Sponsors


Thank you to all our 2022 sponsors. Click on the logos to learn more about each organisation.

Gold Stand

Fortinet logo
Fortinet secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding att...
Fortinet logo

Fortinet

Fortinet secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.
Palo Alto Networks logo
Palo Alto Networks provides the most comprehensive set of integrated solutions to secure your users, applications, data, devices, and networks no matter where they are. Today, our future-proof portfol...
Palo Alto Networks logo

Palo Alto Networks

Palo Alto Networks provides the most comprehensive set of integrated solutions to secure your users, applications, data, devices, and networks no matter where they are.

Today, our future-proof portfolio of solutions include:

  • PRISMA™ ACCESS the most comprehensive SASE solution of its kind, with cloud-delivered secure access that protects users and applications, and controls data for remote users and locations.
  • PRISMA™ SD-WAN which provides all the networking services that an enterprise environment needs - from the branch to the edge - by removing the need for locally deployed networking and security point products. PRISMA™ CLOUD secures any cloud environment used to build and run cloud native applications, including multi- and hybrid-clouds environments. Prisma Cloud addresses cloud security use cases such as CSPM, containers, serverless, and identity-based microsegmentation.
  • CORTEX™ XSOAR enables security teams to ingest alerts from multiple sources, including third party sources, and executes standardised, automated playbooks for accelerated incident response.
  • CORTEX XDR™ aggregates data across your infrastructure, applying machine learning behavioural analytics to profile endpoint, network, and user behaviour to automatically detect attacks and quickly stop them from spreading.
  • ML-POWERED NGFWS are industry leading, leveraging machine learning for proactive real-time and inline zero-day protection with flexible consumption choices—hardware, software, containerised, and cloud-delivered—to keep campuses, data centres, uCPE and private, hybrid and public cloud environments covered.
  • CLOUD-DELIVERED SECURITY SERVICES give our customers the most advanced range of prevention against exploits, malware, web-based threats, insider threats, data loss, and applications.
Sekuro Operations Pty Ltd logo
Sekuro is a global cyber security and digital resiliency business. We provide end-to-end cyber security that enables some of the world’s leading businesses to securely embark upon and evolve their dig...
Sekuro Operations Pty Ltd logo

Sekuro Operations Pty Ltd

Sekuro is a global cyber security and digital resiliency business. We provide end-to-end cyber security that enables some of the world’s leading businesses to securely embark upon and evolve their digital transformation journeys. Using our three Centres of Excellence: Governance, Risk and Compliance, Technology Platforms and Engineering, and Offensive Security, via a managed, co-managed, or as-a-service, Sekuro ensures continued compliance and digital resilience. We look beyond the threat landscape of today and think differently about the security challenges of tomorrow.

Founded in Australia in 2021, Sekuro employs 120 staff across seven offices in Australia, New Zealand, Singapore and Malaysia. To find out more visit: https://sekuro.io/

NSW Cyber Business Exchange logo
"The NSW Cyber Business Exchange Program is a business program that helps cyber businesses to grow in NSW. The Program brings together businesses across multiple sectors, to foster collaboration and c...
NSW Cyber Business Exchange logo

NSW Cyber Business Exchange

"The NSW Cyber Business Exchange Program is a business program that helps cyber businesses to grow in NSW.

The Program brings together businesses across multiple sectors, to foster collaboration and communication between different sectors, to ensure all parties are sharing knowledge and increasing their cyber capabilities, as well as market opportunities for NSW cyber businesses. The Program includes a range of industry support initiatives including networking events, focus groups, ‘meet an expert’ round tables and mentoring.

Delivered in partnership between the Australian Information Security Association (AISA) and the NSW Cyber Hub, Investment NSW, the Program aims to expand the NSW cyber security ecosystem. "

LastPass logo
Protect every level of your organisation, with the access solution that you and your employees will love: LastPass Business. LastPass simplifies access management for companies of every size, with the...
LastPass logo

LastPass

Protect every level of your organisation, with the access solution that you and your employees will love: LastPass Business.

