Skip to main content

Sponsors

Thank you to all our 2023 sponsors.
Click on the logos to learn more about each organisation.

Sapphire Stand

Threatlocker
Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration...
Threatlocker

Threatlocker

Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions.

Palo Alto Networks logo
At Palo Alto Networks, the global cybersecurity leader, our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We have the most comprehensive set of best-of-bree...
Palo Alto Networks logo

Palo Alto Networks

At Palo Alto Networks, the global cybersecurity leader, our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We have the most comprehensive set of best-of-breed, integrated platforms available today, to drive your cybersecurity transformation strategy:

CORTEX™ - Automate Security Operation and empower SecOps with automation-driven, real-time detection, investigation, and response, with Cortex XSIAM, XDR, XSOAR and Xpanse.

PRISMA™ SASE - Secure hybrid workforces by leveraging the power of AI/ML to connect and secure all your users, on all devices, accessing any apps.

PRISMA™ CLOUD - Secure any cloud with comprehensive cloud native security across the full application lifecycle on AWS, GCP, Azure, Oracle and Alibaba.

UNIT 42™ - Stop next-gen threats with incident response, threat intelligence and security consulting from trusted advisors who can defend your business.

STRATA™ - Secure the data center to the edge, with our Strata NGFWs and stop evasive threats in real time, with ML-powered network security innovations.

www.paloaltonetworks.com

Diamond Stand

Microsoft
At Microsoft our mission is to empower every person and every organisation on the planet to achieve more. Woven throughout daily life, whether it be work or play, Microsoft technologies enable million...
Microsoft

Microsoft

At Microsoft our mission is to empower every person and every organisation on the planet to achieve more.

Woven throughout daily life, whether it be work or play, Microsoft technologies enable millions of Australian partners and customers to innovate in new ways. Our platforms harmonise the interests of our customers, developers and IT better than any competing ecosystem or platform.

Microsoft is driven to help anyone make the most of any moment – to help create a world where people can make the most of their time and to lead more fulfilling lives.

Victorian Government
The Victorian Government is firmly focused on driving a strong and resilient economy that benefits all Victorians – by creating more opportunities for people through jobs and skills; supporting busine...
Victorian Government

Victorian Government

The Victorian Government is firmly focused on driving a strong and resilient economy that benefits all Victorians – by creating more opportunities for people through jobs and skills; supporting businesses and industries to grow and prosper; and building vibrant communities and regions. The Victorian Government’s commitment to a thriving digital economy includes supporting the state’s vibrant local cyber economy.

Platinum Stand

BeyondTrust
BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organisations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-f...
BeyondTrust

BeyondTrust

BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organisations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry's most advanced privileged access management (PAM) solution, enabling organisations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

BeyondTrust protects all privileged identities, access, and endpoints across your IT environment from security threats, while creating a superior user experience and operational efficiencies. With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 75 of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com.

NTT Group
About NTT Ltd. As part of NTT DATA, a USD 30 billion IT services provider, NTT Ltd. is a leading IT infrastructure and services company serving 65% of the Fortune Global 500 and more than 75% of the F...
NTT Group

NTT Group

About NTT Ltd.

As part of NTT DATA, a USD 30 billion IT services provider, NTT Ltd. is a leading IT infrastructure and services company serving 65% of the Fortune Global 500 and more than 75% of the Fortune Global 100. We lay the foundation for organizations’ edge-to-cloud networking ecosystem, simplify the complexity of their workloads across multicloud environments, and innovate at the edge of their IT environments where networks, cloud and applications converge. We offer tailored infrastructure and ensure consistent best practices in design and operations across all of our secure, scalable and customizable data centers. On the journey towards a software-defined future, we support organizations with our platform-delivered infrastructure services. We enable a connected future. Visit us at services.global.ntt

Sophos
Sophos delivers superior cybersecurity outcomes by providing cybersecurity as a service to protect companies of all sizes from the most advanced cyberthreats. Our cybersecurity products and services i...
Sophos

Sophos

Sophos delivers superior cybersecurity outcomes by providing cybersecurity as a service to protect companies of all sizes from the most advanced cyberthreats. Our cybersecurity products and services include managed detection and response (MDR), firewall, email, endpoint (XDR), and cloud native security protection. Sophos products and services defend against ransomware, phishing, malware, and more. They connect through?the?cloud-based Sophos Central management console and are powered by?Sophos X-Ops, our cross-domain threat intelligence unit. We provide fully managed security solutions so you can manage your cybersecurity directly with our security operations platform. Or, you can supplement your in-house team with Sophos' products and services.

SentinelOne logo
SentinelOne is a leader in autonomous cybersecurity. SentinelOne’s Singularity™ Platform detects, prevents, and responds to cyber attacks at machine speed, empowering organisations to secure endpoints...
SentinelOne logo

SentinelOne

SentinelOne is a leader in autonomous cybersecurity. SentinelOne’s Singularity™ Platform detects, prevents, and responds to cyber attacks at machine speed, empowering organisations to secure endpoints, cloud workloads, containers, identities, and mobile and network-connected devices with speed, accuracy and simplicity. Over 10,000 customers, including Fortune 10, Fortune 500, and Global 2000 companies, as well as prominent governments, trust SentinelOne to secure the future today. To learn more, visit www.sentinelone.com

Orro logo
Orro is a leading Australian technology partner with deep expertise in cyber security and the design, construction and operation of secure networks and digital infrastructure. Through consultation wit...
Orro logo

Orro

Orro is a leading Australian technology partner with deep expertise in cyber security and the design, construction and operation of secure networks and digital infrastructure.

Through consultation with our clients, we deliver outcome-led technology solutions that enable their businesses, and the people that power them, to remain productive and secure.

With a comprehensive suite of services, spanning network, cloud, collaboration, and cyber security, we’re working with some of Australia’s biggest brands, building their digital maturity – providing greater security, resilience, performance, and efficiency – to deliver them a secure future.

The future feels like this. Orro – Security Connected Everything.

Learn more at www.orro.group

Proofpoint logo
Proofpoint is a leading cybersecurity and compliance company that protects organisations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint...
Proofpoint logo

Proofpoint

Proofpoint is a leading cybersecurity and compliance company that protects organisations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks.

Netpoleon logo
Originally founded in 2000, Netpoleon Group has become a leading provider of integrated security, networking solutions and value added services throughout the APAC region.Working closely with major an...
Netpoleon logo

Netpoleon

Originally founded in 2000, Netpoleon Group has become a leading provider of integrated security, networking solutions and value added services throughout the APAC region.

Working closely with major and Next-Gen security vendors ensures that we add value through pre and post sales, as well as becoming highly sought after for our professional advisory services on Cybersecurity.

Netpoleon ANZ started in late 2019, with a team of experienced Cyber Channel professionals, and our strong links with various Channel Partners has enabled us to gain a strong foothold in a number of highly competitive industries who demand top flight integrated security. We have also expanded our reach into the New Zealand market in 2022.

We are a proud about adding value to our Channel Partner community by developing our channel through extensive marketing enablement, technical training and support capabilities, professional services, pre and post sales support and certification training.

Our vision is to be the regional leader in sourcing and distributing world-class IT Security solutions as we create winning partnerships with our employees and customers. We aim to be an employer of choice as we grow with our people and to align with our clients to meet their varying technology demands.

Aris Zinc Group logo
Strategic Executive Solutions, part of the ARIS ZINC GROUP, offer PurpleCyber.As the world continues to become more digital, the need for robust cybersecurity measures has never been greater. Business...
Aris Zinc Group logo

Aris Zinc Group

Strategic Executive Solutions, part of the ARIS ZINC GROUP, offer PurpleCyber.
As the world continues to become more digital, the need for robust cybersecurity measures has never been greater. Businesses across the globe face a constant barrage of cyber-attacks and data breaches, and the consequences of such incidents can be severe. In this context, cybersecurity testing and evaluation have become critical to the ongoing success of any organisation, and never more so than in my world or emerging technology for Sovereign Capability and critical infrastructure. #permissiontohackattack
Read more: https://strategicexecutive.com/purple-teaming/

Mimecast logo
Since 2003, Mimecast has stopped bad things from happening to good organisations by enabling them to work protected. We empower more than 40,000 customers to help mitigate risk and manage complexities...
Mimecast logo

Mimecast

Since 2003, Mimecast has stopped bad things from happening to good organisations by enabling them to work protected. We empower more than 40,000 customers to help mitigate risk and manage complexities across a threat landscape driven by malicious cyberattacks, human error, and technology fallibility. Our advanced solutions provide the proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today. Mimecast solutions are designed to transform email and collaboration security into the eyes and ears of organisations worldwide.

Wipro logo
Wipro Limited is a leading global information technology, consulting and business process services company. We harness the power of cognitive computing, hyper-automation, robotics, cloud, analytics, a...
Wipro logo

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company. We harness the power of cognitive computing, hyper-automation, robotics, cloud, analytics, and emerging technologies to help our clients adapt to the digital world and make them successful. A company recognised globally for its comprehensive portfolio of services, strong commitment to sustainability, and good corporate citizenship, we have over 220,000 dedicated employees serving clients across six continents. Together, we discover ideas and connect the dots to build a better and bold new future.

Gold Stand

Blancco Australasia Pty Ltd
Reduce risk. Increase efficiency. Be sustainable. Blancco Technology Group (AIM: BLTG) provides organizations with secure, compliant, and automated solutions that accelerate the transition to the circ...
Blancco Australasia Pty Ltd

Blancco Australasia Pty Ltd

Reduce risk. Increase efficiency. Be sustainable.

Blancco Technology Group (AIM: BLTG) provides organizations with secure, compliant, and automated solutions that accelerate the transition to the circular economy. With nearly 25 years of responding to customer needs and 35+ patented or patent-pending ideas, Blancco is the industry standard in data erasure and mobile lifecycle solutions. Our dedication to technological innovation empowers top-tier enterprises, IT asset disposition (ITAD) vendors, and mobile industry stakeholders to protect end-of-life data against unauthorized access, comply with data protection requirements, extend the useable life of IT assets, accelerate operations, and enhance the mobile customer experience. Read more about us at www.blancco.com.

