updated on the agent (D-Client) that’s on the customer device. When a file is initially accessed on the device, the D-client analyzes the file statically to determine whether the file is malicious or benign. This enables zero-time prevention of the malware.

Privasec

Privasec is a fast growing & leading independent provider of Cyber Security services to Government, Financial Services, Retail, IT, Health, Entertainment and Not-for-Profit sectors. We have two lines of businesses across GRC and RED and have offices in Singapore, Australia and New Zealand. – Privasec GRC are the specialists in Governance, Risk and Compliance which covers PCI DSS, ISO27001, ISO31000, IRAP, Essential 8 and other key regulations required to operate in today’s market.- Privasec RED are leaders in Penetration Testing, Drone Security, Red Team Attack simulations, SCADA & ICS Security, Physical Intrusions, Theft simulations, Open Source Intelligence Gathering (OSINT), Social Engineering, and Phishing. We are CREST certified.We believe in partnering with our customers and building long-lasting relationships, based on trust, integrity and care. We hold numerous accreditations and are ISO27001:2013 certified. We are on several State and Federal Government panels. Visit www.privasec.com.au or call +65 6631 8375 for more information.

Australian Computing Academy

The Australian Computing Academy at the University of Sydney provides intellectual, technical, and practical leadership needed to fulfil the ambitious goals of the Australian Curriculum: Digital Technologies.The ACA collaborates regularly with education, industry and the broader tech community to champion a deeper understanding of Digital Technologies and their applications in a range of fields, including computer science, data science and cyber security.In 2019, we launched the Schools Cyber Security Challenges to provide high school teachers and students with four classroom-ready activities (Challenges) that develop cyber security skills and dispositions.

ANZ

At ANZ, our purpose is to shape a world where people and communities thrive. We have over 40,000 team members working in more than 33 markets across Australia, New Zealand, Asia, Pacific, Europe, America and the Middle East. Our mission in the Security Domain is to protect the bank from cyber threats and to ensure that our systems remain secure and available so our customers feel secure banking with us.

RMIA

The Risk Management Institute of Australasia (RMIA) is the professional institution and industry association for Risk Managers in the Asia Pacific region.

Penten

Penten is a rapidly growing, Australian-owned cyber security company based in Canberra. Our primary focus is to create cyber capabilities to advantage and protect Australia and its allies. In under four years we have built a team who continues to generate world-leading, innovative ideas and rapidly realise these into integrated enterprise solutions. Penten aims to solve the hardest cyber challenges of tomorrow. With a focus on protecting those who protect us, Penten supports the most complex transformations in the digital age by delivering secure mobility, applied artificial intelligence and cyber engineering services. Penten’s Applied AI business unit uses machine learning to create realistic decoys to detect and track sophisticated cyber adversaries. These decoys make a huge impact and can even save lives of soldiers. Penten’s innovations and people have won high profile awards including Most Innovative Company and Best Innovation Program, Government category at the 2019 AFR Boss awards, and named 2018 Business of the Year at the Telstra Business Awards.

CyberGRX

CyberGRX brings efficiency, scalability and accuracy to third-party cyber risk programs across the globe. Our Exchange provides a central hub for enterprises and third parties to easily access, order and share dynamic risk-based assessments on a repeatable basis. The platform’s analytics empowers organizations with always up-to-date views of risk that can enable continuous vendor ecosystem monitoring. The mitigation insights provided can reduce the time and money spent compiling static spreadsheets and countless disparate assessment requests.

Crime Stoppers Victoria

Crime Stoppers Victoria is Victoria’s largest not-for-profit crime reporting, crime intelligence, and crime prevention service. We work to empower Victorians to help reduce crime in the community. Our crime reporting service helps Victorians to report crime confidentially, and provide police with the information they need to keep Victoria safe. Since we began 30 years ago, we’ve always fully maintained our commitment to confidentiality – we only need your information, not your personal details.Our partnerships with media organisations across the state allows us to reach thousands of Victorians every week, helping to solve unsolved cases, find wanted persons, and give closure to victims of crime. Crime Stoppers Victoria is also active in crime prevention and crime education. Over the last few years we’ve encouraged Victorians to stay safe on public transport, helped wildlife investigators educate the community about wildlife trafficking, warned holidaymakers about recklessly-lit bushfires, and provided information on keeping safe and secure.

