Cisco's the worldwide leader in technology that powers the Internet. Cisco inspires new possibilities by reimagining your applications, securing your data, transforming your infrastructure, and empowering your teams for a global and inclusive future.
Fortra is here to help wherever you are in your data protection journey. Whether you’re looking to govern how data flows through your organization or secure data you share with third parties, our Data Protection solutions can help you mitigate the risk of data loss. And with both Software-as-a-Service offerings and Managed Services, we can help simplify the complexity of cybersecurity, speed time to deployment, and serve as an extension of your security team.
Fortra is a cybersecurity company like no other. We’re creating a simpler, stronger future for our customers. Our trusted experts and portfolio of integrated, scalable solutions bring balance and control to organisations around the world. We’re the positive changemakers and your relentless ally to provide peace of mind through every step of your cybersecurity journey. Fortra transformed the industry by bringing the leading solutions into one best-in-class portfolio, creating a stronger line of defense from a single provider.
Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world. Visit infoblox.com, or follow-us on LinkedIn or Twitter.
As part of NTT DATA, a USD 30 billion IT services provider, NTT Ltd. is a leading IT infrastructure and services company serving 65% of the Fortune Global 500 and more than 75% of the Fortune Global 100. We lay the foundation for organizations’ edge-to-cloud networking ecosystem, simplify the complexity of their workloads across multicloud environments, and innovate at the edge of their IT environments where networks, cloud and applications converge. We offer tailored infrastructure and ensure consistent best practices in design and operations across all of our secure, scalable and customizable data centers. On the journey towards a software-defined future, we support organizations with our platform-delivered infrastructure services. We enable a connected future. Visit us at services.global.ntt
At SentinelOne, we understand that cybersecurity is a constantly evolving field and that the threats facing organisations are becoming increasingly sophisticated. That's why we are committed to staying at the forefront of technology and innovation and providing our customers with the best protection against cyber threats. Our endpoint security product is designed to protect your organisation's endpoints from known and unknown threats, including malware, ransomware, and APTs. It uses artificial intelligence to continuously learn and adapt to new threats, providing real-time protection and automated response capabilities. We offer our customers a wide range of services, including threat hunting, incident response, and incident management. Our team of experts is available to assist you 24/7 and can help you respond to and manage cyber incidents quickly and effectively.
Airlock Digital provides an intuitive application allowlisting framework that ensures the teams within an organisation responsible for software management are able to securely and successfully implement and maintain an effective allowlisting in line with their existing software management practices. Additionally, the intuitive design and
Airlock Digital provides an intuitive application allowlisting framework that ensures the teams within an organisation responsible for software management are able to securely and successfully implement and maintain an effective allowlisting in line with their existing software management practices. Additionally, the intuitive design and rapid policy distribution capability ensures the solution does not have an adverse impact on business continuity.
CyberGRX brings a revolutionary approach to Third-Party Cyber Risk Management. Using sophisticated data analytics, real-world attack scenarios, and real-time threat intelligence, we provide our members a complete portfolio analysis of their third-party ecosystem, helping you to prioritize your risks, make smarter decisions. In addition, w
CyberGRX brings a revolutionary approach to Third-Party Cyber Risk Management. Using sophisticated data analytics, real-world attack scenarios, and real-time threat intelligence, we provide our members a complete portfolio analysis of their third-party ecosystem, helping you to prioritize your risks, make smarter decisions. In addition, we enable you to manage your own cybersecurity reputation as a third-party in a collaborative and efficient manner that supports your customer relationships as well as your business goals and needs.
Datcom is Australia's leading full-service managed cybersecurity services provider and a trusted partner to the nation’s most-esteemed organisations across multiple industries. With more than 26 years of experience in the technology sector, we’re always staying ahead of the latest advancements and emerging threats in the field. From proac
Datcom is Australia's leading full-service managed cybersecurity services provider and a trusted partner to the nation’s most-esteemed organisations across multiple industries. With more than 26 years of experience in the technology sector, we’re always staying ahead of the latest advancements and emerging threats in the field. From proactive cyber risk management to rapid detection and response, Datcom’s comprehensive suite of cybersecurity services is designed to complement your business, freeing you from the complexity of managing everything in-house.