LastPass simplifies access management for companies of every size, with the tools your entire organisation needs to secure your business and centralise control of employee passwords and apps. In addition to the increased security provided by our cloud-based password vaulting and single sign-on solution, LastPass increases employee productivity by removing the time lost in password resets. LastPass Business includes a cloud-based administrative console for the management and oversight of the program, allowing you to enforce policies, track usage through detailed reports and take control of employee access. Join the more than 100,000 businesses worldwide who use LastPass Business to create, enforce, and measure a meaningful access management policy.  

Visit www.lastpass.com to start your free trial today.

Silver Stand

Okta logo
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organisations to securely connect the right people to the right technologies at the right time....
Okta logo

Okta

Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organisations to securely connect the right people to the right technologies at the right time. With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 10,000 organisations, including Beach Energy, JetBlue, Nordstrom, Takeda Pharmaceutical, Teach for America, T-Mobile and Twilio, trust Okta to help protect the identities of their workforces and customers. Learn more at https://www.okta.com/
Carbonite and Webroot logo
Carbonite and Webroot, OpenText companies, harness the cloud and artificial intelligence to provide comprehensive cyber resilience solutions for businesses, individuals, and managed service providers....
Carbonite and Webroot logo

Carbonite and Webroot

Carbonite and Webroot, OpenText companies, harness the cloud and artificial intelligence to provide comprehensive cyber resilience solutions for businesses, individuals, and managed service providers. Cyber resilience means being able to stay up and running, even in the face of cyberattacks and data loss. That’s why we’ve combined forces to provide endpoint protection, network protection, security awareness training, and data backup and disaster recovery solutions, as well as threat intelligence services used by market leading technology providers worldwide. Leveraging the power of machine learning to protect millions of businesses and individuals, we secure the connected world. Carbonite and Webroot operate globally across North America, Europe, Australia, and Asia. Discover cyber resilience at carbonite.com and webroot.com.
Digital Shadows logo
Digital Shadows provides threat intelligence that delivers for every security team. Our platform was built with today’s overloaded security analyst at heart, who demanded a more relevant and actionabl...
Digital Shadows logo

Digital Shadows

Digital Shadows provides threat intelligence that delivers for every security team. Our platform was built with today’s overloaded security analyst at heart, who demanded a more relevant and actionable approach to threat intelligence. SearchLight focuses on digital risks that organizations care about, using a proven threat model that adapts to the organization risk profile and appetite. This approach delivers the least noise of any solution on the market, allowing security teams to work faster and with less resources than ever before. To sign up for our free weekly threat intel digest or learn more about our platform, visit www.digitalshadows.com.

Malwarebytes logo
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes comple...
Malwarebytes logo

Malwarebytes

Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions.

Malwarebytes completely replaces antivirus with artificial intelligence-powered technology that stops cyberattacks before they can compromise home computers and business endpoints.

Malwarebytes’ comprehensive protection catches increasingly sophisticated threats by monitoring and analyzing behavior, where many traditional solutions fall short by focusing on file-basedmalware and signature tracking for established threats.

Further differentiating from standard security solutions, Malwarebytes allows devices attacked by ransomware to rollback up to three days to restore conditions prior to the attack.

Learn More: www.malwarebytes.com

Email us: This email address is being protected from spambots. You need JavaScript enabled to view it.

Attivo Networks logo
Attivo Networks, the leader in preventing identity privilege escalation and detecting lateral movement attacks, delivers a superior defense for countering threat activity. Asset Defense - Network-base...
Attivo Networks logo

Attivo Networks

Attivo Networks, the leader in preventing identity privilege escalation and detecting lateral movement attacks, delivers a superior defense for countering threat activity.

  • Asset Defense - Network-based post-compromise detection and engagement to misdirect attackers and collect adversary intelligence.
  • Endpoint Defense - Endpoint protection suite to restrict discovery, lateral movement, and privilege escalation.
  • Active Directory Protection .
  • A standalone solution to efficiently conceal real objects and return fake information when attackers query AD.

Attivo has won over 150 awards for its technology innovation and leadership.

Saviynt logo
Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity gove...
Saviynt logo

Saviynt

Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience. The world’s largest brands trust Saviynt to accelerate digital transformation, empower distributed workforces, and meet continuous compliance, including BP, Western Digital, Mass Mutual, and Koch Industries. For more information, please visit saviynt.com. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the United States and/or other countries.

