About CrowdStrike
CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data.
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike
About CrowdStrike
CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data.
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.
Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.
CrowdStrike: We stop breaches
Fastly is a powerful edge cloud platform that helps companies deliver the best online experiences possible. We strategically move data and applications closer to your end users to improve performance, enhance security, and empower innovation on a global scale. Together, we're building the modern, trustworthy internet.
We operate at the f
Fastly is a powerful edge cloud platform that helps companies deliver the best online experiences possible. We strategically move data and applications closer to your end users to improve performance, enhance security, and empower innovation on a global scale. Together, we're building the modern, trustworthy internet.
We operate at the forefront of technology, allowing you to focus on what matters most: your core business. By leveraging Fastly's edge computing platform, you can stay ahead of the competition, meet rising customer expectations, and drive your company into the future.
Fortinet (NASDAQ: FTNT) is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybersecurity everywhere you need it with the largest integrated portfolio of over 50 enterprise-grade products. Well over half a
Fortinet (NASDAQ: FTNT) is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybersecurity everywhere you need it with the largest integrated portfolio of over 50 enterprise-grade products. Well over half a million customers trust Fortinet's solutions, which are among the most deployed, most patented, and most validated in the industry. The Fortinet Training Institute, one of the largest and broadest training programs in the industry, is dedicated to making cybersecurity training and new career opportunities available to everyone. FortiGuard Labs, Fortinet’s elite threat intelligence and research organization, develops and utilizes leading-edge machine learning and AI technologies to provide customers with timely and consistently top-rated protection and actionable threat intelligence. Learn more at https://www.fortinet.com, the Fortinet Blog, and FortiGuard Labs. businesses to the next level.
Mandiant, and Google Cloud Security is recognized by enterprises, governments and law enforcement agencies worldwide as the market leader in threat intelligence and expertise gained on the frontlines of cyber security. To make every organization confidently ready for cyber threats, Mandiant scales its intelligence and expertise through th
Mandiant, and Google Cloud Security is recognized by enterprises, governments and law enforcement agencies worldwide as the market leader in threat intelligence and expertise gained on the frontlines of cyber security. To make every organization confidently ready for cyber threats, Mandiant scales its intelligence and expertise through the Mandiant Advantage SaaS platform to deliver current intelligence, automation of alert investigation and prioritization and validation of security controls products from a variety of vendors.
Since 2003, Mimecast has stopped bad things from happening to good organisations by enabling them to work protected. We empower more than 40,000 customers to help mitigate risk and manage complexities across a threat landscape driven by malicious cyberattacks, human error, and technology fallibility. Our advanced solutions provide the pr
Since 2003, Mimecast has stopped bad things from happening to good organisations by enabling them to work protected. We empower more than 40,000 customers to help mitigate risk and manage complexities across a threat landscape driven by malicious cyberattacks, human error, and technology fallibility. Our advanced solutions provide the proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today. Mimecast solutions are designed to transform email and collaboration security into the eyes and ears of organisations worldwide.
Protect every level of your organisation, with the access solution that you and your employees will love: LastPass Business.
LastPass simplifies access management for companies of every size, with the tools your entire organisation needs to secure your business and centralise control of employee passwords and apps. In addition to the inc
Protect every level of your organisation, with the access solution that you and your employees will love: LastPass Business.
LastPass simplifies access management for companies of every size, with the tools your entire organisation needs to secure your business and centralise control of employee passwords and apps. In addition to the increased security provided by our cloud-based password vaulting and single sign-on solution, LastPass increases employee productivity by removing the time lost in password resets.
LastPass Business includes a cloud-based administrative console for the management and oversight of the program, allowing you to enforce policies, track usage through detailed reports and take control of employee access. Join the more than 300,000 businesses worldwide who use LastPass Business to create, enforce, and measure a meaningful access management policy.
Visit www.lastpass.com to start your free trial today.
The Queensland Government Cyber Security Unit (CSU) is dedicated to improving cyber security in Queensland. The CSU sets cyber security policy and guidance for the Queensland public sector, managing a number of whole-of-Government cyber security services, developing a public sector cyber workforce and supporting the development of the Queensland cyber security industry.