Sekuro
Sekuro is a cyber security and digital resiliency solutions provider that helps CIOs and CISOs take a strategic approach to cyber security risk mitigation and digital transformation. Operating at the...
Sekuro

Sekuro

Sekuro is a cyber security and digital resiliency solutions provider that helps CIOs and CISOs take a strategic approach to cyber security risk mitigation and digital transformation. Operating at the intersection of the digital technologies and cyber security industries, Sekuro reduces cyber risk while new technologies are adopted - ultimately building business resiliency and enabling fearless innovation.

Our practice areas (Governance, Risk and Compliance, Technology and Platforms, Offensive Security, and Managed Security Services) are full of the brightest minds in the industry. They work together to look beyond the threat landscape of today and into an opportunity landscape of tomorrow.

Learn more at sekuro.io.

Wiz Cloud
Wiz secures everything organizations build and run in the cloud, enabling organisations worldwide, including 30 percent of the Fortune 100, to rapidly identify and remove critical risks in cloud envir...
Wiz Cloud

Wiz Cloud

Wiz secures everything organizations build and run in the cloud, enabling organisations worldwide, including 30 percent of the Fortune 100, to rapidly identify and remove critical risks in cloud environments. Founded in 2020, Wiz is the fastest-growing cybersecurity and software-as-a-service (SaaS) provider in the world, reaching a $6 billion valuation in less than two years. Our customers include Salesforce, Fox, Mars, BMW, Agoda, Immutable, Linktree, DocuSign and TechnologyOne, among others. Visit https://www.wiz.io/ for more information.

CyberIAM logo
A cybersecurity services company, designing and delivering customisable IAM and PAM solutions to large global enterprise businesses. We offer Advisory, Managed, Professional, Expert, and Support servi...
CyberIAM logo

CyberIAM

A cybersecurity services company, designing and delivering customisable IAM and PAM solutions to large global enterprise businesses. We offer Advisory, Managed, Professional, Expert, and Support services as well as a Managed Identity Services Platform, allowing you to monitor your solution’s progress, helping you protect yourself against cyberattacks and internal threats.

Cloudflare logo
Cloudflare, Inc. (www.cloudflare.com / @cloudflare) is on a mission to help build a better Internet. Cloudflare’s suite of products protect and accelerate any Internet application online without addin...
Cloudflare logo

Cloudflare

Cloudflare, Inc. (www.cloudflare.com / @cloudflare) is on a mission to help build a better Internet. Cloudflare’s suite of products protect and accelerate any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was awarded by Reuters Events for Global Responsible Business in 2020, named to Fast Company's Most Innovative Companies in 2021, and ranked among Newsweek's Top 100 Most Loved Workplaces in 2022.

DigiCert Inc logo
DigiCert has been a leading provider of digital trust for organizations around the globe for 20 years, reliably securing billions of transactions worth billions of dollars for the world’s top companie...
DigiCert Inc logo

DigiCert Inc

DigiCert has been a leading provider of digital trust for organizations around the globe for 20 years, reliably securing billions of transactions worth billions of dollars for the world’s top companies every day. With an evergrowing suite of award-winning comprehensive solutions, DigiCert enables individuals, businesses, governments and consortia to engage online with the confidence that their footprint in the digital world is secure. Since its founding, DigiCert has remained steadfastly committed to doing what’s right for the internet, putting people ahead of technology and searching for better solutions to tomorrow’s most challenging problems.

Mandiant, A Google Cloud Company logo
Mandiant, now a part of Google Cloud, is recognized by enterprises, governments and law enforcement agencies worldwide as the market leader in threat intelligence and expertise gained on the frontline...
Mandiant, A Google Cloud Company logo

Mandiant, A Google Cloud Company

Mandiant, now a part of Google Cloud, is recognized by enterprises, governments and law enforcement agencies worldwide as the market leader in threat intelligence and expertise gained on the frontlines of cyber security.

To make every organization confidently ready for cyber threats, Mandiant scales its intelligence and expertise through the Mandiant Advantage SaaS platform to deliver current intelligence, automation of alert investigation and prioritization and validation of security controls products from a variety of vendors.

Akamai Technologies Netherlands BV
Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. A...
Akamai Technologies Netherlands BV

Akamai Technologies Netherlands BV

Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, security, and content delivery solutions at akamai.com and akamai.com/blog, or follow Akamai Technologies on Twitter and LinkedIn.

Rubrik
Rubrik is a cybersecurity company, and our mission is to secure the world’s data. We pioneered Zero Trust Data Security™ to help organisations achieve business resilience against cyberattacks, malicio...
Rubrik

Rubrik

Rubrik is a cybersecurity company, and our mission is to secure the world’s data. We pioneered Zero Trust Data Security™ to help organisations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, delivers data protection and cyber resilience in a single platform across enterprise, cloud, and SaaS applications. Our platform automates policy management of data and enforcement of data security through the entire data lifecycle. We help organisations uphold data integrity, deliver data availability, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Trellix
Trellix is a global company redefining the future of cybersecurity. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced...
Trellix

Trellix

Trellix is a global company redefining the future of cybersecurity. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats to gain confidence in the protection and resilience of their security operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through machine learning, automation, and actionable real-time intelligence to empower over 40,000 customers with living security.
Trellix is committed to accelerating the inclusion of all communities in the industry, bringing together talented professionals with diverse backgrounds and experiences to have a meaningful impact on the evolution of cybersecurity.

NSW Cyber Business Exchange
The NSW Cyber Business Exchange is a program that supports NSW cyber businesses to develop capability and grow. Delivered in partnership between the Australian Information Security Association (AISA)...
NSW Cyber Business Exchange

NSW Cyber Business Exchange

The NSW Cyber Business Exchange is a program that supports NSW cyber businesses to develop capability and grow. Delivered in partnership between the Australian Information Security Association (AISA) and the NSW Cyber Hub (NSW Government), the program consists of a range of initiatives including networking events, focus groups, ‘meet an expert’ round tables, and a mentoring program.

Join us to meet partnering cyber businesses at our booth and see what NSW has to offer.

VMware Carbon Black
VMware Carbon Black is a leader in endpoint and workload protection that sees more and stops more. Carbon Black pioneered Application Control and Endpoint Detection and Response and is leading the evo...
VMware Carbon Black

VMware Carbon Black

VMware Carbon Black is a leader in endpoint and workload protection that sees more and stops more. Carbon Black pioneered Application Control and Endpoint Detection and Response and is leading the evolution to Extended Detection and Response (XDR), enabling you to inspect each endpoint, network connection, and process across your environments with one agent and console.

Thousands of global leading organisations use Carbon Black including one quarter of the Fortune 100. Carbon Black is a member of the XDR Alliance and powers products and services globally for top IR, channel, and OEM partners.

Bugcrowd logo
Bugcrowd is the leading provider of crowdsourced cybersecurity solutions for securing the digitally connected world. Today’s threat environment demands a more proactive approach to cybersecurity—and t...
Bugcrowd logo

Bugcrowd

Bugcrowd is the leading provider of crowdsourced cybersecurity solutions for securing the digitally connected world. Today’s threat environment demands a more proactive approach to cybersecurity—and the Bugcrowd Security Knowledge Platform™ is the only solution that orchestrates data, technology, and human intelligence to find hidden vulnerabilities before attackers can exploit them. With that unique approach, the Bugcrowd Platform helps organizations do everything possible to protect their organization, reputation, and customers from being blind-sided by cyber attacks through Bug Bounty, Vulnerability Disclosure Programs, Penetration Testing, and Attack Surface Management. To learn more, visit bugcrowd.com

Cisco logo
Cisco Security drives security resilience, enabling organisations to protect the integrity of their business amidst unpredictable threats, so business leaders can act with confidence in an ever-changi...
Cisco logo

Cisco

Cisco Security drives security resilience, enabling organisations to protect the integrity of their business amidst unpredictable threats, so business leaders can act with confidence in an ever-changing world. With Cisco, companies can ensure the integrity of their assets, spring back from operational disruptions, withstand shocks to supply chains, eliminate security gaps, and optimise efficacy across the extended business ecosystem. Delivered by the Cisco Security Cloud, and backed by the world’s largest collection of shared, actionable intelligence from Cisco Talos, Cisco's security portfolio secures a hyper-distributed workforce and helps businesses see more, anticipate what’s next, and make informed decisions based on actionable information.

LastPass logo
Protect every level of your organisation, with the access solution that you and your employees will love: LastPass Business. LastPass simplifies access management for companies of every size, with the...
LastPass logo

LastPass

Protect every level of your organisation, with the access solution that you and your employees will love: LastPass Business. LastPass simplifies access management for companies of every size, with the tools your entire organisation needs to secure your business and centralise control of employee passwords and apps. In addition to the increased security provided by our cloud-based password vaulting and single sign-on solution, LastPass increases employee productivity by removing the time lost in password resets.

LastPass Business includes a cloud-based administrative console for the management and oversight of the program, allowing you to enforce policies, track usage through detailed reports and take control of employee access. Join the more than 300,000 businesses worldwide who use LastPass Business to create, enforce, and measure a meaningful access management policy.  

Visit www.lastpass.com to start your free trial today. 

Radware logo
Radware 360 Cloud Application Protection Secure Your Apps, Regain Control, Enable Your BusinessRadware is a leading provider of security solutions for businesses of all sizes. They specialize in DDoS...
Radware logo

Radware

Radware 360 Cloud Application Protection

Secure Your Apps, Regain Control, Enable Your Business

Radware is a leading provider of security solutions for businesses of all sizes. They specialize in DDoS protection, cloud application protection, bot protection management, and application delivery. Recognized as an industry leader by leading analyst firms such as IDC, Forrester, Gartner and more, Radware has been awarded multiple awards such as "Leader in DDoS Protection", "Leader in ADC and Application Delivery", "Leader in Bot Protection" and "Visionary in WAF Security" respectively. With a clientele that includes some of the largest companies in the world and strategic partnerships with industry leaders such as Cisco, Check Point, Microsoft Azure and Nokia, Radware is well-equipped to protect your business from various cyber threats. If you're interested in learning more about Radware products and services, come and visit them at stand 112 and talk to their experts.