Rapid7 logo
Organisations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the compl...
Rapid7 logo

Rapid7

Organisations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Learn more at www.rapid7.com.
Illumio logo
Illumio enables organizations to realize a future without high-profile breaches by preventing the lateral movement of attackers across any organization. Founded on the principle of Zero Trust in 2013,...
Illumio logo

Illumio

Illumio enables organizations to realize a future without high-profile breaches by preventing the lateral movement of attackers across any organization. Founded on the principle of Zero Trust in 2013, Illumio provides visibility and segmentation for endpoints, data centers and clouds. The world’s leading organizations, including Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite and hundreds of others, trust Illumio to reduce cyber risk. For more information, visit https://www.illumio.com/what-we-do and engage us on LinkedIn and Twitter.
Lookout Australia Holdings Pty Ltd logo
Lookout is an integrated endpoint-to-cloud security company. Our mission is to secure and empower our digital future in a privacy-focused world where mobility and cloud are essential to all we do for...
Lookout Australia Holdings Pty Ltd logo

Lookout Australia Holdings Pty Ltd

Lookout is an integrated endpoint-to-cloud security company. Our mission is to secure and empower our digital future in a privacy-focused world where mobility and cloud are essential to all we do for work and play. We enable consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust. Lookout is trusted by millions of consumers, the largest enterprises and government agencies, and partners such as AT&T, Verizon, Vodafone, Microsoft, Google, and Apple. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C. To learn more, visit www.lookout.com and follow Lookout on its blog, LinkedIn, and Twitter.
Netskope logo
Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data. The Netskope Intelligent Security Service Ed...
Netskope logo

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data. The Netskope Intelligent Security Service Edge (SSE) platform is fast, easy to use, and secures people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.

CyCognito logo
CyCognito was founded by offensive security experts whose deep understanding of attacker techniques led them to create a totally new approach to risk assessment. Our mission is to help organizations i...
CyCognito logo

CyCognito

CyCognito was founded by offensive security experts whose deep understanding of attacker techniques led them to create a totally new approach to risk assessment. Our mission is to help organizations identify and eliminate critical security risks that are often unknown to them — the attackers’ paths of least resistance. The CyCognito platform is an external attack surface management solution that fills a fundamental security gap that has widened dramatically as organizations adopt fluid IT ecosystems that span on-premises, cloud, partner and subsidiary environments. CyCognito addresses this gap with a category-defining, attack surface security platform that automates offensive cybersecurity operations to provide reconnaissance capabilities superior to those of attackers.

Bronze Stand

Dragos logo
Dragos has a global mission: to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The practitioners who founded Dragos were drawn to this missio...
Dragos logo

Dragos

Dragos has a global mission: to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The practitioners who founded Dragos were drawn to this mission through decades of government and private sector experience.

Dragos codifies the knowledge of our cybersecurity experts into an integrated software platform that provides customers critical visibility into ICS and OT networks so that threats are identified and can be addressed before they become significant events. Our solutions protect organizations across a range of industries including electric, oil and gas, manufacturing, and mining, and protect mission critical networks including ICS/OT and emerging applications such as the Industrial Internet of Things (IIOT).

Dragos is privately held and headquartered in the Washington, DC area with regional presence around the world, including Canada, Australia, New Zealand, Europe, and the Middle East.

Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Fut...

Recorded Future

Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable. In a world of ever-increasing chaos and uncertainty, Recorded Future empowers organizations with the visibility they need to identify and detect threats faster; take proactive action to disrupt adversaries; and protect their people, systems, and assets, so business can be conducted with confidence. Recorded Future is trusted by more than 1,000 businesses and government organizations around the world. Learn more at www.recordedfuture.com and follow us on Twitter at @RecordedFuture.
One Identity logo
One Identity, a Quest Software business, helps organizations establish an identity-centric security strategy. With a unique identity and access management (IAM) portfolio, our award-winning offering i...
One Identity logo

One Identity

One Identity, a Quest Software business, helps organizations establish an identity-centric security strategy. With a unique identity and access management (IAM) portfolio, our award-winning offering includes identity governance, AD-centered IAM, privileged access management and identity SaaS solutions, One Identity helps organizations secure their enterprise end to end, smoothly make their digital transformation, eliminate identity challenges and reduce their attack surface from internal and external threats. Our unequalled commitment to our customers’ long-term IAM success is evident in our 7,500 customers worldwide that rely on us to manage more than 125 million identities. For more information, visit www.oneidentity.com.

