Put security at the core of corporate strategy
Now in its third year, CISO Perth 2024 is the annual gathering of WA’s most senior InfoSec decision makers. Covering everything from mitigation, response and recovery, GRC, cross-functional collaboration, leadership, to enabling business growth, be part of THE event that sets the cybersecurity agenda.
CISO Perth 2024 speakers
Karen Owens
Cybersecurity Coordinator, WA
AEMO
Mike Laytham
General Manager, Global Networks and Security
Commonwealth Bank
Robbie Whittome
CISO
Curtin University
Vito Forte
CIO
Edith Cowan University
Helen McLeish
Chief Cybersecurity Officer
East Metropolitan Health Service
Cecily Rawlinson
Director
WA Cyber Security Innovation Hub
Why should you attend?
Network with WA’s key cyber and info security decision makers over an action packed day
Make new contacts and reconnect with peers at Australia’s most senior cybersecurity meeting place
In-depth InfoSec strategy & cross-function collaboration
Benchmark your strategies with peers and learn how to get buy-in and collaboration in your projects across the board
Ask your burning InfoSec questions to 30+ speakers!
Let your voice be heard at our interactive sessions. Join the fun and bring discussions as we work towards solving common problems
Update your tech stack
Be inspired by those delivering change and serving the community through exciting new services at our one-stop amazing tech exhibition
Who should attend?
Decision makers and influencers in information and cyber security - from any organisation that puts security at the centre of strategic goals
What past attendees had to say about CISO Perth
"One of the great Cyber Security events that I attend for a long time and have leaned a lot and met lot of interesting personal. There is lot of to Cyber Security than choosing a product its the adaptation of that applications in your OT and IT environments is the challenging one. I think this CISO event have given me that understanding and looking forward to implementing few of the technologies that I came across during the conference in to our MSP services."
"The CISO Perth event was a great opportunity to safely reconnect with the local security fraternity in a way that was both engaging and meaningful. There were some fantastic shared stories, insightful presentations and truly worthwhile discussions, all of which provided tangible value to those in attendance. The CISO Perth event was no doubt a resounding success, and I look forward to participating again next year."
"I learned a lot from the presentations and had a better appreciation for the challenges we will face as a company keeping our environments secure."
"The CISO Perth event was a great way to learn industry trends, insights and network with fellow CISOs and interesting vendors. I would recommend any CISO or emerging CISO attend this event."
"CISO Perth was a very informative and friendly event with lots of interaction and networking opportunities amongst the participants, presenters, and vendors."
"Great conference, I really enjoyed the presentations and particularly the interactive sessions. Looking forward to the next one!"
"CISO Perth demonstrated intelligently gaps in cybersecurity. What was once a business expense is now a requirement for day-to-day operations."
"CISO Perth provided a valuable insight into the multi-faceted challenges organisations are facing in meeting cyberscurity threats head on. I came away with some great tips and resources and saw some impressive products from the vendors who presented."
Key themes & takeaways
|
Cyber Strategy: Discover what Western Australian CISOs are prioritising in 2024 and beyond |
|
Most Cyber Security Nation: Get support to be on track with the 2023-2030 Australian Cyber Security Strategy goals |
|
Cross-Functional Collaboration: Learn how to engage the board and get buy-in from IT and non-IT departments |
|
Cultural Change: Move beyond awareness and drive cultural change to gain company-wide support for your projects |
|
Close Gaps: Find out the latest mitigation, protection, and recovery strategies to uncover blind spots and recover data at scale |
Thanks to our 2024 Partners
Lead Partner
KnowBe4
KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.
The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available.
Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.
Visit website
Platinum Partners
Sonatype
The Sonatype journey started 15 years ago, just as the concept of “open source” software development was gaining steam. From our humble beginning as core contributors to Apache Maven, to supporting the world’s largest repository of open source components (Central), to distributing the world's most popular repository manager (Sonatype Nexus Repository), we’ve played a meaningful role in helping the world embrace the power of open innovation.Over time, we witnessed the staggering volume and variety of open source libraries that began flowing into every development environment in the world. We understood that when open source components are properly managed, they provide a tremendous energy for accelerating innovation. Conversely, when unmanaged, open source "gone wild" can lead directly to security vulnerabilities, licensing risks, enormous rework, and waste.
Our vision today is simple.
We are laser focused on helping organizations continuously harness all of the good that open source has to offer, without any of the risk. In order to do this, we have invested in knowing more about the quality of open source than anyone else in the world. This investment takes the form of machine learning, artificial intelligence, and human expertise, which in aggregate produces highly curated intelligence that is infused into every Sonatype product. Organizations equipped with Sonatype products make better decisions, innovate faster at scale, and rest comfortably knowing that their applications always consist of the highest quality open source components. Visit website
Cloudflare
Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company. It empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business.
Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. It is trusted by millions of organizations – from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe.
Gold Partners
Axonius
Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy. With solutions for both cyber asset attack surface management (CAASM) and SaaS management, Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically validate and enforce policies. Cited as one of the fastest-growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of assets, including devices and cloud assets, user accounts, and SaaS applications, for customers around the world
Visit websiteIllumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface.