La Trobe University logo
La Trobe University is a recognised leader in cybersecurity education and research innovation. With a long tradition of delivering excellence and career-driven learning, our short courses have been cr...
La Trobe University logo

La Trobe University

La Trobe University is a recognised leader in cybersecurity education and research innovation. With a long tradition of delivering excellence and career-driven learning, our short courses have been created through a multi-million dollar grant from the Commonwealth Government under the Australian government’s Cyber Security Skills Partnership Innovation Fund. The aim is to lift Australia’s cybersecurity capabilities through partnerships with leaders like Cisco, Quantum Victoria, Wiley, Practera, GHD, War on Wasted Talent and Optus.

With approximately 40 short courses and microcredentials in cybersecurity and IT, our experts are ensuring that professionals and companies have access to opportunities that meet their needs. From cybersecurity management and governance to penetration testing and secure programming, at La Trobe University we are dedicated to helping Australia build the human firewall and close the cyber skills gap.

Okta logo
Okta accelerates a world where everyone can safely use any technology. We bring simple and secure access to people and organisations everywhere. We promise to not only protect the identities of our cu...
Okta logo

Okta

Okta accelerates a world where everyone can safely use any technology. We bring simple and secure access to people and organisations everywhere. We promise to not only protect the identities of our customers’ workforce and users, but to ask, “what more can we make possible?” Okta has over 14,000 customers globally on our cloud platform and over 7,000 integrations.

Pentera logo
Pentera is the category leader in automated security validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at...
Pentera logo

Pentera

Pentera is the category leader in automated security validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. To learn more visit: www.pentera.io

Data#3 logo
A leading Australian IT services and solutions provider, Data#3 Limited (DTL) is focused on helping customers solve complex business challenges using innovative technology solutions.Built on a foundat...
Data#3 logo

Data#3

A leading Australian IT services and solutions provider, Data#3 Limited (DTL) is focused on helping customers solve complex business challenges using innovative technology solutions.

Built on a foundation of 40 years’ experience, combined with world-leading vendor technologies, Data#3 delivers an integrated array of solutions spanning cloud, mobility, security, data & analytics and IT lifecycle management. These technology solutions are delivered by combining Data#3's services across consulting, project services and managed services.

Listed on the ASX in 1997, Data#3 has more than 1,100 employees. Headquartered in Brisbane, it has facilities across 12 locations in Australia and Fiji

Securiti logo
Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid...
Securiti logo

Securiti

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized as Gartner "Cool Vendor in Data Security", Forrester "Privacy Management Wave Leader", and RSA "Most Innovative Startup".

Phriendly Phishing logo
Phriendly Phishing is a cyber security awareness training and phishing simulation solution that educates and empowers your organisation and employees to help mitigate reputational and financial loss f...
Phriendly Phishing logo

Phriendly Phishing

Phriendly Phishing is a cyber security awareness training and phishing simulation solution that educates and empowers your organisation and employees to help mitigate reputational and financial loss from cyber attacks. We train not trick through empathetic learning that is customised to each learner's journey.

The platform is fully automated, digitally delivered and is localised with relevant and engaging content.

Get in touch today and receive a personalised demo from one of our security awareness experts: https://www.phriendlyphishing.com/request-a-personalised-demo

AUCloud logo
AUCloud is an award-wining Australian owned and operated Cyber Security Managed Security Service Provider (MSSP) and Sovereign Cloud Service (IaaS) specialist that supports Australian Governments, Cri...
AUCloud logo

AUCloud

AUCloud is an award-wining Australian owned and operated Cyber Security Managed Security Service Provider (MSSP) and Sovereign Cloud Service (IaaS) specialist that supports Australian Governments, Critical National Industries (CNIs) and secure enterprise organisations with the latest sovereign cloud infrastructure, backup and cyber security protection, detection and response services.

PwC logo
In our increasingly complex world, we work together with businesses and the community to deliver solutions and sustained outcomes.PwC Australia is part of a global network of firms in 152 countries wi...
PwC logo

PwC

In our increasingly complex world, we work together with businesses and the community to deliver solutions and sustained outcomes.

PwC Australia is part of a global network of firms in 152 countries with over 328,000 people with services including digital transformation, management consulting, workforce transformation, deals advisory, energy transition, ESG and financial assurance, cybersecurity and digital trust.

Bae Systems Digital Intelligence logo
BAE Systems Digital Intelligence is home to 4,800 digital, cyber and intelligence experts. We work collaboratively across 16 countries to collect, connect and understand complex data, so that governme...
Bae Systems Digital Intelligence logo

Bae Systems Digital Intelligence

BAE Systems Digital Intelligence is home to 4,800 digital, cyber and intelligence experts. We work collaboratively across 16 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Launched in 2022, Digital Intelligence is part of BAE Systems, and has a rich heritage in helping to defend nations and businesses around the world from advanced threats.

https://www.baesystems.com/en/digital/home

KPMG logo
KPMG Risk ServicesCyber resilience is not just about managing cyber threats as they evolve. Resilient organisations lean on a strong cyber culture to foster trust, innovation and a competitive edge.KP...
KPMG logo

KPMG

KPMG Risk Services

Cyber resilience is not just about managing cyber threats as they evolve. Resilient organisations lean on a strong cyber culture to foster trust, innovation and a competitive edge.

KPMGs innovative approach to cyber security is reinforced by our delivery. Even in the face of changing threats, KPMG can support your business with our deep cyber security capabilities and solutions, round the clock monitoring and technical expertise. All of this is underpinned by our extraordinary people who understand, and are passionate about, protecting and building your business.

Silver Stand

Dragos logo
Dragos has a global mission: to safeguard civilisation from those trying to disrupt the industrial infrastructure we depend on daily. The Dragos Platform offers the most effective industrial cybersecu...
Dragos logo

Dragos

Dragos has a global mission: to safeguard civilisation from those trying to disrupt the industrial infrastructure we depend on daily. The Dragos Platform offers the most effective industrial cybersecurity technology, giving customers visibility into their ICS/OT assets, vulnerabilities, threats, and response actions. The strength behind the Dragos Platform comes from our ability to codify Dragos's industry-leading OT threat intelligence, and insights from the Dragos services team, into the software. Our community-focused approach gives you access to the largest array of industrial organisations participating in collective defence, with the broadest visibility available.  www.dragos.com

Nozomi Networks logo
Nozomi Networks accelerates digital transformation by protecting the world’s critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional netw...
Nozomi Networks logo

Nozomi Networks

Nozomi Networks accelerates digital transformation by protecting the world’s critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience.

Skylight Cyber logo
Skylight Cyber is a cyber security firm based in Sydney, Australia providing bespoke cyber security services to customers globally. Our background is deeply rooted in the offensive cyber security doma...
Skylight Cyber logo

Skylight Cyber

Skylight Cyber is a cyber security firm based in Sydney, Australia providing bespoke cyber security services to customers globally. Our background is deeply rooted in the offensive cyber security domain, where we repeatedly demonstrated how and why security stacks fail to protect critical assets. Today, we leverage the offensive cyber prism to assist our customers in pragmatically evolving their security stack to reach a level of protection that is right for them.

CGI logo
CGI is among the largest IT and business consulting services firms in the world. Named by ISG as an Australian Cyber Security Leader, we help our clients across government and all industry sectors to...
CGI logo

CGI

CGI is among the largest IT and business consulting services firms in the world. Named by ISG as an Australian Cyber Security Leader, we help our clients across government and all industry sectors to secure their IT and OT assets.

With 5 Australian offices and an ISO27001-certified Melbourne-based security operations centre we're supported globally by our 1700+ experienced and credentialed security specialists.

UpGuard logo
UpGuard is a cybersecurity platform that helps global organizations prevent data breaches, monitor third-party vendors, and improve their security posture. Using proprietary security ratings, world-cl...
UpGuard logo

UpGuard

UpGuard is a cybersecurity platform that helps global organizations prevent data breaches, monitor third-party vendors, and improve their security posture. Using proprietary security ratings, world-class data leak detection capabilities, and powerful remediation workflows, we proactively identify security exposures for companies of all sizes.

Barracuda Networks logo
At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-first, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect...
Barracuda Networks logo

Barracuda Networks

At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-first, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data, and applications with innovative solutions that grow and adapt with our customers’ journey. More than 200,000 organizations worldwide trust Barracuda to protect them - in ways they may not even know they are at risk - so they can focus on taking their business to the next level. For more information, visit?barracuda.com.

Check Point logo
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enter...
Check Point logo

Check Point

Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.

Hack The Box logo
Hack The Box is a leading gamified cybersecurity upskilling, certification, and talent assessment platform enabling individuals, businesses, government institutions, and universities to sharpen their...
Hack The Box logo

Hack The Box

Hack The Box is a leading gamified cybersecurity upskilling, certification, and talent assessment platform enabling individuals, businesses, government institutions, and universities to sharpen their offensive and defensive security expertise. Launched in 2017, Hack The Box brings together the largest global cybersecurity community of more than 2m platform members and is on a mission to create and connect cyber-ready humans and organizations through highly engaging hacking experiences that cultivate out-of-the-box thinking. Offering a fully guided and exploratory skills development environment, Hack The Box is the ideal solution for cybersecurity professionals and organizations to continuously enhance their cyber-attack readiness by improving their red, blue, and purple team capabilities. Rapidly growing its international footprint and reach, Hack The Box is headquartered in the UK, with additional offices in Greece and the US.

For more information, please visit hackthebox.com

Rapid7 logo
Rapid7 is creating a more secure digital future by helping organisations strengthen their security programs. Our portfolio of best-in-class solutions empowers security professionals to manage risk and...
Rapid7 logo

Rapid7

Rapid7 is creating a more secure digital future by helping organisations strengthen their security programs. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape. We foster open source communities and cutting-edge research–using these insights to optimise our products and arm the security community with the latest in attacker methodology. More than 10,000 customers worldwide trust our industry-leading solutions and services to stay ahead of attackers and ready for what’s next.

Recorded Future logo
Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the...
Recorded Future logo

Recorded Future

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,700 businesses and government organizations across more than 75 countries to provide real-time, unbiased and actionable intelligence. Learn more at recordedfuture.com.

Sailpoint logo
SailPoint is a leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities to...
Sailpoint logo

Sailpoint

SailPoint is a leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time - matching the scale, velocity, and environmental needs of today’s cloud-oriented enterprise. Our intelligent, autonomous, and integrated solutions put identity security at the core of digital business operations, enabling even the most complex organizations across the globe to build a security foundation capable of defending against today’s most pressing threats.