The best-known brands choose Datcom because we don't just solve problems, we create opportunities. We believe the extensive experience, knowledge, expertise, and technology partners we bring to the table can unlock new growth within your organisation. In other words, we know what you need today and what you’ll need tomorrow because we’re constantly watching, learning, adapting, and preparing. With Datcom, you have a partner that’s always ready to protect, detect, and respond.
Delinea is a leading provider of Privileged Access Management solutions for the modern, hybrid enterprise. The Delinea Platform seamlessly extends PAM by providing authorisation for all identities, controlling access to an organisation’s most critical hybrid cloud infrastructure and sensitive data. We believe every user should be treated
Delinea is a leading provider of Privileged Access Management solutions for the modern, hybrid enterprise. The Delinea Platform seamlessly extends PAM by providing authorisation for all identities, controlling access to an organisation’s most critical hybrid cloud infrastructure and sensitive data. We believe every user should be treated like a privileged user and wants seamless, secure access, even as administrators want privileged access controls without excess complexity.
Cyberattackers have the advantage. ExtraHop is on a mission to help you take it back with security that can’t be undermined, outsmarted, or compromised. Our dynamic cyber defense platform, Reveal(x) 360, helps organizations detect and respond to advanced threats––before they compromise your business. We apply cloud-scale AI to petabytes o
Cyberattackers have the advantage. ExtraHop is on a mission to help you take it back with security that can’t be undermined, outsmarted, or compromised. Our dynamic cyber defense platform, Reveal(x) 360, helps organizations detect and respond to advanced threats––before they compromise your business. We apply cloud-scale AI to petabytes of traffic per day, performing line-rate decryption and behavioral analysis across all infrastructure, workloads, and data-in-flight. With complete visibility from ExtraHop, enterprises can detect malicious behavior, hunt advanced threats, and forensically investigate any incident with confidence. ExtraHop has been recognized as a market leader in network detection and response by IDC, Gartner, Forbes, SC Media, and numerous others.
When you don’t have to choose between protecting your business and moving it forward, that’s security uncompromised. Learn more at www.extrahop.com.
Managing cyber risk, together.
Forescout delivers automated cybersecurity across the digital terrain. We empower our customers to achieve continuous alignment of their security frameworks with their digital realities, across all asset types – IT, IoT, OT and IoMT. It is a non-stop journey, managing cyber risk through automation and data-po
Managing cyber risk, together.
Forescout delivers automated cybersecurity across the digital terrain. We empower our customers to achieve continuous alignment of their security frameworks with their digital realities, across all asset types – IT, IoT, OT and IoMT. It is a non-stop journey, managing cyber risk through automation and data-powered insights.
The Forescout Platform provides complete asset visibility of connected devices, continuous compliance, network segmentation, network access control and a strong foundation for zero trust. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout customers gain data-powered intelligence to accurately detect risks and quickly remediate cyberthreats without disruption of critical business assets.
Protect every level of your organisation, with the access solution that you and your employees will love: LastPass Business. LastPass simplifies access management for companies of every size, with the tools your entire organisation needs to secure your business and centralise control of employee passwords and apps. In addition to the incr
Protect every level of your organisation, with the access solution that you and your employees will love: LastPass Business. LastPass simplifies access management for companies of every size, with the tools your entire organisation needs to secure your business and centralise control of employee passwords and apps. In addition to the increased security provided by our cloud-based password vaulting and single sign-on solution, LastPass increases employee productivity by removing the time lost in password resets.
LastPass Business includes a cloud-based administrative console for the management and oversight of the program, allowing you to enforce policies, track usage through detailed reports and take control of employee access. Join the more than 300,000 businesses worldwide who use LastPass Business to create, enforce, and measure a meaningful access management policy.
Visit www.lastpass.com to start your free trial today.
The NSW Cyber Business Exchange is a business program that helps NSW cyber businesses to grow. Delivered in partnership between the Australian Information Security Association (AISA) and the NSW Cyber Hub (NSW Government). The program consists of a range of industry support initiatives including networking events, focus groups, ‘meet an expert’ round tables and a mentoring program.