ThreatDefence provides security teams within any organisation with a ready-to-use, end-to-end SecOps solution, including a full stack platform able to capture and correlate all types of security data, supported by next-generation SIEM, NDR, endpoint visibility, integrated threat intelligence, AI response suggestions, SOC workflows and acc
ThreatDefence provides security teams within any organisation with a ready-to-use, end-to-end SecOps solution, including a full stack platform able to capture and correlate all types of security data, supported by next-generation SIEM, NDR, endpoint visibility, integrated threat intelligence, AI response suggestions, SOC workflows and access to our 24x7 team of cyber security experts. Our cloud SecOps platform can be deployed in minutes, transforming your data into evidence and detecting active and dormant threats in your environment. Our solution integrates with your existing security stack from day one. You can select your current security products from hundreds of pre-built integrations and use our lightweight sensors across your on-premise and cloud environments.
Say something interesting about your business here.
Airlock Digital is a global software vendor that specializes in practical application allowlisting and execution control. Allowlisting involves maintaining a list of known good files that you trust and blocking the execution of everything else, including known, unknown, suspicious, and malicious files. Airlock has been purpose-built from
Airlock Digital is a global software vendor that specializes in practical application allowlisting and execution control. Allowlisting involves maintaining a list of known good files that you trust and blocking the execution of everything else, including known, unknown, suspicious, and malicious files. Airlock has been purpose-built from the ground up by security practitioners with firsthand experience implementing numerous application allowlisting technologies at scale. The solution is designed to be simple to implement and maintain in complex and changing enterprise environments.
Airlock offers an intuitive application allowlisting framework that ensures the teams responsible for software management in an organization can securely and successfully implement and maintain an effective allowlisting in line with their existing software management practices. The intuitive design and rapid policy distribution capability ensure that the solution does not have an adverse impact on business continuity. Overall, Airlock’s approach to allowlisting can help organizations better protect their systems and data against cyber threats by limiting the execution of untrusted files.
Akamai offers cutting-edge solutions that redefine the possibilities of content delivery and cloud security. Through their advanced content delivery network services and industry leading cloud security solutions, Akamai enables businesses to thrive in the digital world. Akamai's competitive edge lies in the Akamai Intelligent Edge Platfor
Akamai offers cutting-edge solutions that redefine the possibilities of content delivery and cloud security. Through their advanced content delivery network services and industry leading cloud security solutions, Akamai enables businesses to thrive in the digital world. Akamai's competitive edge lies in the Akamai Intelligent Edge Platform, which ensures the swift, reliable, and secure delivery of content and applications, setting them apart in the industry. Akamai is dedicated to accelerating content speed, safeguarding against digital threats, and optimising overall performance. Their innovative solutions are designed to surpass expectations, helping end users navigate the digital world by offering unparalleled user experiences.
Cythera was founded by IT industry veterans in late 2018 to solve the real problem of protecting Australian businesses from cyber threats. Since inception, Cythera has built and delivered affordable, turnkey, managed security solutions that encompass the very best cloud delivered, or software-based security platforms bundled with expert,
Cythera was founded by IT industry veterans in late 2018 to solve the real problem of protecting Australian businesses from cyber threats. Since inception, Cythera has built and delivered affordable, turnkey, managed security solutions that encompass the very best cloud delivered, or software-based security platforms bundled with expert, Australian based security analysts to monitor, detect and respond to common and emerging cyber-threats.
Cythera's cyber security solutions allow for the rapid deployment of Assessment, Protection, Monitoring, Response and Assurance services to protect Australian businesses.
Forcepoint simplifies security for global businesses and governments with its all-in-one, truly cloud-native platform, making it easy to adopt Zero Trust principles and prevent the theft or loss of sensitive data and intellectual property no matter where people are working. Based in Austin, Texas, Forcepoint creates safe, trusted enviro
Forcepoint simplifies security for global businesses and governments with its all-in-one, truly cloud-native platform, making it easy to adopt Zero Trust principles and prevent the theft or loss of sensitive data and intellectual property no matter where people are working. Based in Austin, Texas, Forcepoint creates safe, trusted environments for customers and their employees in more than 150 countries. Engage with Forcepoint on www.forcepoint.com, Twitter and LinkedIn..