SANS Institute logo
SANS Institute was established in 1989 as a cooperative research and organisation. SANS is the most trusted, and by far the largest source for world-class information security training and security ce...
SANS Institute logo

SANS Institute

SANS Institute was established in 1989 as a cooperative research and organisation. SANS is the most trusted, and by far the largest source for world-class information security training and security certification, offering over 70 training courses. GIAC, an affiliate of SANS Institute, is a certification body featuring over 45 hands-on, technical certifications in information security.

SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; and it operates the Internet's early warning system - the Internet StormCenter. At the heart of SANS are the many security practitioners in varied global organisations, from corporations to universities, working together to help the information security community.

SANS' mission is to provide the skills and knowledge needed to protect networks, programs and data from attack, damage and unauthorised access. In so doing, to reduce risk exposure and help close the cyber skills gap.

To learn more about SANS, visit www.sans.org/apac/

Snyk logo
Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach...
Snyk logo

Snyk

Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture.

Trustwave logo
Trustwave is a recognized global cyber defender that stops cyber threats all day, every day. We are a leader in managed detection and response (MDR), managed security services (MSS), consulting and pr...
Trustwave logo

Trustwave

Trustwave is a recognized global cyber defender that stops cyber threats all day, every day. We are a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security. Our elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience in the age of advanced threats. Trustwave detects threats that others can’t see, enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. We leverage our world-class team of security consultants, threat hunters and researchers, and our market-leading security operations platform to relentlessly identify and isolate threats with the right telemetry at the right time for the right response.

WatchGuard Technologies logo
WatchGuard® Technologies, Inc. is a global leader in unified cybersecurity. Our Unified Security PlatformTM is uniquely designed for managed service providers to deliver world-class security that incr...
WatchGuard Technologies logo

WatchGuard Technologies

WatchGuard® Technologies, Inc. is a global leader in unified cybersecurity. Our Unified Security PlatformTM is uniquely designed for managed service providers to deliver world-class security that increases their business scale and velocity while also improving operational efficiency. Trusted by more than 17,000 security resellers and service providers to protect more than 250,000 customers, the company’s award-winning products and services span network security and intelligence, advanced endpoint protection, multi-factor authentication, and secure Wi-Fi. Together, they offer five critical elements of a security platform: comprehensive security, shared knowledge, clarity & control, operational alignment, and automation. The company is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

For additional information, promotions and updates, follow WatchGuard on Twitter (@WatchGuard), on Facebook, or on the LinkedIn Company page. Also, visit our InfoSec blog, Secplicity, for real-time information about the latest threats and how to cope with them at www.secplicity.org. Subscribe to The 443 – Security Simplified podcast at Secplicity.org, or wherever you find your favorite podcasts.

Zscaler logo
Zscaler accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange platform protects thousands of customers from cyberattacks...
Zscaler logo

Zscaler

Zscaler accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centres globally, the SSE-based Zero Trust Exchange is the world’s largest in-line cloud security platform.

FraudWatch logo
FraudWatch is a leader in Digital Brand Protection industry. Founded in 2003, FraudWatch is headquartered in Melbourne, Australia. FraudWatch services over 4000 brands in over 60 countries with team m...
FraudWatch logo

FraudWatch

FraudWatch is a leader in Digital Brand Protection industry. Founded in 2003, FraudWatch is headquartered in Melbourne, Australia. FraudWatch services over 4000 brands in over 60 countries with team members around the globe.

FraudWatch Digital Brand Protection Services protect client brands online from threats including Phishing, Malware, Online Brand Impersonation, Social Media Impersonation and Unauthorised Mobile Apps.

Each month, FraudWatch takes down thousands of phishing sites, Malware sites (command & control, credential drop sites, drive by download), fake Domains, Social Media Profiles and fake Mobile Apps. We provide the best site take down times in the industry, backed with financial penalty SLA’s.Our mission is to deliver expert, innovative solutions to protect and defend our client’s online brands, reputation and financial losses from online fraud and abuse and to make the Internet a safer place.

Fortinet logo
Fortinet is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybers...
Fortinet logo

Fortinet

Fortinet is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybersecurity everywhere you need it with the largest integrated portfolio of over 50 enterprise-grade products. Well over half a million customers trust Fortinet's solutions, which are among the most deployed, most patented, and most validated in the industry. The Fortinet Training Institute, one of the largest and broadest training programs in the industry, is dedicated to making cybersecurity training and new career opportunities available to everyone. FortiGuard Labs, Fortinet’s elite threat intelligence and research organisation, develops and utilises leading-edge machine learning and AI technologies to provide customers with timely and consistently top-rated protection and actionable threat intelligence. Learn more at https://www.fortinet.com.

Forescout logo
Managing cyber risk, together.Forescout delivers automated cybersecurity across the digital terrain. We empower our customers to achieve continuous alignment of their security frameworks with their di...
Forescout logo

Forescout

Managing cyber risk, together.

Forescout delivers automated cybersecurity across the digital terrain. We empower our customers to achieve continuous alignment of their security frameworks with their digital realities, across all asset types – IT, IoT, OT and IoMT. It is a non-stop journey, managing cyber risk through automation and data-powered insights.

The Forescout Platform provides complete asset visibility of connected devices, continuous compliance, network segmentation, network access control and a strong foundation for zero trust. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout customers gain data-powered intelligence to accurately detect risks and quickly remediate cyberthreats without disruption of critical business assets.

Tenable logo
Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its ex...
Tenable logo

Tenable

Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com.

NCC Group logo
NCC Group is a global leader in cyber security, risk management and software resilience. Operating in Australia since 2006, our deep security insights help organisations and communities to create and...
NCC Group logo

NCC Group

NCC Group is a global leader in cyber security, risk management and software resilience. Operating in Australia since 2006, our deep security insights help organisations and communities to create and protect value by securing their digital assets, transformations and connected environments.

Airlock Digital logo
Airlock Digital provides an intuitive application allowlisting framework thatensures the teams within an organisation responsible for softwaremanagement are able to securely and successfully implement...
Airlock Digital logo

Airlock Digital

Airlock Digital provides an intuitive application allowlisting framework thatensures the teams within an organisation responsible for softwaremanagement are able to securely and successfully implement and maintainan effective allowlisting in line with their existing software managementpractices. Additionally, the design and rapid policy distribution capabilityensures the solution does not have an adverse impact on business continuity.

Sysdig logo
Sysdig helps companies secure and accelerate innovation in the cloud. Powered by runtime insights, our cloud security platform stops threats in real time and reduces vulnerabilities by up to 95%. Our...
Sysdig logo

Sysdig

Sysdig helps companies secure and accelerate innovation in the cloud. Powered by runtime insights, our cloud security platform stops threats in real time and reduces vulnerabilities by up to 95%. Our roots are in runtime with the creation of Falco, the open source solution for cloud threat detection. By knowing what is running in production across cloud and containers, Dev and security teams can focus on the vulnerabilities, misconfigurations, permissions, and threats that matter most. From shift left to shield right, the most innovative companies around the world rely on Sysdig to prevent, detect, and respond at cloud speed.

CrowdStrike logo
CrowdStrike, a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and...
CrowdStrike logo

CrowdStrike

CrowdStrike, a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

CrowdStrike: We stop breaches.

CyberGRX logo
CyberGRX and ProcessUnity provides leading enterprises with comprehensive end-to-end cybersecurity and third-party risk management solutions. Fueled by the world’s largest cyber risk exchange database...
CyberGRX logo

CyberGRX

CyberGRX and ProcessUnity provides leading enterprises with comprehensive end-to-end cybersecurity and third-party risk management solutions. Fueled by the world’s largest cyber risk exchange database, best-in-class workflow software, artificial intelligence, predictive analytics, and threat intelligence, CyberGRX and ProcessUnity enables organizations to quickly identify security gaps, reduce vendor onboarding and offboarding time, and proactively mitigate first- and third-party risks. As a result, organizations can more effectively safeguard their critical assets while lowering program costs. CyberGRX and ProcessUnity is trusted by major brands around the globe and is backed by Marlin Equity Partners. Learn more at CyberGRX.com & ProcessUnity.com.

Illumio logo
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all traffic flows between workloads, de...
Illumio logo

Illumio

Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all traffic flows between workloads, devices, and the internet, automatically sets granular segmentation policies to control communications, and isolates high-value assets and compromised systems proactively or in response to active attacks. Illumio protects organizations of all sizes, from Fortune 100 to small business, by stopping breaches and ransomware in minutes, saving millions of dollars in application downtime, and accelerating cloud and digital transformation projects.

Fortra International Ltd logo
Fortra is a cybersecurity company like no other. We’re creating a simpler, stronger future for our customers. Our trusted experts and portfolio of integrated, scalable solutions bring balance and cont...
Fortra International Ltd logo

Fortra International Ltd

Fortra is a cybersecurity company like no other. We’re creating a simpler, stronger future for our customers. Our trusted experts and portfolio of integrated, scalable solutions bring balance and control to organizations around the world.

Fortra transformed the industry by bringing the leading solutions into one best-in-class portfolio, creating a stronger line of defense from a single provider.

We’re the positive changemakers and your relentless ally to provide peace of mind through every step of your cybersecurity journey.

Tech Data logo
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organisations in the world rely on Thales to help them...
Tech Data logo

Tech Data

Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organisations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored. As the global leader in cloud and data protection, our solutions enable organisations to move to the cloud securely and achieve compliance with confidence. Thales Cloud Protection & Licensing is part of Thales Group.

Tech Data is the foremost technology distributor, spanning the tech spectrum, empowering partners with insights and solutions. Collaborating with Thales enhances margins and support via the Partner Program, ensuring safeguarding and control of customer data, irrespective of location.

Arcon logo
ARCON is globally renowned for providing robust and innovative cybersecurity solutions that address contemporary challenges. With a deep understanding of the complex nature of cyber threats, ARCON is...
Arcon logo

Arcon

ARCON is globally renowned for providing robust and innovative cybersecurity solutions that address contemporary challenges. With a deep understanding of the complex nature of cyber threats, ARCON is positioned as the world's leading provider of risk control solutions by all the well-known analyst across the world. Its solutions are designed to minimize the risk of cyber-attacks by providing real-time monitoring, threat intelligence, access control, and behavior analysis. The company's focus on innovation, agility, and customer-centricity has won numerous accolades and helped establish its position as the best in the world.

