Cybersecurity Webinar

The Phish is in the Mail (Virtual)

Email continues to be a top vector of attack, with phishing and business email compromise (BEC) scams among the top payloads of email-based attacks. Email was designed to be open and accessible, which, unfortunately opens the door ... see more

Minimizing third party risk through effective identification, categorization, assessment and monitoring

With that in mind, Cyber Security Digital Summit: Third Party Risk Management APAC 2022 will be focused on: Identification: ensuring you are aware of all the third parties risks you are exposed to through effective asset discove ... see more

Counting the Costs of Cybercrime in Australia in 2021

This presentation provides an estimate of the cost of cybercrime in Australia in 2021. It focuses on ‘pure’ cybercrimes that involve unauthorised access to networks (hacking), modification of data and impairment of systems and des ... see more

Securing Cloud-as-Infrastructure (Virtual)

Digital transformation is driving more cloud usage and development towards the cloud, with Gartner estimating an 18.4% increase in spending on cloud infrastructures. As soon as this transformation started building steam, attacks a ... see more

Domino Effect in Security Breaches

Having your username and password stolen isn’t a big deal, right? Besides, why does it matter? There is nothing valuable in there anyway. However, do you realize how much valuable information these accounts have that could be u ... see more

Round Table Discussion: Data Privacy

The Live Events (Round Table Discussion Format) bring more meaningful communication and business networking to the table. Top level General Counsel, Head of Legal/IP Depts and Law firm Partners discuss the operational challenges f ... see more

Cyber-Attribution & Deterrence 2022

The past two years have seen a sharp rise in cyber-attacks aimed at the power grid with little corresponding increase in the rates of attribution and prosecution. As power grid operators continue to plough investment into cybersec ... see more

Back to Basics: Overcoming Uncertain Times with Security Fundamentals

As governments around the world call for increased cyber vigilance following the news of Russia’s invasion of Ukraine, the fundamentals of cybersecurity have never been more important. While prioritizing security can be a challeng ... see more

DHS CISA ICSJWG Spring Event 2022 (Virtual)

The Cybersecurity and Infrastructure Security Agency (CISA) hosts the Industrial Control Systems Joint Working Group (ICSJWG) to facilitate information sharing and reduce the risk to the nation’s industrial control systems. The I ... see more

XDR to the Rescue? How to Improve Detection and Response (Virtual)

Stealthy threats still evade detection. Attackers hide between security silos and disconnected solution alerts, while overwhelmed security analysts try to triage and investigate with narrow, disconnected attack viewpoints. eXtende ... see more
Upcoming Events