Managing Risk in an Augmented World – Networking Sundowner Series | Melbourne
Managing Risk in an Augmented World – Networking Sundowner Series | Melbourne Read More »
10:00am SGT/AWST | 1:00pm AEDT It has been reported there is mis-information around CMMI in the market and its value to security professionals. In this CMMI myth-busting webinar we’re joined by Ron Lear and Pascal Rabbath to review the ISACA CMMI. When industry conversations are loaded with professional acronyms of frameworks and certifications, it might
Indo-Pacific State of Cyber Series: CMMI myth-busting Read More »
10:00am SGT/AWST | 1:00pm AEDT We’re joined by Mary Carmichael and Goh Ser Yoong to review the latest State of AI report from ISACA. Although the majority of respondents to ISACA’s new artificial intelligence survey are very or extremely worried about generative AI being exploited by bad actors, the majority also say no AI training
Indo-Pacific State of Cyber Series: State of AI Read More »
Hear from a special panel to discuss the current applications of drones and robotics within advanced security operations with panellists from Australia and Singapore. Speakers Jackie Dujmovic CEO / Founder · Hover UAV Linkedin Hover UAVs vision is to be a solution provider and the critical link between emerging drone technologies, individuals, schools, enterprises, researches
Drones & Robotics in Security Operations: Applications & Opportunities Read More »
Patch management of the future is automated, fire-and-forget, and risk-based. You can achieve this vision of tomorrow, today! Strong patch compliance is the first line of defense in the war against ransomware. More than 50% of ransomware attacks are the result of poor patch compliance due to end user’s blocking patches. Look, your techs and
Automated Patch Management: Achieving the vision of tomorrow, today! Read More »
8:00am AWST | 11:00am AEDT This session will discuss a layered approach to IT Security and how to implement the Essential 8 to achieve Cyber Security Resilience. About this event Register now for this webinar to discover: How a multi-layered security approach works The main areas of each layer of security The common types of
Layered IT Security Approach – Implementing the Essential 8 Read More »
Establishing the Key Metrics, Third Party Risk and Cyber Insurance reporting suitable for the Board of Directors About this event This session will discuss the key security metrics and the basis for developing a Security Strategy for the Board to Monitor. We will also discuss what to measure or what can be measured, as well
Presenting the Cyber Security Strategy to the Board of Directors Read More »