Its products include, ARCON | Converged Identity, ARCON | Privileged Access Management (PAM), ARCON |Security Compliance Management, ARCON | Endpoint Privilege Management (EPM) and many more risk solutions.

The company's solutions are designed to secure critical assets, prevent data breaches, and ensure regulatory compliance.

With more than 1500 global clients spanning wide range of industries such as Banking, Finance, Insurance, Telecom, Government, Oil & Gas, Pharmaceuticals, Logistics and Fintech, ARCON has a proven track record of delivering world-class cybersecurity solutions to enterprises of all sizes.

SOCRadar logo
SOCRadar is an Extended Threat Intelligence (XTI) platform that integrates EASM, DPRS, and Threat Intelligence. Our proactive security approach helps security teams detect blindspots before hackers ex...
SOCRadar logo

SOCRadar

SOCRadar is an Extended Threat Intelligence (XTI) platform that integrates EASM, DPRS, and Threat Intelligence. Our proactive security approach helps security teams detect blindspots before hackers exploit them. We assist understaffed teams by acting as an extension to SOC teams, providing actionable and contextualized intelligence. Our end-to-end automation handles manual tasks and reduces false positives, allowing analysts to focus on higher-impact projects. SOCRadar offers Attack Surface Management and Digital Risk Protection alongside threat intelligence, and we can integrate with various software. Early warning is a key focus, helping organizations detect threats before they exploit vulnerabilities or distribute stolen data.

ExtraHop Networks logo
ExtraHop is the cybersecurity partner enterprises trust to reveal the unknown and unmask the attack. The company’s Reveal(x) 360™ platform is the only network detection and response platform that deli...
ExtraHop Networks logo

ExtraHop Networks

ExtraHop is the cybersecurity partner enterprises trust to reveal the unknown and unmask the attack. The company’s Reveal(x) 360™ platform is the only network detection and response platform that delivers the 360-degree visibility needed to uncover the cybertruth. When organizations have full network transparency with ExtraHop, they see more, know more, and stop more cyberattacks. Learn more at www.extrahop.com.

F5 logo
Using 4 different cloud providers? We secure that.You need security that works with what you have—all your apps and APIs, both legacy and modern. Your entire infrastructure, wherever it is. Ultimately...
F5 logo

F5

Using 4 different cloud providers? We secure that.

You need security that works with what you have—all your apps and APIs, both legacy and modern. Your entire infrastructure, wherever it is. Ultimately, it’s about security that can protect what you’ve built.

Explore Flexible Solutions with F5 That Help You Secure, Deliver, and Optimize Every App and API, Anywhere.

One Identity logo
One Identity delivers solutions that help customers strengthen operational efficiency, reduce risk surface, control costs and enhance their cybersecurity. Our Unified Identity Platform brings together...
One Identity logo

One Identity

One Identity delivers solutions that help customers strengthen operational efficiency, reduce risk surface, control costs and enhance their cybersecurity. Our Unified Identity Platform brings together best-in-class software to enable organizations to shift from a fragmented identity strategy to a holistic approach.

www.oneidentity.com

Imperva logo
Imperva is a cybersecurity leader that helps organizations protect critical applications, APIs, and data, anywhere, at scale, and with the highest ROI. With an integrated approach combining edge, appl...
Imperva logo

Imperva

Imperva is a cybersecurity leader that helps organizations protect critical applications, APIs, and data, anywhere, at scale, and with the highest ROI. With an integrated approach combining edge, application security, and data security, Imperva protects companies through all stages of their digital journey. Imperva Threat Research and our global intelligence community enable Imperva to stay ahead of the threat landscape and seamlessly integrate the latest security, privacy, and compliance expertise into our solutions.

One Identity logo
One Identity delivers solutions that help customers strengthen operational efficiency, reduce risk surface, control costs and enhance their cybersecurity. Our Unified Identity Platform brings together...
One Identity logo

One Identity

One Identity delivers solutions that help customers strengthen operational efficiency, reduce risk surface, control costs and enhance their cybersecurity. Our Unified Identity Platform brings together best-in-class software to enable organizations to shift from a fragmented identity strategy to a holistic approach.

www.oneidentity.com

NAB logo
We're here to serve customers well and help our communities prosper.We're more than 32,000 colleagues, supporting more than eight and a half million customers in Australia and overseas across: persona...
NAB logo

NAB

We're here to serve customers well and help our communities prosper.

We're more than 32,000 colleagues, supporting more than eight and a half million customers in Australia and overseas across: personal accounts, small, medium and large businesses, private clients, government and institutional activities.

We became NAB when the National Bank of Australasia (est. 1858) merged with the Commercial Banking Company of Sydney (est. 1834) on October 1, 1981.

Our scale and connectivity help us to tackle some of the biggest challenges facing our business and community. We're focusing on taking climate action, supporting affordable and specialist housing and backing Indigenous businesses.

Bronze Stand

Opswat
OPSWAT protects critical infrastructure (CIP). Our goal is to eliminate malware and zero-day attacks. We believe that every file and every device pose a threat. Threats must be addressed at all locati...
Opswat

Opswat

OPSWAT protects critical infrastructure (CIP). Our goal is to eliminate malware and zero-day attacks. We believe that every file and every device pose a threat. Threats must be addressed at all locations at all times—at entry, at exit, and at rest. Our products focus on threat prevention and process creation for secure data transfer and safe device access. The result is productive systems that minimize risk of compromise. That’s why 98% of U.S. nuclear power facilities trust OPSWAT for cybersecurity and compliance.

Skybox Security
Over 500 of the world’s largest and most security-conscious enterprises rely on Skybox Security® for the insights and assurance required to stay ahead of dynamically changing attack surfaces. At Skybo...
Skybox Security

Skybox Security

Over 500 of the world’s largest and most security-conscious enterprises rely on Skybox Security® for the insights and assurance required to stay ahead of dynamically changing attack surfaces. At Skybox, we don’t just serve up data and information. We provide the intelligence and context to make informed decisions, taking the guesswork out of securely enabling enterprises at scale and speed. Our security posture management platform delivers complete visibility, analytics, and automation to quickly map, prioritise and remediate vulnerabilities across your organisation. The vendor-agnostic platform intelligently optimises security policies, actions, and change processes across all corporate networks and cloud environments. With Skybox, security teams can now focus on the most strategic business initiatives while ensuring enterprises remain protected.

To know more, visit www.skyboxsecurity.com

KnowBe4 logo
KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.The KnowBe4 platform is user-friendly and int...
KnowBe4 logo

KnowBe4

KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.

The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available.

Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.

Waterfall Security Solutions logo
Unbreachable OT Security, Unlimited OT ConnectivityWaterfall Security Solutions’ unbreachable OT cybersecurity technologies keep the world running. For more than 15 years, the most important industrie...
Waterfall Security Solutions logo

Waterfall Security Solutions

Unbreachable OT Security, Unlimited OT Connectivity

Waterfall Security Solutions’ unbreachable OT cybersecurity technologies keep the world running. For more than 15 years, the most important industries and infrastructure have trusted Waterfall to guarantee safe, secure and reliable operations. The company’s growing list of global customers includes national infrastructures, power plants, nuclear generators, onshore and offshore oil and gas facilities, refineries, manufacturing plants, utility companies, and more. Waterfall’s patented Unidirectional Gateways and other solutions combine the benefits of impenetrable hardware with unlimited software-based connectivity, enabling 100% safe visibility into industrial operations and automation systems.

Darktrace logo
Darktrace (DARK.L), a global leader in cyber security artificial intelligence, delivers complete AI-powered solutions in its mission to free the world of cyber disruption. Breakthrough innovations fro...
Darktrace logo

Darktrace

Darktrace (DARK.L), a global leader in cyber security artificial intelligence, delivers complete AI-powered solutions in its mission to free the world of cyber disruption. Breakthrough innovations from the Darktrace Cyber AI Research Centre in Cambridge, UK and its R&D centre in The Hague, The Netherlands have resulted in over 115 patent applications filed and significant research published to contribute to the cyber security community. Darktrace’s technology continuously learns and updates its knowledge of 'you' for an organization and applies that understanding to achieve an optimal state of cyber security. It is delivering the first ever Cyber AI Loop, fueling a continuous end-to-end security capability that can autonomously prevent, detect, and respond to novel, in-progress threats in real time. Darktrace employs over 2,100 people around the world and protects over 7,700 organizations globally from advanced cyber-threats. It was named one of TIME magazine’s ‘Most Influential Companies’ in 2021.

Semperis logo
For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures integrity and availability of critical enterprise directory services at every step in the cyber kill cha...
Semperis logo

Semperis

For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing Active Directory, Semperis’ patented technology protects over 40 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.

Fortian logo
Fortian is a specialist Australian provider of IT security, privacy and risk services. We help organisations operate confidently and safely online – in short, we build digital trust.Trust, underpinned...
Fortian logo

Fortian

Fortian is a specialist Australian provider of IT security, privacy and risk services. We help organisations operate confidently and safely online – in short, we build digital trust.

Trust, underpinned by IT security and privacy, is the currency of the online world. Our expertise in these disciplines is unique and backed by decades of experience protecting real value in large Australian organisations.

We focus on achieving practical, positive outcomes for our customers by blending deep technical expertise with a strategic, business-focused approach.

Our services include security strategy & architecture, security assurance, security governance, managed security services & forensics and incident response.

ThreatQuotient logo
ThreatQuotient improves security operations by fusing together disparate data sources, tools and teams to accelerate threat detection and response. ThreatQuotient’s data-driven security operations pla...
ThreatQuotient logo

ThreatQuotient

ThreatQuotient improves security operations by fusing together disparate data sources, tools and teams to accelerate threat detection and response. ThreatQuotient’s data-driven security operations platform helps teams prioritize, automate and collaborate on security incidents; enables more focused decision making; and maximizes limited resources by integrating existing processes and technologies into a unified workspace. The result is reduced noise, clear priority threats, and the ability to automate processes with high fidelity data. ThreatQuotient’s industry leading data management, orchestration and automation capabilities support multiple use cases including incident response, threat hunting, spear phishing, alert triage and vulnerability prioritization, and can also serve as a threat intelligence platform. ThreatQuotient is headquartered in Northern Virginia with international operations based out of Europe, MENA and APAC. For more information, visit www.threatquotient.com.