Sekuro is a cyber security and digital resiliency solutions provider that helps CIOs and CISOs take a strategic approach to cyber security risk mitigation and digital transformation. Operating at the intersection of the digital technologies and cyber security industries, Sekuro reduces cyber risk while new technologies are adopted - ultim
Sekuro is a cyber security and digital resiliency solutions provider that helps CIOs and CISOs take a strategic approach to cyber security risk mitigation and digital transformation. Operating at the intersection of the digital technologies and cyber security industries, Sekuro reduces cyber risk while new technologies are adopted - ultimately building business resiliency and enabling fearless innovation.
Our four practice areas (Governance, Risk and Compliance, Technologies and Platforms, Offensive Security, and Managed Security Services) are full of the brightest minds in the industry. They work together to look beyond the threat landscape of today and into an opportunity landscape of tomorrow.
Learn more at sekuro.io.
Sysdig helps companies secure and accelerate innovation in the cloud. Powered by Runtime Insights, our cloud security platform stops threats in real time and reduces vulnerabilities by up to 95%. Our roots are in runtime with the creation of Falco, the open standard for cloud threat detection. By knowing what is running in production acro
Sysdig helps companies secure and accelerate innovation in the cloud. Powered by Runtime Insights, our cloud security platform stops threats in real time and reduces vulnerabilities by up to 95%. Our roots are in runtime with the creation of Falco, the open standard for cloud threat detection. By knowing what is running in production across cloud and containers, Dev and security teams can focus on the vulnerabilities, misconfigurations, permissions, and threats that matter most. From shift left to shield right, the most innovative companies around the world rely on Sysdig to prevent, detect, and respond at cloud speed.
Allied Telesis creates reliable, secure and easy-to-use wired and wireless networks for campus, branch and IoT solutions worldwide. In addition to the network solutions we make, we have also developed Industry leading advanced security solutions to meet the needs of today's modern business. Our solutions-based philosophy of producing prod
Allied Telesis creates reliable, secure and easy-to-use wired and wireless networks for campus, branch and IoT solutions worldwide. In addition to the network solutions we make, we have also developed Industry leading advanced security solutions to meet the needs of today's modern business. Our solutions-based philosophy of producing products to deliver customer value, together with high-quality service and support, has resulted in an extensive worldwide customer presence.
In a society focused on Internet of Things, where devices are connected to a network with or without wires, a secure network infrastructure is not only necessary; it is a requirement.
The Cyber and Infrastructure Security Outreach network (Network) was established to strengthen partnerships between businesses and government to uplift the security and resilience of critical infrastructure entities and their supply chains.
The Network collaborates with businesses and government to:
- focus on cyber security preparedness an
The Cyber and Infrastructure Security Outreach network (Network) was established to strengthen partnerships between businesses and government to uplift the security and resilience of critical infrastructure entities and their supply chains.
The Network collaborates with businesses and government to:
- focus on cyber security preparedness and protection of critical infrastructure
- promote an all-hazards approach to risk management
- deepen links with all levels of government and industry
- provide a whole-of-nation approach to cyber security uplift.
The Network can assist you by delivering cyber security awareness presentations, which can include information on:
- the threat environment
- common cyber security threats
- mitigation strategies; and
- where to go for further information and support.
Network officers are also available to explain the Security of Critical Infrastructure Act 2018, including obligations that apply to owners and operators of critical infrastructure assets.
For more information, contact the Network at cyber.outreach@homeaffairs.gov.au or your regional outreach officer.
Egress makes digital communication safer for everyone. As advanced and persistent cybersecurity threats continue to evolve, we recognize that people get hacked, make mistakes, and break the rules. Egress's Intelligent Cloud Email Security suite uses patented self-learning technology to detect sophisticated inbound and outbound threats, pr
Egress makes digital communication safer for everyone. As advanced and persistent cybersecurity threats continue to evolve, we recognize that people get hacked, make mistakes, and break the rules. Egress's Intelligent Cloud Email Security suite uses patented self-learning technology to detect sophisticated inbound and outbound threats, protect against data loss, resulting in the reduction of human activated risk.