Phriendly Phishing is a cyber security awareness training and phishing simulation solution that educates and empowers your organisation and employees to help mitigate reputational and financial loss from cyber attacks. We train not trick through empathetic learning that is customised to each learner's journey. The platform is fully autom
Phriendly Phishing is a cyber security awareness training and phishing simulation solution that educates and empowers your organisation and employees to help mitigate reputational and financial loss from cyber attacks. We train not trick through empathetic learning that is customised to each learner's journey. The platform is fully automated, digitally delivered and is localised with relevant and engaging content. Get in touch today and receive a personalised demo from one of our security awareness experts: https://www.phriendlyphishing.com/request-a-personalised-demo
Sophos delivers superior cybersecurity outcomes by providing cybersecurity as a service to protect companies of all sizes from the most advanced cyberthreats. Our cybersecurity products and services include managed detection and response (MDR), firewall, email, endpoint (XDR), and cloud native security protection. Sophos products and ser
Sophos delivers superior cybersecurity outcomes by providing cybersecurity as a service to protect companies of all sizes from the most advanced cyberthreats. Our cybersecurity products and services include managed detection and response (MDR), firewall, email, endpoint (XDR), and cloud native security protection. Sophos products and services defend against ransomware, phishing, malware, and more. They connect through the cloud-based Sophos Central management console and are powered by Sophos X-Ops, our cross-domain threat intelligence unit. We provide fully managed security solutions so you can manage your cybersecurity directly with our security operations platform. Or, you can supplement your in-house team with Sophos' products and services.
Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with Zero Trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions.
HENNSOL Technologies: Cyber Security Excellence for Operational Technology
HENNSOL Technologies stands at the forefront of cyber security for operational technology (OT), dedicated to defending critical infrastructure against cyber threats. With a robust portfolio of products and services, we ensure your OT systems are protected, visible,
HENNSOL Technologies: Cyber Security Excellence for Operational Technology
HENNSOL Technologies stands at the forefront of cyber security for operational technology (OT), dedicated to defending critical infrastructure against cyber threats. With a robust portfolio of products and services, we ensure your OT systems are protected, visible, and resilient against attacks.
Discover how HENNSOL Technologies and our Technology partners can elevate your cyber security posture and safeguard your OT systems. Reach out to explore our solutions and start your journey towards unparalleled cyber resilience.
·
Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable cus
Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies.
Scyne Advisory is a dedicated public sector and for purpose advisory firm with national scale and the capabilities to help governments at all levels to serve the Australian community. Scyne is free from the inherent conflict of interest other advisory firms have when they earn material profits from large businesses in the for-profit secto
Scyne Advisory is a dedicated public sector and for purpose advisory firm with national scale and the capabilities to help governments at all levels to serve the Australian community. Scyne is free from the inherent conflict of interest other advisory firms have when they earn material profits from large businesses in the for-profit sector.
As a leader in trust-based services to the public sector, we are here to support clients whenever a concern or big decision arises. The mission of our Cyber & Tech Risk practice is to increase public trust and participation in government digital services; a key driver in improving Australia’s productivity, equality, resilience, and prosperity. We bring scale and expertise across all phases of cyber transformation covering advisory, technology risk, privacy & data governance, digital identity, technology implementation, and ongoing security operations.
SecAlerts is a Queensland-owned and Brisbane-based cyber security service that provides vulnerability and zero-day alerts in real-time, as opposed to the delays that can occur with traditional sources of vulnerability data.
We achieve this by using crawlers to obtain our data directly from the likes of vendors, forums, social media and th
SecAlerts is a Queensland-owned and Brisbane-based cyber security service that provides vulnerability and zero-day alerts in real-time, as opposed to the delays that can occur with traditional sources of vulnerability data.
We achieve this by using crawlers to obtain our data directly from the likes of vendors, forums, social media and the National Vulnerability Database (NVD). Once all the relevant information is collated, we send clients one jargon-free, easy-to-understand email.
SecAlerts caters for businesses of all size and offers a selection of plans to suit. Further features include vulnerability data for software versions, remedy information, covering open-source components, offline scanning, API integration and
white-labelling.
SecAlerts launched in 2019, with a view to providing one essential cyber security service, rather than a suite of products. We are a small team based in Brisbane, Australia, and our client base is global and varied, from universities to government departments to cyber insurers.
Rapid7 is creating a more secure digital future by helping organizations strengthen their security programs. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape. We foster open source communities and cutting-edge research–using these insights to o
Rapid7 is creating a more secure digital future by helping organizations strengthen their security programs. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape. We foster open source communities and cutting-edge research–using these insights to optimise our products and arm the security community with the latest in attacker methodology. More than 10,000 customers worldwide trust our industry-leading solutions and services to stay ahead of attackers and ready for what’s next.
Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. Our SaaS-based Exposure Management Platform delivers complete visibility, analytics, and automation to quickly map, prioritize and remediate vulnerabil
Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. Our SaaS-based Exposure Management Platform delivers complete visibility, analytics, and automation to quickly map, prioritize and remediate vulnerabilities across your organization. The vendor-agnostic solution intelligently optimizes security policies, actions, and change processes across all corporate networks and cloud environments. With Skybox, security teams can now focus on the most strategic business initiatives while ensuring enterprises remain protected.