Edith Cowan University

Edith Cowan University offers innovative and practical courses together with a vibrant research culture. The discipline of Computing and Security within the School of Science boasts strong academic standing, award-winning student achievements and highly-regarded educational programs, with strong links to industry and professional associations. The school offers a range of Undergraduate, Masters and PhD courses and also offers professional development and executive training opportunities. The school is nationally and internationally recognised for its teaching and research in the area of cyber security. ECU is one of only two Academic Centres of Cyber Security Excellence within Australia (the only one in WA) and is leading two themes in the Collaborative Research Centre in Cyber Security ($139m of industry/government funding).Find out more about [email protected] (ecu.edu.au/courses/cyber-security).

ALSID

ALSID is a cybersecurity vendor specializing in defending the common denominator of most attacks we see in the wild nowadays: Active Directory (AD) infrastructures. Our flagship cloud solution provides our users with, step-by-step, tailored recommendations for hardening their AD, a real-time attack detection engine, as well as capabilities for investigating AD breaches when they unfortunately occur.Today, ALSID is protecting more than 3 million users in more than 6 countries and helping major companies such as Orange, Airbus Helicopters, Sanofi, VINCI Energies stay safe against advanced attacks.

FifthDomain

FifthDomain learning platforms are revolutionising the way cyber education is delivered.We are a specialist cyber security education and training company tackling the global cyber skills shortage. Cyber adversaries are aggressive and persistent, constantly improving their tradecraft to find ways to compromise network defenses. Our technology platform helps make sure cyber operators can have hands on training, equipping them with the skills required to respond to emergent threats.We provide interactive learning platforms that deliver high speed, on demand and customisable cyber education environments with just a browser. Our technologies support educators and trainers, allowing them to customise their content while saving them the time and effort setting up complex lab environments. We also support users by providing stable and reliable virtualised real-world environments to test existing skills or learn new ones.Our cyber range technology is also changing the way cyber operations teams are training and testing their networks and skills to defend these networks. This combined with our competition platform provides education institutions, industry and government/defence with a holistic training suite to exercise and measure their skills.WHY YOU NEED IT:Available 24/7, anywhere in the worldAvailability on preferred deviceFlexible cost, scaled by usageOnline, on demand virtual environmentsDynamic hosting capabilityFind out more about our training solutions or request a demo: fifthdomain.com.au

SecureDrive

SecureDrive is a provider of ultra-secure, easy to use, and affordable USB data storage solutions, employing on-board PIN authentication with military grade AES 256-bit hardware encryption.At the Australian Cyber Conference, we will be exhibiting a World first hardware encrypted cloud solution which allows you to encrypt and store your data in 3rd party cloud service while maintaining your key securely locked away in USB cloudAshur module. The solution also comes with Remote Management Console to monitor and manage users and deployed devices.These portable and secure products are used by Government agencies and commercial institutions worldwide. For full product description and specification, please refer to securedrive.com.au

XM Cyber

XM Cyber provides the first fully automated breach and attack simulation (BAS) platform to continuously expose attack vectors, from breach point to any organizational critical asset. This continuous loop of automated red teaming is completed by ongoing and prioritized actionable remediation. In effect, XM Cyber’s platform operates as an automated purple team, combining red and blue teams’ processes to ensure that organizations are always one step ahead of the attack. XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in the US, UK, Israel and in Australia.

La Trobe

About La Trobe
For over 50 years, La Trobe University has laid the foundation for successful careers. More than 200,000 students have graduated with us – among them are CEOs of some of our most prominent organisations, medical researchers, human rights activists, parliamentarians and Olympians.

We’ve placed a strong emphasis on excellence in all areas of the student experience, putting us firmly within the top 1.2 per cent of 28,000 universities globally.1 We’ve also cultivated a reputation for our world-class research that’s propelled us into the top 10 universities in Australia.2 We’ve achieved this by providing our students with the right opportunities to help them succeed both during and after their studies.

Our Career Ready program has been designed in consultation with industry leaders, enabling our students to build the skills and attributes employers want so they’ll thrive in an evolving workforce. Practical experience is also vital, which is why we’ve integrated Work Integrated Learning into many of our courses, allowing our students to take placements with organisations like CSIRO, the Australian Synchrotron, PwC and our many hospital partners.
Advanced learning facilities such as the La Trobe Institute for Molecular Science, on-campus allied health clinics as well as the largest Regional Health School in Australia, enable our students to put the theory they learn into practice.