Used by the world’s biggest brands, Egress is private equity backed and has offices in London, New York, and Boston.
Exabeam is a global cybersecurity leader that created New-Scale SIEMTM for advancing security operations. Built for security people by security people, we reduce business risk and elevate human performance. The powerful combination of our cloud-scale security log management, behavioral analytics, and automated investigation experience giv
Exabeam is a global cybersecurity leader that created New-Scale SIEMTM for advancing security operations. Built for security people by security people, we reduce business risk and elevate human performance. The powerful combination of our cloud-scale security log management, behavioral analytics, and automated investigation experience gives security operations an unprecedented advantage over adversaries including insider threats, nation states, and other cyber criminals. We Detect the UndetectableTM by understanding normal behavior, even as normal keeps changing – giving security operations teams a holistic view of incidents for faster, more complete response. Learn more at www.exabeam.com.
FraudWatch is a leader in Digital Brand Protection industry. Founded in 2003, FraudWatch is a privately owned Internet Security company and is headquartered in Melbourne, Australia, with team member based globally. FraudWatch services over 4000 brands in over 60 countries.
FraudWatch Digital Brand Protection Services protect client brands
FraudWatch is a leader in Digital Brand Protection industry. Founded in 2003, FraudWatch is a privately owned Internet Security company and is headquartered in Melbourne, Australia, with team member based globally. FraudWatch services over 4000 brands in over 60 countries.
FraudWatch Digital Brand Protection Services protect client brands online from threats including Phishing, Malware, Online Brand Impersonation, Social Media Impersonation and Unauthorised Mobile Apps and Dark Web Monitoring.
Each month, FraudWatch takes down thousands of phishing sites, Malware sites (command & control, credential drop sites, drive by download), fake Domains, Social Media Profiles and fake Mobile Apps. We provide the best site take down times in the industry, backed with financial penalty SLA’s.
Our mission is to deliver expert, innovative solutions to protect and defend our client’s online brands, reputation and financial losses from online fraud and abuse and to make the Internet a safer place.
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface.
The Illumio ZTS Platform visualizes all communication and traffic between workflows, devices, and the internet in one console, automatically sets granular segmentation policies to control unnecessary and unwanted co
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface.
The Illumio ZTS Platform visualizes all communication and traffic between workflows, devices, and the internet in one console, automatically sets granular segmentation policies to control unnecessary and unwanted communications, and isolates high-value assets and compromised systems to proactively or reactively stop the spread of a breach.
ZTS is proven to help organisations of all sizes, from Fortune 100 to small business, stop breaches and ransomware in minutes, save millions in application downtime, and accelerate digital transformation projects.
Assume breach. Minimise impact. Increase resilience.
ManageEngine is the enterprise IT management division of Zoho Corporation. Established and emerging enterprises—including 9 of every 10 Fortune 100 organizations—rely on ManageEngine's real-time IT management tools to ensure optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. Mana
ManageEngine is the enterprise IT management division of Zoho Corporation. Established and emerging enterprises—including 9 of every 10 Fortune 100 organizations—rely on ManageEngine's real-time IT management tools to ensure optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has offices worldwide, including the United States, the United Arab Emirates, the Netherlands, India, Colombia, Mexico, Brazil, Singapore, Japan, China and Australia, as well as 200+ global partners to help organizations tightly align their business and IT. Our office in Australia is located in Sydney, and of our 14 worldwide data centers, two are located locally: in Sydney and Melbourne. For more information, please visit manageengine.com.
OpenText Cybersecurity provides comprehensive security solutions that empower organizations to thrive and be resilient to cyber threats. Our market-leading OpenText Cybersecurity solutions help customers effectively reduce risk, preserve trust and minimize disruption. From prevention, detection, and response to recovery, investigation, a
OpenText Cybersecurity provides comprehensive security solutions that empower organizations to thrive and be resilient to cyber threats. Our market-leading OpenText Cybersecurity solutions help customers effectively reduce risk, preserve trust and minimize disruption. From prevention, detection, and response to recovery, investigation, and compliance, our unified platform helps organizations build cyber resilience via a holistic security portfolio.