InfoTrust is a cybersecurity platform provider that combines next-gen security controls, with the InfoTrust “Connective Tissue”, a customer success, analytics, and response service. This ensures your...

InfoTrust

InfoTrust is a cybersecurity platform provider that combines next-gen security controls, with the InfoTrust “Connective Tissue”, a customer success, analytics, and response service. This ensures your security controls remain optimally configured and well managed. Collectively, this approach creates secure and more productive clients. InfoTrust seeks to establish a trusted security partner status with its clients, with the goal of supporting the customers’ security journey, maturing their posture over time, protecting and mitigating against the risks associated with cybercrime.
Today’s enterprises depend on the cloud, data and software to make decisive decisions. That’s why the most respected brands and largest organisations in the world rely on Thales Cloud Protection & Lic...

Thales

Today’s enterprises depend on the cloud, data and software to make decisive decisions. That’s why the most respected brands and largest organisations in the world rely on Thales Cloud Protection & Licensing to help them protect their most sensitive information and software wherever it is created, accessed or stored – from the cloud and data centres to devices and across networks. As the global leader in cloud and data protection, our solutions enable organisations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in the devices and services used by millions of consumers every day
Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Our solutions have been recognized by Gartner, IDC, Forrester Re...

Radware

Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Our solutions have been recognized by Gartner, IDC, Forrester Research and Frost & Sullivan for helping leading organizations protect sensitive data, build trust and loyalty with consumers, and grow their businesses by creating a secure climate for customers.

Radware’s portfolio of data center, cloud and application protection solutions include DDoS Protection, SSL Attacks Protection, Web Application Firewall (WAF), Bot Manager and API Protection, all offered as cloud services, on-premises or hybrid solutions. Radware provides one of the most comprehensive, advanced, single-vendor integrated application and network security solution for companies worldwide to protect their services & applications across any environment. For more information, please visit www.radware.com.

Progress provides the best products to secure, analyse, and integrate your applications, network, and processes. More than 100,000 enterprise customers accelerate the creation and delivery of strategi...

Progress Software

Progress provides the best products to secure, analyse, and integrate your applications, network, and processes. More than 100,000 enterprise customers accelerate the creation and delivery of strategic business applications, automate application configuration, and make critical data and content more accessible and secure with Progress.

For more information about Progress, please visit https://www.progress.com

DDLS logo
DDLS is Australia’s largest provider of corporate IT and process training, with the largest portfolio of strategic partners and courses in Australia. We partner with world-class companies to help orga...
DDLS logo

DDLS

DDLS is Australia’s largest provider of corporate IT and process training, with the largest portfolio of strategic partners and courses in Australia. We partner with world-class companies to help organisations and individuals in the IT industry remain up-to-date with new processes, technology and platforms to reduce risk and enable efficient business practices. We have convenient locations in almost every capital in Australia as well as the Philippines, flexible delivery modalities, industry-accredited trainers, and state-of-the-art course material and labs to produce the highest quality learning outcomes for our clients. DDLS promotes a balanced approach to training with a focus on the key areas of Technology, Process and People. We provide extensive training options tailored to your organisation’s needs – from vendor-certified courses to customised training, including bespoke in-house developed courses.
BeyondTrust Software logo
BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organisations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-f...
BeyondTrust Software logo

BeyondTrust

BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organisations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry's most advanced privileged access management (PAM) solution, enabling organisations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

BeyondTrust protects all privileged identities, access, and endpoints across your IT environment from security threats, while creating a superior user experience and operational efficiencies. With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 75 of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com

Synopsys Software Integrity Group logo
Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition a...
Synopsys Software Integrity Group logo

Synopsys Software Integrity Group

Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.
RSA logo
NetWitness, an RSA® Business, provides comprehensive and highly scalable threat detection and response capabilities for organizations around the world. The NetWitness Platform delivers complete visibi...
RSA logo

RSA

NetWitness, an RSA® Business, provides comprehensive and highly scalable threat detection and response capabilities for organizations around the world. The NetWitness Platform delivers complete visibility combined with applied threat intelligence and user behavior analytics to detect, prioritize, investigate threats, and automate response. This empowers security analysts to be more efficient and stay ahead of business-impacting threats. For more information, go to netwitness.com.