The Illumio ZTS Platform visualizes all communication and traffic between workflows, devices, and the internet in one console, automatically sets granular segmentation policies to control unnecessary and unwanted communications and isolates high-value assets and compromised systems to proactively or reactively stop the spread of a breach.
ZTS is proven to help organizations of all sizes, from Fortune 100 to small business, stop breaches and ransomware in minutes, save millions in application downtime, and accelerate digital transformation projects.
Assume breach. Minimize impact. Increase resilience.
Skybox Security
Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. Our SaaS-based Exposure Management Platform delivers complete visibility, analytics, and automation to quickly map, prioritize and remediate vulnerabilities across your organization. The vendor-agnostic solution intelligently optimizes security policies, actions, and change processes across all corporate networks and cloud environments. With Skybox, security teams can now focus on the most strategic business initiatives while ensuring enterprises remain protected.
To know more, visit www.skyboxsecurity.com
Proofpoint
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 80 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com.
Visit websitePing Indentity
Ping Identity delivers unforgettable user experiences and uncompromising security. We are a single company that makes crafting digital experiences simple for any type of user—partners, customers, employees, and beyond. We are anti-lock-in. That means integrations with existing ecosystems, clouds, and on-prem technologies is simple. Out-of-the-box templates let businesses leverage our identity expertise to give their users frictionless experiences. Whether they’re building a foundation of modern digital identity, or out-innovating their competitors with cutting-edge services like digital credentials, AI-driven fraud prevention and governance, Ping is the one-stop shop for game-changing digital identity.
Visit websiteUpwind
Upwind is the runtime-powered cloud security platform that leverages runtime data to secure your cloud infrastructure. Upwind helps you mitigate the risks that actually matter, identify the root causes of threats in minutes and respond with context and automation.
Upwind protects everything you run in the cloud in one centralized platform, whose capabilities include CSPM, DSPM, CWPP, CDR, API security, vulnerability management, identity security and container security.
Silver Partners
The cybersecurity industry has an effectiveness problem.
Thousands of vendors in the market. Over US$130 billion spent annually on defence. And yet, the number of breaches continues to rise. If tools alone were enough to solve the problem, they would have by now. This is an operational problem that needs to be solved, and that’s what Arctic Wolf delivers.
Arctic Wolf is the market leader in security operations. Using the cloud-native Arctic Wolf Platform, we help organisations end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security experts work as an extension of internal teams to provide 24x7 monitoring, detection, and response, as well as ongoing risk management to proactively protect organisations while continually strengthening their security posture. Visit website
Perfekt
Established in 1998, Perfekt is a leading Australian IT Infrastructure, Managed Services, Hybrid Cloud, CyberSecurity and IoT provider to the Australian market.We help create digital transformations, through a highly client focused, integrated modernisation of their mainstream IT - providing digital solutions at scale to produce better business outcomes. Visit website
Zscaler
Zscaler accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centres globally, the SSE-based Zero Trust Exchange is the world’s largest in-line cloud security platform. Visit websiteZimperium
Zimperium enables companies to realize the full potential of mobile-powered business by activating a Mobile-First Security Strategy. Built for the demands of mobile business, Zimperium’s Mobile-First Security Platform™ delivers unmatched security across both applications and devices. Only Zimperium delivers autonomous mobile security that dynamically adapts to changing environments so companies can capitalize on the new world of mobile-powered opportunities, securely. For more information, visit www.Zimperium.com.
Visit websiteTerrabyte
YOUR TRUSTED GLOBAL PARTNER FOR LEADING NETWORK SECURITY, AUDIO-VISUAL, AND SMART TECH SOLUTIONS
At Terrabyte, we take pride in being your reliable international distributor, specializing in top-tier network security, cutting-edge audio-visual technologies, and innovative smart tech solutions. Our commitment lies in providing unparalleled quality and unmatched expertise to meet all your technological needs.
Visit websiteSasa Software
Founded in 2013, Sasa Software specializes in cyber security and is a leading provider of Content, Disarm, and Reconstruction (CDR) solutions. Gate Scanner® CDR is a proven award-winning technology, and is currently used by enterprises around the world, including governmental agencies, defense contractors, financial instructions, healthcare enterprises, and critical infrastructure organizations. The technology treats every incoming file and email as suspicious, and transforms them into safe, neutralized, and trustworthy copies, thus preventing advanced undetectable threats while maintaining full file visibility, usability, and functionality.
Gate Scanner® CDR was initially developed in 2010 at Plasan, the primary contractor for armored vehicles supporting the US troops in Afghanistan and Iraq, then spun off as an independent company to serve commercial opportunities.
At Sasa Software, we strive for excellence, and develop unique, creative, and innovative software solutions that protect companies and organizations in all industries, anywhere in the world.
Sasa Software was named Critical Infrastructures Security Vendor of the Year by Frost and Sullivan.