Panorays is dedicated to eliminating third-party security risk so that companies worldwide can quickly and securely do business together. We automate, accelerate and scale customers’ vendor security evaluation and risk management process. With Panorays, our customers quickly and easily manage, mitigate and remediate supplier security, red
Panorays is dedicated to eliminating third-party security risk so that companies worldwide can quickly and securely do business together. We automate, accelerate and scale customers’ vendor security evaluation and risk management process. With Panorays, our customers quickly and easily manage, mitigate and remediate supplier security, reduce breaches, ensure vendor compliance and improve their security across the board, resulting in efficient and effective risk remediation in alignment with their security policies and risk appetite.
SailPoint is a leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Securit
SailPoint is a leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time—matching the scale, velocity, and environmental needs of today’s cloud-oriented enterprise. Our intelligent, autonomous, and integrated solutions put identity security at the core of digital business operations, enabling even the most complex organizations across the globe to build a security foundation capable of defending against today’s most pressing threats.
As Australia’s largest training provider, TAFE NSW is everywhere business is. For more than 130 years, TAFE NSW has been skilling the workforce of the future, offering flexible, tailorable accredited and non-accredited training courses to businesses of all sizes, across the Digital Information and Communications Technology industry. Train
As Australia’s largest training provider, TAFE NSW is everywhere business is. For more than 130 years, TAFE NSW has been skilling the workforce of the future, offering flexible, tailorable accredited and non-accredited training courses to businesses of all sizes, across the Digital Information and Communications Technology industry. Training programs are designed and delivered by an extensive network of qualified, specialist trainers and subject matter experts onsite, online or on campus.
Thales helps organizations move past silos of encryption and crypto management solutions to attain central and uniform deployments of data protection solutions and prepare your organization for the next security challenge and new compliance requirements at the lowest TCO. Our advanced data discovery, data encryption, key management, netwo
Thales helps organizations move past silos of encryption and crypto management solutions to attain central and uniform deployments of data protection solutions and prepare your organization for the next security challenge and new compliance requirements at the lowest TCO. Our advanced data discovery, data encryption, key management, network encryption, hardware security module and data protection on demand solutions enable customers to protect and remain in control of their data wherever it resides – across cloud, on-premises and hybrid IT environments.
As a recognized global cyber defender that stops cyber threats all day, every day – we enable our clients to conduct their business securely.
Trustwave detects threats that others can’t see, enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. We leverage our world-class team of security consu
As a recognized global cyber defender that stops cyber threats all day, every day – we enable our clients to conduct their business securely.
Trustwave detects threats that others can’t see, enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. We leverage our world-class team of security consultants, threat hunters and researchers, and our market-leading security operations platform to relentlessly identify and isolate threats with the right telemetry at the right time for the right response.
Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security. Our elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience in the age of advanced threats.
UpGuard is a cybersecurity platform that helps global organizations prevent data breaches, monitor third-party vendors, and improve their security posture. Using proprietary security ratings, world-class data leak detection capabilities, and powerful remediation workflows, we proactively identify security exposures for companies of all sizes.
Willyama Services is a 100% indigenous and veteran owned company, specialising in cyber security and ICT services. From cyber security assessments to industry uplift and advisory, training and awareness through to audit and compliance. Willyama in partnership with ISC2, AISA, Fifth Domain and IBM have developed a practical employment prog
Willyama Services is a 100% indigenous and veteran owned company, specialising in cyber security and ICT services. From cyber security assessments to industry uplift and advisory, training and awareness through to audit and compliance. Willyama in partnership with ISC2, AISA, Fifth Domain and IBM have developed a practical employment program to provide end-to-end career pathways. The Willyama Cyber Traineeship Program (WCTP) is a two-year employment program for individuals of indigenous and CALD backgrounds, veterans, women and those living in regional areas. The program will help uplift diversity in the cyber security workforce and fill workforce skills gaps the industry is currently experiencing.
Australian Information Security Association (AISA) Ltd
Level 8, 65 York Street, Sydney NSW 2000 | 02 8076 6012 | ABN: 18 171 935 959
Copyright © 2024 AISA Sec Days All Rights Reserved
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.