Fortanix helps organisations protect data, whether it is at rest, in transit, or in use. Fortanix secures data across hybrid, multi-cloud environments through full key lifecycle management, data masking and tokenisation, and secure DevOps. With Fortanix, organisations can maintain greater visibility and control, bolster security, and ensure compliance over sensitive and regulated business data.
Willyama Services is a 100% Aboriginal-owned and Supply Nation Certified Information Technology and Cybersecurity professional services business. Willyama assists government and private sector business clients by delivering high-quality service outcomes.
LMNTRIX XDR seamlessly integrates Machine and Underground Intelligence, NGAV, EDR, NDR, Packets, SIEM, Cloud and Mobile Security with Deception Everywhere into a unified platform. This platform offers complete automation for attack validation, investigation, containment, and remediation – all within a single, user-friendly interface.
Wha
LMNTRIX XDR seamlessly integrates Machine and Underground Intelligence, NGAV, EDR, NDR, Packets, SIEM, Cloud and Mobile Security with Deception Everywhere into a unified platform. This platform offers complete automation for attack validation, investigation, containment, and remediation – all within a single, user-friendly interface.
What sets us apart is our 24/7 Managed Detection and Response service, provided at no additional cost. This service ensures comprehensive protection for environments of all sizes, accommodating even the smallest security teams and covering the entire attack surface.
LMNTRIX XDR serves as a unified investigative platform, providing insights into threats across enterprise, cloud, hybrid, and industrial control systems (ICS) networks. It stands out with unique advantages, offering a holistic and multi-vector approach, an unlimited retention window of full-fidelity network traffic, innovative security visualizations, and the convenience and cost-savings of an on-demand deployment model.
CyberCX is the leading provider of professional cyber security and cloud services across Australia and New Zealand. With a workforce of over 1,300 professionals, we are a trusted partner to private and public sector organisations helping our customers confidently manage cyber risk, respond to incidents and build resilience in an increasi
CyberCX is the leading provider of professional cyber security and cloud services across Australia and New Zealand. With a workforce of over 1,300 professionals, we are a trusted partner to private and public sector organisations helping our customers confidently manage cyber risk, respond to incidents and build resilience in an increasingly complex and challenging threat environment.
Through our end-to-end range of cyber and cloud capabilities, CyberCX empowers our customers to securely accelerate opportunities in the digital economy. Our services include: consulting and advisory, governance, risk and compliance, incident response, penetration testing and assurance, network and infrastructure solutions, cloud security and solutions, identity and access management, managed security services and cyber security training.
InfoTrust is a leading specialised cybersecurity practice that combines a customer first consulting approach with next-generation security solutions. InfoTrust specialises in key security domains; assurance, governance, risk and compliance, email, endpoint, cloud and network. From ensuring regulatory compliance, to assessing end-user se
InfoTrust is a leading specialised cybersecurity practice that combines a customer first consulting approach with next-generation security solutions. InfoTrust specialises in key security domains; assurance, governance, risk and compliance, email, endpoint, cloud and network. From ensuring regulatory compliance, to assessing end-user security awareness to understanding where an organisation’s vulnerabilities lie, and more.
InfoTrust seeks to establish a trusted security partner status with its clients. With the goal of supporting the customers’ security journey, maturing their posture over time, protecting, and mitigating against the risks associated with cybercrime.
Sophos delivers superior cybersecurity outcomes by providing cybersecurity as a service to protect companies of all sizes from the most advanced cyberthreats. Our cybersecurity products and services include managed detection and response (MDR), firewall, email, endpoint (XDR), and cloud native security protection. Sophos products and se
Sophos delivers superior cybersecurity outcomes by providing cybersecurity as a service to protect companies of all sizes from the most advanced cyberthreats. Our cybersecurity products and services include managed detection and response (MDR), firewall, email, endpoint (XDR), and cloud native security protection. Sophos products and services defend against ransomware, phishing, malware, and more. They connect through the cloud-based Sophos Central management console and are powered by Sophos X-Ops, our cross-domain threat intelligence unit. We provide fully managed security solutions so you can manage your cybersecurity directly with our security operations platform. Or, you can supplement your in-house team with Sophos' products and services.
Australian Information Security Association (AISA) Ltd
Level 8, 65 York Street, Sydney NSW 2000 | 02 8076 6012 | ABN: 18 171 935 959
Copyright © 2024 AISA Sec Days All Rights Reserved
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.