Okta
The best security has Identity at the heart. Okta can help you protect against identity-based threats, accelerate adoption of any technology, deploy phishing-resistant passwordless authentication, build your foundation for Zero Trust and benefit from simplified, integrated Identity Governance.
Visit websiteCythera
Cythera is a sovereign specialist cyber security company who have developed a comprehensive portfolio of security services, which deliver ongoing protection from common and emerging cyber threats.Cythera’s suite of cloud delivered cyber security solutions are underpinned by market leading technologies at an affordable price. Our culture of innovation and personalisation has resulted in long term engagements with our customers and an extremely high retention rate with our managed security services. Our deep domain expertise with our technology partners was recognised by Crowdstrike and Rapid7 as Partners of the Year in 2023. This recognition has supported our continued growth in Perth.
Cythera also offers specialist consulting services that vary from Cyber Maturity Assessments, Data Risk assessments and Penetration Testing through to vCISO engagements and Incident Response Services. Visit website
Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world. Visit infoblox.com, or follow us on LinkedIn or Twitter.
Visit websiteHashiCorp
At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud. Our suite of multi-cloud infrastructure automation products — all with open source projects at their core — underpin the most important applications for the largest enterprises in the world. As part of the once-in-a-generation shift to the cloud, organizations of all sizes, from well-known brands to ambitious start-ups, rely on our solutions to provision, secure, connect, and run their business-critical applications so they can deliver essential services, communications tools, and entertainment platforms worldwide. Visit websiteVersent
Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services. We take a customer first, outcomes driven approach. Our solutions are centred around the best of breed public cloud technology. From a stand-still start in 2014, we have grown to a tight team of over 600 family members both locally and internationally, with a diversified offering in professional services and managed services. With a focus on bringing craftsmanship back to technology, Versent built a team of passionate technologists who truly care about achieving quality outcomes, building lasting relationships and delivering on what we promise. As Australia’s most experienced and trusted partner, Versent has considerable experience in both successfully delivering digital projects and providing managed services support. Visit websiteExabeam
Exabeam is a global cybersecurity leader that delivers AI-driven security operations. The company was the first to put AI and machine learning in its products to deliver behavioral analytics on top of security information and event management (SIEM). Today, the Exabeam Security Operations Platform includes cloud-scale security log management and SIEM, powerful behavioral analytics, and automated threat detection, investigation and response (TDIR). Its cloud-native product portfolio helps organizations detect threats, defend against cyberattacks, and defeat adversaries. Exabeam learns normal behavior and automatically detects risky or suspicious activity so security teams can take action for faster, more complete response and repeatable security outcomes.Detect. Defend. Defeat.™ Learn how at www.exabeam.com. Visit website
Coffee Cart Partners
Arctic Wolf
Why Arctic Wolf?
The cybersecurity industry has an effectiveness problem.
Thousands of vendors in the market. Over US$130 billion spent annually on defence. And yet, the number of breaches continues to rise. If tools alone were enough to solve the problem, they would have by now. This is an operational problem that needs to be solved, and that’s what Arctic Wolf delivers.
Arctic Wolf is the market leader in security operations. Using the cloud-native Arctic Wolf Platform, we help organisations end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security experts work as an extension of internal teams to provide 24x7 monitoring, detection, and response, as well as ongoing risk management to proactively protect organisations while continually strengthening their security posture.
Perfekt
Established in 1998, Perfekt is a leading Australian IT Infrastructure, Managed Services, Hybrid Cloud, CyberSecurity and IoT provider to the Australian market.We help create digital transformations, through a highly client focused, integrated modernisation of their mainstream IT - providing digital solutions at scale to produce better business outcomes. Visit website
VIP Luncheon Partner
KnowBe4
KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.
The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available.
Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.
Visit website
Exclusive Networking Drinks Partner
Cythera
Cythera is a sovereign specialist cyber security company who have developed a comprehensive portfolio of security services, which deliver ongoing protection from common and emerging cyber threats.Cythera’s suite of cloud delivered cyber security solutions are underpinned by market leading technologies at an affordable price. Our culture of innovation and personalisation has resulted in long term engagements with our customers and an extremely high retention rate with our managed security services. Our deep domain expertise with our technology partners was recognised by Crowdstrike and Rapid7 as Partners of the Year in 2023. This recognition has supported our continued growth in Perth.
Cythera also offers specialist consulting services that vary from Cyber Maturity Assessments, Data Risk assessments and Penetration Testing through to vCISO engagements and Incident Response Services. Visit website
Media Partners
U.Today
U.Today is a global independent media organization dedicated to helping you understand the new generation tech and the future it brings to society.Our mission is to serve the emerging community of enthusiasts, professionals and newcomers who explore, use and develop the tech by heeding the core journalistic values of clear thinking, accuracy and independence. We seek to inform, educate, collaborate and support better practices for the benefit of all. Visit websiteConference Director
Michelle Ribeiro
Conference Director
Our events are all carefully created from scratch. The whole process from research to post-production is crafted by our team, so we are always available to assist with any queries! We look forward to meeting you at the event!