BlackBerry Cybersecurity logo
BlackBerry Security powered by Cylance AI delivers artificial intelligence with prevention-first, predictive security products and smart, simple, secure solutions that change how organisations approac...
BlackBerry Cybersecurity logo

BlackBerry Cybersecurity

BlackBerry Security powered by Cylance AI delivers artificial intelligence with prevention-first, predictive security products and smart, simple, secure solutions that change how organisations approach endpoint security. BlackBerry Cylance provides full-spectrum predictive threat prevention and visibility across the enterprise to combat the most notorious and advanced cybersecurity attacks. With AI-based malware prevention, threat hunting, automated detection and response, and expert security services, BlackBerry Cylance protects the endpoint without increasing staff workload or costs. Learn more at www.BlackBerry.com

OffSec logo
OffSec is the world's most trusted provider of cybersecurity training and certification. Our rigorous training programs are industry-standard, and our certified alumni are highly sought-after. We help...
OffSec logo

OffSec

OffSec is the world's most trusted provider of cybersecurity training and certification. Our rigorous training programs are industry-standard, and our certified alumni are highly sought-after. We help businesses, governments, and educational institutions become more secure. We help individuals enter or advance their careers in cybersecurity.

Skillfield logo
Skillfield is a dynamic Australian-based IT services consultancy company, specialising in smart, innovative and simplified solutions to complex cyber security and big data challenges. The Skillfield t...
Skillfield logo

Skillfield

Skillfield is a dynamic Australian-based IT services consultancy company, specialising in smart, innovative and simplified solutions to complex cyber security and big data challenges.

The Skillfield team is motivated by their vision to be the number one Australian brand for IT Services Consultancy and their unwavering commitment to delivering exceptional, tailored customer outcomes.

We are a genuine partner that cares with a track record of accomplishments backed by our prestigious ISO 27001 certification and ranked 9th in Australia by the Financial Times High-Growth Companies 2023. Skillfield is dedicated to meeting Australian organisations at any stage of their cyber security journey and elevating their security posture to the next level using world-class tailored cyber security tools and implementation services.

BSI Group logo
Digital trust is a domain of organizational resilience which empowers organizations to safeguard their information, people, systems, and technology, to ensure safety, security, compliance, privacy, et...
BSI Group logo

BSI Group

Digital trust is a domain of organizational resilience which empowers organizations to safeguard their information, people, systems, and technology, to ensure safety, security, compliance, privacy, ethical requirements, and brand reputation to enable business effectiveness and efficiencies.

BSI is at the cornerstone of shaping such resilience, sharing and embedding best practice for organizations across the globe. Our unique combination of standards, assurance, training and qualifications, and regulatory and consultancy* services are designed to enable you to become trusted, sustainable and resilient.

We partner with clients and establish digital trust with their employees, customers, shareholders, and communities. Given today’s cyber threat landscape and the emergence of new technologies, it is imperative that organizations have the correct protocols, policies, and procedures in place to keep their information safe, data secure, infrastructure robust and ultimately, make them resilient.

When it comes to meeting your compliance obligations and delivering on your strategic goals, we can help you become future ready.For more information visit: www.bsigroup.com/en-AU

*As an independent certification body, we do not offer consultancy to clients when they also seek certification to the same management system.

AWSN logo
The Australian Women in Security Network (AWSN) started in 2015 to connect women who were often feeling isolated in organisations and in tertiary education institutions with like-minded individuals.Wo...
AWSN logo

AWSN

The Australian Women in Security Network (AWSN) started in 2015 to connect women who were often feeling isolated in organisations and in tertiary education institutions with like-minded individuals.

Women and those who identify themselves as female make up half our population, however, the number of women working in security in Australia is low (with women in cybersecurity making up only 17%).

The AWSN is a not-for-profit association and network of people aimed at educating women and girls on security and increasing the number of women in the security community. We support, inspire, and act as role models. We connect women in the industry and those looking to enter the field with the tools, knowledge, network, and platforms needed to build confidence and interest. We know the diversity of threats requires diversity of thought on how to address them, and this is where our network thrives.

Forcepoint logo
Forcepoint simplifies security for global businesses and governments. Forcepoint’s all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust and prevent the theft or loss of sensitive...
Forcepoint logo

Forcepoint

Forcepoint simplifies security for global businesses and governments. Forcepoint’s all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust and prevent the theft or loss of sensitive data and intellectual property no matter where people are working. With Head Quarters in Austin, Texas, and office locations across the globe, Forcepoint creates safe, trusted environments for customers and their employees in more than 150 countries. Engage with Forcepoint on www.forcepoint.com

CyberArk Software logo
CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity – human or ma...
CyberArk Software logo

CyberArk Software

CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud environments and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on LinkedIn, Twitter, Facebook or YouTube.

Trend Micro logo
At Trend Micro, everything we do is about making the world a safer place for exchanging digital information. We believe cyber risks are business risks, and we empower organizations with complete visib...
Trend Micro logo

Trend Micro

At Trend Micro, everything we do is about making the world a safer place for exchanging digital information. We believe cyber risks are business risks, and we empower organizations with complete visibility of their digital assets to understand how well they are protected and where to prioritize their investments to lower their risk.

We secure the world by anticipating global changes in modern infrastructures, evolutions in threats, shifts in user behaviors, and advancement in application development. We help customers transform cybersecurity from siloed technologies to a unified security platform that accelerates digital transformation, hybrid workforce collaboration, SOC modernization, vendor consolidations, and operationalization of Zero Trust strategy, while integrating with their existing investments and partner ecosystems.

As a global cybersecurity leader, our platform, threat intelligence, and services are deployed by over 500,000 enterprise customers across 175 countries and recognized by third-party reviewers and industry analysts.

AusCERT logo
AusCERT is a Cyber Emergency Response Team (CERT) based in Australia.It operates as a membership based organisation.As a not-for-profit security group based at The University of Queensland Australia,...
AusCERT logo

AusCERT

AusCERT is a Cyber Emergency Response Team (CERT) based in Australia.

It operates as a membership based organisation.

As a not-for-profit security group based at The University of Queensland Australia, AusCERT delivers 24/7 service to members and helps them prevent, detect, respond and mitigate cyber-based attacks. AusCERT is also host to Australia's oldest and premier annual cyber security conference.

AusCERT has a national focus across industry and government and has a national and global reach.

As an active member of the Forum for Incident Response and Security Teams (FIRST) and Asia Pacific Computer Emergency Response Team (APCERT), AusCERT has access to accurate, timely and reliable information about emerging computer network threats and vulnerabilities on a regional and global basis.

Additionally, AusCERT maintains a large network of trusted CERT contacts in North America, the United Kingdom, Europe and throughout Asia. AusCERT utilises these contacts to receive early warning of global threats and to assist in responding to incidents which span jurisdictions.

Cato Networks logo
Cato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, including Zero Trust Network Access (ZTNA), Secure Web...
Cato Networks logo

Cato Networks

Cato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, including Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), and Firewall as a Service (FWaaS) with advanced threat prevention into a global cloud service. Using Cato, customers easily replace costly and rigid legacy MPLS with modern network architecture based on SD-WAN, secure and optimize a hybrid workforce working from anywhere, and enable seamless cloud migration. With Cato your business is ready for whatever’s next.

CatoNetworks.com @CatoNetworks.

Cato. Ready for Whatever’s Next.

Cequence Security logo
Cequence, a pioneer in Unified API Protection, is the only solution that unifies discovery, compliance, and protection across all internal and external APIs to defend against fraud, business logic att...
Cequence Security logo

Cequence Security

Cequence, a pioneer in Unified API Protection, is the only solution that unifies discovery, compliance, and protection across all internal and external APIs to defend against fraud, business logic attacks, exploits, and unintended data leakage. It takes less than 15 minutes to onboard an API and requires no instrumentation, SDK, or JavaScript deployment. 24% of Cequence customers are large Fortune 500 organizations. Cequence secures more than 6 billion daily API calls and protects more than 2 billion user accounts across these customers. Its flexible deployment model supports passive/inline, 100% on-prem, SaaS, and hybrid deployments.

Introspectus Pty Ltd logo
Introspectus - Turning cyber strategy into action.It is all very well understanding the risks associated with cyber security; you may even have a strategic plan and a budget …but how do you actually t...
Introspectus Pty Ltd logo

Introspectus Pty Ltd

Introspectus - Turning cyber strategy into action.

It is all very well understanding the risks associated with cyber security; you may even have a strategic plan and a budget …but how do you actually translate this into action?

The threat of cyber-attack is a persistent and growing concern. The Australian Cyber Security Centre (ACSC) has developed a set of baseline mitigation strategies, (the Essential Eight), to help protect your organisation.

While manual audits may give you some insight into your organisation’s cyber maturity, only an automated audit will provide you with ongoing, real-time assurance that your Essential Eight security controls are in place and actually working. Introspectus Assessor provides real-time reporting on your compliance with the Essential Eight.

No need for manual audits, which often use contractors who are unfamiliar with your environment, or tie up your IT staff, and present you with varying degrees of success and certainty.

Introspectus Assessor removes the need for external ‘specialists’ by providing you with real-time insight into your cyber security posture, plus all the information you need to remediate any gaps in your cyber maturity.

Additionally, Introspectus Assessor provides your technical staff with detailed insight on which devices in your environment are out of compliance, why they are out of compliance and how they can remediate the issue.

Manage Engine logo
ManageEngine is the enterprise IT management division of Zoho Corporation. Established and emerging enterprises - including 9 of every 10 Fortune 100 organizations - rely on ManageEngine's real-time I...
Manage Engine logo

Manage Engine

ManageEngine is the enterprise IT management division of Zoho Corporation. Established and emerging enterprises - including 9 of every 10 Fortune 100 organizations - rely on ManageEngine's real-time IT management tools to ensure optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has offices worldwide, including the United States, the United Arab Emirates, the Netherlands, India, Colombia, Mexico, Brazil, Singapore, Japan, China and Australia, as well as 200+ global partners to help organizations tightly align their business and IT. Our office in Australia is located in Sydney, and of our 14 worldwide data centers, two are located locally: in Sydney and Melbourne. For more information, please visit manageengine.com.