About RSA

RSA, a leader in cybersecurity and risk management solutions, provides organizations with technology to address challenges across security, risk management and fraud prevention in the digital era. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user access control; and reduce operational risk, fraud and cybercrime. RSA protects millions of users around the world and helps more than 90 percent of the Fortune 500 companies thrive and continuously adapt to transformational change.

ManageEngine logo
ManageEngine is the enterprise IT management division of Zoho Corporation. Established and emerging enterprises–including 9 of every 10 Fortune 100 organizations - rely on our real-time IT management...
ManageEngine logo

Zoho Corporation (ManageEngine)

ManageEngine is the enterprise IT management division of Zoho Corporation. Established and emerging enterprises–including 9 of every 10 Fortune 100 organizations - rely on our real-time IT management tools to ensure optimal performance of their IT infrastructure, including networks, servers, applications, desktops, and more. We have offices worldwide, including the United States, the Netherlands, India, Singapore, Japan, China, and Australia as well as a network of 200+ global partners to help organizations tightly align their businesses and IT.

For more information, please visit http://www.manageengine.com, follow the company blog at blogs.manageengine.com, on LinkedIn at https://www.linkedin.com/company/manageengine/, on Facebook at https://www.facebook.com/ManageEngine/ and on Twitter at https://twitter.com/manageengine

Cydarm Logo
Founded in Australia in 2017, Cydarm Technologies was one of the first graduates of CyRise, Australia’s cyber security start-up accelerator. Our mission is to enable cyber resilience through better an...
Cydarm Logo

Cydarm

Founded in Australia in 2017, Cydarm Technologies was one of the first graduates of CyRise, Australia’s cyber security start-up accelerator. Our mission is to enable cyber resilience through better and faster security operations. The Cydarm platform provides security case management for cyber incident response. Cydarm supports best practice in incident response, with streamlined workflows, response playbooks, metrics and reporting, integration, and orchestration.
UpGuard Logo
UpGuard provides cybersecurity risk management software that helps global organizations prevent data breaches by continuously monitoring their third-party vendors and their security posture.Using prop...
UpGuard Logo

UpGuard

UpGuard provides cybersecurity risk management software that helps global organizations prevent data breaches by continuously monitoring their third-party vendors and their security posture.Using proprietary security ratings, world-class data leak detection capabilities, and powerful remediation workflows, we proactively identify security exposures for companies of all sizes.Learn more at www.upguard.com and follow us on LinkedIn.
FraudWatch logo
FraudWatch is a leader in Digital Brand Protection industry. Founded in 2003, FraudWatch is a privately owned Internet Security company and is headquartered in Melbourne, Australia, with offices in Sa...
FraudWatch logo

FraudWatch

FraudWatch is a leader in Digital Brand Protection industry. Founded in 2003, FraudWatch is a privately owned Internet Security company and is headquartered in Melbourne, Australia, with offices in San Francisco, Dubai and London. FraudWatch services over 4000 brands in over 60 countries.

FraudWatch Digital Brand Protection Services protect client brands online from threats including Phishing, Malware, Online Brand Impersonation, Social Media Impersonation and Unauthorised Mobile Apps.

Each month, FraudWatch takes down thousands of phishing sites, Malware sites (command & control, credential drop sites, drive by download), fake Domains, Social Media Profiles and fake Mobile Apps. We provide the best site take down times in the industry, backed with financial penalty SLA’s.

Our mission is to deliver expert, innovative solutions to protect and defend our client’s online brands, reputation and financial losses from online fraud and abuse and to make the Internet a safer place.

Coffee Cart

CSC is the trusted provider of choice for the Forbes Global 2000 and the 100 Best Global Brands® in enterprise domain names, domain name system (DNS), digital certificate management, as well as digita...