With over 150 international exchange partnerships, we encourage our students to take part in our global Study Abroad programs. Locally, we’ve built a culture of diversity across our campuses in Melbourne, Bendigo, Albury-Wodonga, Mildura, Shepparton and Sydney. We offer more than 90 clubs and societies that cover almost every social, sporting, cultural, academic and political interest you can imagine.

Studying at La Trobe prepares you for more than a career. We help students turn their goals into achievements and their passions into fulfilment.

1. QS World University Rankings 2019; Webometrics Ranking Web of Universities 2019
2. Excellence in Research Australia Report 2018

UNSW Canberra

UNSW Canberra Cyber is leading national and international collaborative research projects, and educating and mentoring the next generation of Australian leaders and thinkers in the field. Through training and education, UNSW Canberra Cyber is working to combat threats to national security, the economy and the safety of individuals due to the exploitation of information systems and the proliferation of social media platforms.

NAB

NAB’s Enterprise Security looks at security holistically, so that we can manage threats online and in the physical world. The Enterprise Security team includes cyber, physical security, investigations and operational fraud capabilities. This blend of expertise enables us to leverage and consolidate data from various sources to give us greater insight into threats and trends, allowing us to become more proactive at protecting the Bank and our customers. Enterprise Security is led by our Chief Security Officer, David Fairman, who is responsible for NAB’s security posture. David’s view of security across the organisation affords a broad and deep perspective on risk, and enables our business to operate optimally while minimising the risk of threats, attacks and business disruption.

Deakin University

Deakin University offers cutting-edge cyber security courses and is one of the fastest growing research universities in Australia. The university has five campuses in Victoria including an online Cloud Campus. The cyber security discipline is hosted within the School of Information Technology where students can enroll in bachelors, masters and PhD courses, and can study a dedicated cybersecurity course, specialise in cybersecurity within an IT degree, or combine their studies with related disciplines, including law and criminology.Deakin’s Bachelor of Cyber Security, which includes industry certification, is in strong demand, and there is growing interest in its Master of Cyber Security course. Work-integrated learning opportunities are a feature with internships offered over 3, 6 and 12 months, as are industry-based capstone projects.The Centre for Cyber Security Research and Innovation (CSRI) at Deakin University develops innovative technologies and methodologies for securing cyberspace in Australia and beyond, and works with the School of Information Technology to support world leading capabilities in cyber security.

Mimecast

Most businesses are afraid of dangerous cyber threats, technology failures, and human technology errors. At Mimecast we use cloud technology to provide a suite of products that are powerful, integrated and easy to use that restores trust, bolsters business resilience and allows employers to be more productive. Our proprietary cloud architecture offers comprehensive email security, service continuity, archiving and awareness training in a single subscription service. Our goal is to make it easier to protect your business in today’s fast-changing security and risk environment. Learn more or schedule a demo at mimecast.com

Kroll/Duff & Phelps

Kroll is the leading global provider of risk solutions. For more than 45 years, Kroll has helped clients make confident risk management decisions about people, assets, operations and security through a wide range of investigations, cyber security, due diligence and compliance, physical and operational security, and data and information management services.

NCC Group

NCC Group is a global expert in cyber security and risk mitigation, working with organisations to protect their brand, value, and reputation against the ever-evolving threat landscape. Headquartered in Manchester, UK, with over 35 offices cross the world, NCC Group employs more than 2,000 people and is a trusted advisor to 15,000 client worldwide. Services include: Risk Management & Governance, Security & Penetration Testing, Managed Detection & Response, Managed SIEM Services.

nccgroup.trust

Proofpoint

Proofpoint, Inc. (NASDAQ: PFPT) is a leading cybersecurity company that protects organisations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organisations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. More information is available at proofpoint.com.au

Mimecast

Most businesses are afraid of dangerous cyber threats, technology failures, and human technology errors. At Mimecast we use cloud technology to provide a suite of products that are powerful, integrated and easy to use that restores trust, bolsters business resilience and allows employers to be more productive. Our proprietary cloud architecture offers comprehensive email security, service continuity, archiving and awareness training in a single subscription service. Our goal is to make it easier to protect your business in today’s fast-changing security and risk environment. Learn more or schedule a demo at mimecast.com

Sentaris

Sentaris is a boutique security services provider specialising in security assurance and response services. Melbourne-based yet with a global profile, we offer both a national and remote international service to our clients.Our extensive security, business and IT experience allows us to understand our client’s business and provide them with a suitably tailored, specialised security service.