OpenText logo
OpenText Cybersecurity helps customers effectively reduce risk, preserve trust and minimize disruption. From prevention, detection and response to recovery, investigation and compliance, we help custo...
OpenText logo

OpenText

OpenText Cybersecurity helps customers effectively reduce risk, preserve trust and minimize disruption. From prevention, detection and response to recovery, investigation and compliance, we help customers build cyber resilience via a holistic security portfolio of smarter and simple solutions delivered through our unified end-to end platform.

AICD logo
The Australian Institute of Company Directors is the largest director membership organisation in the world with over 51,500+ members nationally and internationally. Our members are influential leaders...
AICD logo

AICD

The Australian Institute of Company Directors is the largest director membership organisation in the world with over 51,500+ members nationally and internationally.

Our members are influential leaders from many industries and sectors including large, medium and small organisations, ASX listed companies, government bodies and not-for profit organisations, around Australia and across the globe.

Since our early beginnings, we have developed as an organisation recognised for quality and professionalism.

Our members can be located in all major Australian cities and regions.

Our aim is to develop the skills and capabilities of leaders for the benefit of society; we help leaders to run their organisations better.

We aim to be recognised as a key influencer in the creation of world-leading governance laws and practices in Australia and a key player in achieving world-leading performance of Australian boards and directors.

The key areas of focus to achieve our long-term vision and strategic objectives;

• set the Global Standard for directors and governance education;

• To enable directors to access and engage the most diverse community of directors and governance professionals;

• To influence and shape the Director Community – strengthen the knowledge of todays and tomorrow's directors;

• To advocate for world-class governance - quality of governance laws, regulations, principles and practices

Yubico logo
Yubico, the inventor of the YubiKey, makes secure login easy and available for everyone. Since the company was founded in 2007, it has been a leader in setting global standards for secure access to co...
Yubico logo

Yubico

Yubico, the inventor of the YubiKey, makes secure login easy and available for everyone. Since the company was founded in 2007, it has been a leader in setting global standards for secure access to computers, mobile devices, servers, browsers, and internet accounts. Yubico is a creator and core contributor to the FIDO2, WebAuthn, and FIDO Universal 2nd Factor (U2F) open authentication standards, and is a pioneer in delivering modern, hardware-based authentication security at scale.

YubiKeys are the gold standard for phishing-resistant multi-factor authentication (MFA), enabling a single device to work across hundreds of consumer and enterprise applications and services. Yubico’s technology enables secure authentication, encryption, and code signing and is used and loved by many of the world’s largest organizations and millions of customers in more than 160 countries.

Aligned with its mission of making the internet more secure for everyone, Yubico donates YubiKeys to organizations helping at-risk individuals through the philanthropic initiative, Secure it Forward. Yubico has presence around the globe and offices in Santa Clara, San Francisco, Seattle area, and Stockholm. For more information, please visit: www.yubico.com.

Infoblox logo
Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the ne...
Infoblox logo

Infoblox

Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organisations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world. Visit infoblox.com, or follow us on LinkedIn or Twitter.

emt Distribution Pty Ltd logo
Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of...
emt Distribution Pty Ltd logo

emt Distribution Pty Ltd

Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact. More than 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure. emt Distribution Pty Ltd is the Australia, New Zealand and Asia Pacific distributor for Netwrix.

Tesserent Academy Pty Ltd t/a ALC Training logo
Delivering training since ’94, ALC offers the widest range of Cyber Security courses in the Asia-Pacific region. From entry to professional level, ALC’s courses are taught by leading international pra...
Tesserent Academy Pty Ltd t/a ALC Training logo

Tesserent Academy Pty Ltd t/a ALC Training

Delivering training since ’94, ALC offers the widest range of Cyber Security courses in the Asia-Pacific region. From entry to professional level, ALC’s courses are taught by leading international practitioners with extensive real-world experience. You don't get just the theory & exam preparation. You get the full learning experience!

For beginners we offer the only entry level course on the market designed for anyone wanting an understanding of Info/Cyber Security and gain a solid base on which to build a career ALCs CSF+P Cyber Security Foundation+Practitioner™ course as well as the only NIST Cybersecurity Framework Practitioner® course designed specifically for the Australian market.

For intermediate/advanced professionals we offer these leading internationally accredited certifications: CISSP®, SABSA®, CRISC®, CISM®, CISA®, CCSP®, ISO27001 and more.

ALC is pleased to announce that as of March 2023 ALC has become a part of Tesserent Academy, the education division of ASX-listed Tesserent Ltd.

ALC Training | A part of Tesserent Academy Pty Ltd

9 McInroy Street

Taringa, QLD, 4068

Phone: 1300 767 592

Email:

Web: https://www.alctraining.com.au/

Saviynt logo
Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity gove...
Saviynt logo

Saviynt

Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience. For more information, please visit saviynt.com.?

Sumo Logic logo
Nearly every enterprise undergoing digital transformation is building cloud-native applications to deliver new, digital experiences. The Sumo Logic Continuous Intelligence Platform™ provides real-time...
Sumo Logic logo

Sumo Logic

Nearly every enterprise undergoing digital transformation is building cloud-native applications to deliver new, digital experiences. The Sumo Logic Continuous Intelligence Platform™ provides real-time analytics and insights to help practitioners and developers ensure application reliability, secure and protect against modern threats, and gain insights into their cloud infrastructures. By delivering a SaaS analytics platform for cloud-native application observability and security solutions, Sumo Logic is empowering the people who power modern, digital business so they, in turn, can deliver reliable and secure digital experiences.

RSA Security logo
RSA provides trusted identity and access management for 12,000 organizations around the world, managing 25 million enterprise identities and providing secure, convenient access to millions of users. R...
RSA Security logo

RSA Security

RSA provides trusted identity and access management for 12,000 organizations around the world, managing 25 million enterprise identities and providing secure, convenient access to millions of users. RSA empowers organizations to thrive in a digital world, with complete capabilities for modern authentication, lifecycle management and identity governance. Whether in the cloud or on-premises, RSA connects people with the digital resources they depend on everywhere they live, work and play. RSA was founded in 1982 and has over 40 years’ experience in cybersecurity and holds over 200+ patents. RSA is trusted by thousands of security-sensitive organizations around the globe to protect hybrid workforces and to accelerate business by delivering secure and convenient access for any user, from anywhere, to anything. Security and trust are at the heart of everything we do. It’s core to our products, processes, and people, and it’s ingrained into our DNA.

Skyhigh Security logo
At its heart, security is a data protection problem. Skyhigh Security protects organisations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Securit...
Skyhigh Security logo

Skyhigh Security

At its heart, security is a data protection problem. Skyhigh Security protects organisations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Security Service Edge (SSE) Portfolio goes beyond data access and focuses on data use, allowing organisations to collaborate from any device and from anywhere without sacrificing security. For more information, visit www.skyhighsecurity.com.

Cybermindz logo
Recognising that many cyber security professionals – our very defenders – are themselves under sustained and increasing stress, we set about providing direct support to restore and rebuild emotional a...
Cybermindz logo

Cybermindz

Recognising that many cyber security professionals – our very defenders – are themselves under sustained and increasing stress, we set about providing direct support to restore and rebuild emotional and cognitive health and alleviate suffering. Cybermindz.org is a not-for-profit founded in Australia, born of cyber and delivering a peer informed, scalable, military proven protocol to prevent and reverse burnout in cyber teams and enable our critical teams to reconnect with mission and purpose. For details visit cybermindz.org

CompTIA logo
CompTIA is the most authoritative and respected place to help students, career changers, tech professionals - anyone - start and succeed in a tech career. We unlock potential and impact more than 1 mi...
CompTIA logo

CompTIA

CompTIA is the most authoritative and respected place to help students, career changers, tech professionals - anyone - start and succeed in a tech career. We unlock potential and impact more than 1 million people every year, by providing affordable learning resources in various formats, including self-study and online. CompTIA resources can be found in community colleges, online universities and with training providers. We are a global leader respected by employers around the world, defining the necessary workforce skills and required knowledge. Our global community of IT and business leaders is dedicated to solving real business problems and future-proofing for success.

ISC2 logo
ISC2 is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) c...
ISC2 logo

ISC2

ISC2 is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, ISC2 offers a portfolio of credentials that are part of a holistic, pragmatic approach to security. Our association of candidates, associates and members, more than 500,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and Education™. For more information on ISC2, visit www.isc2.org, follow us on X or connect with us on Facebook and LinkedIn.

Elastic logo
We’re the leading platform for search-powered solutions, and we help everyone — organizations, their employees, and their customers — find what they need faster, while keeping applications running smo...
Elastic logo

Elastic

We’re the leading platform for search-powered solutions, and we help everyone — organizations, their employees, and their customers — find what they need faster, while keeping applications running smoothly, and protecting against cyber threats.

When you tap into the power of Elastic Enterprise Search, Observability, and Security solutions, you’re in good company with brands like Uber, Slack, Microsoft, and thousands of others who rely on us to accelerate results that matter.

Women in Cybersecurity (WiCys) logo
WiCyS Australia is non profit organisation with a global reach dedicated to bringing together woman in Cybersecurity from academia, research and industry to share knowledge experience networking and m...
Women in Cybersecurity (WiCys) logo

Women in Cybersecurity (WiCys)

WiCyS Australia is non profit organisation with a global reach dedicated to bringing together woman in Cybersecurity from academia, research and industry to share knowledge experience networking and mentoring.

Established in August 2020, WiCyS Australia provides women with an opportunity to engage with the wider, national and international community through year-round events, webinars, conferences, industry panels, mentoring programs and more!

WiCyS Australia aims to promote the cyber security discipline and profession by retaining, recruiting, and advancing the presence and leadership of women, non-binaries, Aboriginal and Torres Strait Islanders who are passionate in the field of cyber security.

CSO Group logo
At CSO Group, our mission is to unravel the complexities of cyber security, making it accessible and comprehensible for organizations. We streamline the entire spectrum of security, from conceptualiza...
CSO Group logo

CSO Group

At CSO Group, our mission is to unravel the complexities of cyber security, making it accessible and comprehensible for organizations. We streamline the entire spectrum of security, from conceptualization to execution and ongoing management, in order to mitigate business risks and thwart threats effectively.

We understand that every business is different, so our experts will work with you to define and achieve security outcomes aligned to your unique business requirements. Whatever your needs, our consultants will work with you to identify the right approach and ultimately achieve cyber security outcomes for your business.