CSC

CSC is the trusted provider of choice for the Forbes Global 2000 and the 100 Best Global Brands® in enterprise domain names, domain name system (DNS), digital certificate management, as well as digital brand and fraud protection. As global companies make significant investments in their security posture, CSC can help them understand known security blind spots that exist and help them secure their digital assets. By leveraging CSC’s proprietary solutions, companies can get secure to protect against cyber threats to their online assets, helping them avoid devastating revenue loss, brand reputation damage, or significant financial penalties because of policies like the General Data Protection Regulation (GDPR). CSC also provides online brand protection—the combination of online brand monitoring and enforcement activities—taking a holistic approach to digital asset protection, along with fraud protection services to combat phishing. Headquartered in Wilmington, Delaware, USA, since 1899, CSC has offices throughout the United States, Canada, Europe, and the Asia-Pacific region. CSC is a global company capable of doing business wherever our clients are—and we accomplish that by employing experts in every business we serve. Visit cscdbs.com.
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organisations to securely connect the right people to the right technologies at the right time....

Okta

Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organisations to securely connect the right people to the right technologies at the right time. With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 10,000 organisations, including Beach Energy, JetBlue, Nordstrom, Takeda Pharmaceutical, Teach for America, T-Mobile and Twilio, trust Okta to help protect the identities of their workforces and customers. Learn more at https://www.okta.com/

BeyondTrust Software logo
BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organisations to secure and manage their entire universe of privileges. Our integrated products and platform offer...
BeyondTrust Software logo

BeyondTrust Software

BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organisations to secure and manage their entire universe of privileges. Our integrated products and platform offer the industry's most advanced PAM solution, enabling organisations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organisations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance. Our products enable the right level of privileges for just the time needed, creating a frictionless experience for users that enhances productivity.

With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 70 percent of the Fortune 500, and a global partner network. Learn more at www.beyondtrust.com.

Networking Drinks

3Columns logo
3Columns is a cyber security consulting company which inherits a unique business model. We not only provide end-to-end cybersecurity services but also professional and managed services to ensure cyber...
3Columns logo

3Columns

3Columns is a cyber security consulting company which inherits a unique business model. We not only provide end-to-end cybersecurity services but also professional and managed services to ensure cyber security is embedded at the core of your infrastructure. Specialising in the full spectrum ensures that our customers experience a one stop shop and a fully actionable strategic roadmap can be created to deliver your business outcomes. Ultimately this approach allows more secure and confident clients who can continue to grow whilst staying protected from the changing cyber threat landscape.

Juice Bar

One Identity logo
One Identity, a Quest Software business, helps organizations establish an identity-centric security strategy. With a unique identity and access management (IAM) portfolio, our award-winning offering i...
One Identity logo

One Identity

One Identity, a Quest Software business, helps organizations establish an identity-centric security strategy. With a unique identity and access management (IAM) portfolio, our award-winning offering includes identity governance, AD-centered IAM, privileged access management and identity SaaS solutions, One Identity helps organizations secure their enterprise end to end, smoothly make their digital transformation, eliminate identity challenges and reduce their attack surface from internal and external threats. Our unequalled commitment to our customers’ long-term IAM success is evident in our 7,500 customers worldwide that rely on us to manage more than 125 million identities. For more information, visit www.oneidentity.com.

Lanyard

Sekuro is a global cyber security and digital resiliency business. We provide end-to-end cyber security that enables some of the world’s leading businesses to securely embark upon and evolve their dig...

Sekuro Operations Pty Ltd

Sekuro is a global cyber security and digital resiliency business. We provide end-to-end cyber security that enables some of the world’s leading businesses to securely embark upon and evolve their digital transformation journeys. Using our three Centres of Excellence: Governance, Risk and Compliance, Technology Platforms and Engineering, and Offensive Security, via a managed, co-managed, or as-a-service, Sekuro ensures continued compliance and digital resilience. We look beyond the threat landscape of today and think differently about the security challenges of tomorrow.

Founded in Australia in 2021, Sekuro employs 120 staff across seven offices in Australia, New Zealand, Singapore and Malaysia. To find out more visit: https://sekuro.io/

© Cybercon Connect. All rights reserved.
Site by George.