Risk Management

Australian Cyber Security Showcase

Australia’s federal agencies are confronting an increasingly complex cybersecurity landscape, where threats evolve, and adversaries grow more sophisticated. Cyber threats know no borders and the Australian federal government is a prime target. From nation-state actors to cybercriminals, adversaries are relentless in their pursuit of sensitive data and critical infrastructure. The recent shift towards remote work […]

Australian Cyber Security Showcase Read More »

CyberWest Summit 2024

Cyber education for business leaders CyberWest Summit is WA’s flagship cybersecurity education and awareness event. Learn from dozens of cybersecurity experts and acquire the skills to prevent and react to cyber crime targeting your business. Use the Referral code MSM10 when registering to get 10% discount! About the Summit

CyberWest Summit 2024 Read More »

Managing through persistent volatility

The ongoing proliferation and continuous evolution of risks in the banking industry – highly volatile, intricately linked and emerging from seemingly everywhere – have made today’s market and operational realities uniquely challenging for chief risk officers (CROs). At the same time, CROs are expected to command finite resources wisely and support transformation efforts designed to

Managing through persistent volatility Read More »

Mozambique Cyber Revolution Summit

Cyber Revolution Summit is an indisputable platform for public & private alliances, where this summit aims to bring 500+ pre-qualified CISOs, CIOs, heads of cyber security, digital transformation, IT infrastructure, information and communication technologies and other experts in this domain to discuss the potential and recent trends of cybersecurity. This summit will feature keynote presentations

Mozambique Cyber Revolution Summit Read More »

15th Edition Third Party Risk Management Monitoring and Oversight for Financial Institutions

This premier marcus evans conference will provide an environment for lessons learned on interpretation of recent domestic and regulatory guidance updates and impacts and benefits of technology such as generative AI. Additionally, the conference will examine practical strategies for records retention, continuous monitoring of 3rd parties, ongoing challenges of 4th and Nth party management and

15th Edition Third Party Risk Management Monitoring and Oversight for Financial Institutions Read More »

Cost Of Data Breach Report 2023

The Cost of a Data Breach Report equips IT, risk management and security leaders with quantifiable evidence to help them better manage their security investments, risk profile and strategic decision-making processes. The 2023 edition represents this report’s 18th consecutive year. This year’s research—conducted independently by Ponemon Institute and sponsored, analyzed and published by IBM Security®—studied

Cost Of Data Breach Report 2023 Read More »

CISO Auckland 2023

Put Security at the Centre of Business Strategy. Now in its second year, CISO Auckland is the definitive meeting place for New Zealand’s most senior InfoSec decision-makers. CISO Auckland is the ultimate gathering of New Zealand’s top InfoSec decision-makers! At CISO Auckland, we bring together industry experts and thought leaders to discuss everything from mitigation,

CISO Auckland 2023 Read More »

Certified Counter Terrorism Practitioner (CCTP)

The CCTP certification demonstrates a level of expertise and understanding of current counter terrorism best practices, including threat assessments, incident response planning, and risk management. It is a valuable asset for those who work in security management, law enforcement, intelligence, and other related fields. Not only does the CCTP certification add credibility and value to

Certified Counter Terrorism Practitioner (CCTP) Read More »

Breaking IT/OT Silos With ICS/OT Visibility

As the threat landscape continues to grow across industrial sectors, it is more important than ever that these organizations understand their networks and gain visibility across critical systems. In light of recent developments, including the discovery of the PIPEDREAM modular industrial control system (ICS) attack framework last year,1 companies and utilities in critical infrastructure must

Breaking IT/OT Silos With ICS/OT Visibility Read More »

The ASX 200 Attack Surface

Executive Summary Overall, the companies listed on the ASX 200 have a respectable security posture. The attack surface of ASX 200 companies in general is on-par with their counterparts in the FTSE 350 and the Fortune 500. There is still definite room for improvement, but the overall security posture of ASX 200 companies have measurably

The ASX 200 Attack Surface Read More »