Dimension Data

Launched on 1 July 2019, NTT Ltd is a world-leading global technology services provider that brings together the capabilities of 28 companies, including NTT Security, NTT Communications and Dimension Data into one global business. It offers clients worldwide access to the best technology and services to address their challenges in one place.We partner with organizations around the world to shape and achieve outcomes through intelligent technology solutions. For us, intelligent means data driven, connected, digital, and secure. As a global ICT provider, we employ more than 40,000 people in a diverse and dynamic workplace that spans 57 countries.By 1 October 2019, all 28 companies will be branded as NTT. Together we enable the connected future. Visit us at hello.global.ntt

ServiceNow

ServiceNow® makes work, work better for people. Our cloud-based platform and solutions deliver digital experiences that help people do their best work. Now, security, risk and IT teams can identify and prioritize security incidents, vulnerabilities, and enterprise risks quickly, and respond faster using digital workflows, automation, and orchestration.

The Oceania Cyber Security Centre

ADVANCING CYBERSECURITY AND RESEARCH

The Oceania Cyber Security Centre (OCSC) was founded in 2015 with the broad aim of engaging with industry, academia and government to conduct research, develop training opportunities and build capacity for responding to current and emerging cyber security issues locally and globally.

Enabling connection between the need and the solution, OCSC is comprised of 8 Victorian universities as well as many industry and international partners. Our university partners and the over 90 specialist cyber security researchers within them, provide the foundation to work with private enterprises and the public sector to identify and develop solutions to complex security threats.

The core mission of the OCSC is to foster collaboration between academia, industry partners and government and to make our cybersecurity research capabilities readily available. The first round of 9 collaborative projects, developing proof-of-concept implementations based on long-term research at OCSC member universities is about to be completed and results will be presented at showcase events later in 2019. The next round of projects with industry participation are about to commence and all 8 universities participate in these projects.

The OCSC’s flagship project is the Cybersecurity Capacity Maturity Model for Nations (CMM). The OCSC works in collaboration with the University of Oxford’s Global Cyber Security Capacity Centre (GCSCC) to complete national level cybersecurity capacity policy assessments predominately in the Pacific region. OCSC’ other key partners to deliver these projects are the Global Forum on Cyber Security (GFCE), the International Telecommunication Union (ITU) and the Regional Internet address Registry for the Asia Pacific (APNIC).

The Cybersecurity Capacity Maturity Model for Nations (CMM) is designed to assist countries in understanding the current state of their national cybersecurity capacity. Such deployments bring together Public, Private, and Civil Society actors to discuss the state of cybersecurity preparedness, governance and responsiveness in each country.

It is deployments such as the CMM, that informs associated research projects and capacity building interventions to advance the knowledge and development of global cybersecurity threats and human rights online.
Our cyber security experts work closely with the research community, government and industry with new ideas, new products and new concepts to ensure that they are better placed to anticipate the future of technology and the associated risks and opportunities.

ASPI

The Australian Strategic Policy Institute (ASPI) is an independent, non-partisan think tank that produces expert and timely advice for Australia’s strategic and defence leaders.ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy.The ICPC informs public debate and supports sound public policy by producing original empirical research, bringing together researchers with diverse expertise often working together in teams. To develop capability in Australia and our region, the ICPC has a capacity building team that conducts workshops, training programs and large-scale exercises both in Australia and overseas for both the public and private sectors. The ICPC enriches the national debate on cyber and strategic policy by running an international visits program that brings leading experts to Australia.

CyRise

CyRise is Australia’s only venture accelerator that focuses on early stage cyber security startups. CyRise offers cyber security founders a mentor driven programme, $50,000 in investment, expeditions to Israel or the US, and early access to foundational customers and investors.CyRise is a partnership between Deakin University and Dimension Data.We support the long-term growth of the Australian cyber security ecosystem by investing in and supporting cyber security founders.

(ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 140,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and Education. For more information on (ISC)², visit isc2.org

AusCERT

AusCERT provides members with proactive and reactive advice and solutions to current threats and vulnerabilities. We’ll help you prevent, detect, respond and mitigate cyber-based attacks.As a not-for-profit security group based at the University of Queensland, AusCERT delivers 24/7 service to members alongside a range of comprehensive tools to strengthen your cyber security strategy.