Cyber and Infrastructure Security Centre logo
The Department of Home Affairs' Cyber and Infrastructure Security Centre (CISC) is focused on uplifting the security and resilience of Australia's critical infrastructure for the shared benefit of all...
Cyber and Infrastructure Security Centre logo

Cyber and Infrastructure Security Centre

The Department of Home Affairs' Cyber and Infrastructure Security Centre (CISC) is focused on uplifting the security and resilience of Australia's critical infrastructure for the shared benefit of all Australians.

Advocating an all-hazards approach to risk management, the CISC Outreach Network works with small-to-medium businesses and peak bodies to enhance cybersecurity preparedness and awareness across the Australian economy.

They also function as a general contact point for inquiries relating to the Security of Critical Infrastructure Act 2018 (SOCI Act) as well as key Government initiatives like the Australian Cybersecurity Strategy 2023-2030 and the Trusted Information Sharing Network (TISN).

Lumify Group logo
Through our 4 brands we're able to deliver on the full spectrum of IT training - so no matter what your skillset, where you are in the world, or how you prefer to learn, we can make it happen.From fir...
Lumify Group logo

Lumify Group

Through our 4 brands we're able to deliver on the full spectrum of IT training - so no matter what your skillset, where you are in the world, or how you prefer to learn, we can make it happen.

From first-time students to career-changers, upskillers to promotion-seekers, support techs to CTOs, we equip you with the knowledge and skills you need to flourish in a future where technology rules. We use our decades of training expertise, deep industry knowledge and unrivalled connections to propel you and your business forward. To go further, faster. To accelerate change.

Dull logo
Dull is an Australian Cyber Security technology company focused on providing Granular Secure Remote Access to OT and ICS systems and applications.Uniquely, Dull enables remote access collaboration bet...
Dull logo

Dull

Dull is an Australian Cyber Security technology company focused on providing Granular Secure Remote Access to OT and ICS systems and applications.

Uniquely, Dull enables remote access collaboration between multiple organisations with unique capabilities within and between each side of the connection, which improve security, visibility, auditability, and control.

Pan Software (RiskWare) logo
Pan Software is a specialist software product development company based in Melbourne Australia with the mission of making the world a little less risky with our multi-award-winning Enterprise Risk Int...
Pan Software (RiskWare) logo

Pan Software (RiskWare)

Pan Software is a specialist software product development company based in Melbourne Australia with the mission of making the world a little less risky with our multi-award-winning Enterprise Risk Intelligent Software - RiskWare

Start Up

Abnormal Security logo
Abnormal Security provides the leading behavioural AI-based email security platform that leverages machine learning to stop sophisticated inbound email attacks and dangerous email platform attacks tha...
Abnormal Security logo

Abnormal Security

Abnormal Security provides the leading behavioural AI-based email security platform that leverages machine learning to stop sophisticated inbound email attacks and dangerous email platform attacks that evade traditional solutions. The anomaly detection engine leverages identity and context to analyse the risk of every cloud email event, preventing inbound email attacks, detecting compromised accounts, and remediating emails and messages in milliseconds—all while providing visibility into configuration drifts across your environment. You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly, with additional protection available for Slack, Teams, and Zoom. More information is available at abnormalsecurity.com

Terrabyte logo
One of the well-respected security company in the industry, Terrabyte provides a range of all-around protection products capable of helping organizations improve their cyber security capabilities.Terr...
Terrabyte logo

Terrabyte

One of the well-respected security company in the industry, Terrabyte provides a range of all-around protection products capable of helping organizations improve their cyber security capabilities.

Terrabyte can work with your team across all levels and skill sets to assemble the right combination of products and services specific to your environment to defend against a variety of threats.

Terrabyte sets itself apart from its competitors by offering products that provide superior protection throughout every stage of the attack chain, utilizing advanced security control points.

Achieve business transformation and effectively mitigate risk by leveraging our global team of trusted experts and their extensive portfolio of security solutions.

Hyprfire logo
Hyprfire’s Network and Detection Response (NDR) patented solution, Firebug, provides security teams with rapid network threat hunting capability. Our clients receive a daily update on critical network...
Hyprfire logo

Hyprfire

Hyprfire’s Network and Detection Response (NDR) patented solution, Firebug, provides security teams with rapid network threat hunting capability. Our clients receive a daily update on critical network security events in their organisation, and a weekly wrap-up summary of the key security events that they need to know about on their network.

Quiet, actionable, fast and affordable for businesses of all sizes, Firebug helps IT teams to pinpoint precursors to network attacks with its ability to understand what is happening on their networks. A complement to endpoint and perimeter solutions, Hyprfire’s lightweight solution gives busy IT teams actionable event information for targeted investigation, as well as provides a foundation for reporting purposes.

Since 2019, Hyprfire has now grown into an Australian active network cyber security company based in Perth, WA, with clientele across all of Australia and internationally.

Apporetum logo
Apporetum is the modern, centralised platform that empowers your business to manage and govern identities, accounts, and access. By leveraging your existing investments in Microsoft Entra and Azure AD...
Apporetum logo

Apporetum

Apporetum is the modern, centralised platform that empowers your business to manage and govern identities, accounts, and access. By leveraging your existing investments in Microsoft Entra and Azure AD, Apporetum provides unparalleled insights and control over resource access.

With Apporetum your business can take control over who gets access to their application and enables a truly frictionless self-service workplace with all the guardrails, auditing and compliance capabilities that a modern Identity and Access Management practice expects.

Take charge of your business' Identity and Access Management with Apporetum.

Modern Methodologies logo
Modern Methodologies are a modern Cyber Security services partner, specialising in Identity and Access Management (IAM), Privileged Access Management (PAM), Cloud Engineering, and Cloud Infrastructure...
Modern Methodologies logo

Modern Methodologies

Modern Methodologies are a modern Cyber Security services partner, specialising in Identity and Access Management (IAM), Privileged Access Management (PAM), Cloud Engineering, and Cloud Infrastructure. We work alongside our clients, fostering strong partnerships to drive impactful, innovative, and value-driven solutions.

At Modern Methodologies we recognise strong security posture can only be achieved with holistic solutions that integrate people, processes and tools. Our team bring specialised skills and expertise across each of these domains.

We place great emphasis on actively listening to our clients to understand their unique challenges. We believe that by working together we can create pragmatic solutions that deliver incremental value, increasing organisational efficiency and buying down risk. Our dedication to delivering exceptional results and adding value is the driving force behind everything we do.

SecureDrive logo
SecureDrive is a supplier of onboard PIN authenticated, hardware encrypted, USB data storage devices. The devices come in a range of USB flash drives, HDD and SSD drives with capacities ranging from 4...
SecureDrive logo

SecureDrive

SecureDrive is a supplier of onboard PIN authenticated, hardware encrypted, USB data storage devices. The devices come in a range of USB flash drives, HDD and SSD drives with capacities ranging from 4GB to 20TB. Should you have any questions or if you would like a 30-day free evaluation copy of any of our products, please email us at .

Fortanix logo
Fortanix secures data, wherever it is. Fortanix’s data-first approach helps businesses of all sizes to modernise their security solutions on-premises, in the cloud and everywhere in-between. Enterpris...
Fortanix logo

Fortanix

Fortanix secures data, wherever it is. Fortanix’s data-first approach helps businesses of all sizes to modernise their security solutions on-premises, in the cloud and everywhere in-between. Enterprises worldwide, especially in privacy-sensitive industries like healthcare, fintech, financial services, government, and retail, trust Fortanix for data security, privacy and compliance.

MyRisk RoboGRC logo
MyRISK® HyperGRC™ - the future of cyber security governance. HyperGRC™ is an integrated, efficient, and powerful solution to put cyber governance professionals back in control. As a cyber specific pla...
MyRisk RoboGRC logo

MyRISK® HyperGRC™

MyRISK® HyperGRC™ - the future of cyber security governance.

HyperGRC™ is an integrated, efficient, and powerful solution to put cyber governance professionals back in control.

As a cyber specific platform (Cyber security GRC), it features a cyber data model, cyber specific functionality and integrations, and cyber dashboards and reports.

It also includes:

- CyberDESK™ - Our cyber front door and engagement management capability that improves collaboration between staff, customers, vendors, and partners.

- RISK EXPRESS® - Our full ML/AI GRC workflow automation that streamlines all cyber governance processes, saving time, eliminating errors, and re-building confidence.

- CyberQUANT® - Our risk quantification engine that uses multiple models like Open FAIR to measure cyber risk and optimise cyber investments.

- RESITEK™ - our highly scalable & secure, data centric ML/AI native architecture, that increases your own cyber resilience.

With MyRISK® HyperGRC™, you can streamline all cyber governance processes, quantify risk and optimise investments, increase cyber resilience and build stakeholder confidence.

Visit us at Stand 45 or at myrisk.io

FIRCY logo
FIRCY is the leading expert in cyber threat intelligence and cloud protection. We host bespoke decoy infrastructure to lure threat actors away from genuine assets, track malicious activity, and warn y...
FIRCY logo

FIRCY

FIRCY is the leading expert in cyber threat intelligence and cloud protection. We host bespoke decoy infrastructure to lure threat actors away from genuine assets, track malicious activity, and warn you of attacks before they happen. Our platform is the world’s first threat intelligence solution custom-built for cloud-native environments and adversaries.

Plerion logo
Plerion is an all-in-one Cloud Security Platform that supports workloads across AWS, Azure, and GCP delivering cloud security posture management, workload security, data security, IAM security, contin...
Plerion logo

Plerion

Plerion is an all-in-one Cloud Security Platform that supports workloads across AWS, Azure, and GCP delivering cloud security posture management, workload security, data security, IAM security, continuous compliance, software bill of materials, shift left, and more.

Plerion's risk-driven, threat-led, and context-aware approach empowers organisations to break down silos, reduce alert fatigue and focus on what really matters with effective remediation.

Rackmount IT logo
Rackmount.IT provides high-quality 19” rack mount kits at an affordable price, with front connections, secured power supply, custom cutouts for airflow, and always a perfect fit for your specific netw...
Rackmount IT logo

Rackmount IT

Rackmount.IT provides high-quality 19” rack mount kits at an affordable price, with front connections, secured power supply, custom cutouts for airflow, and always a perfect fit for your specific network appliance. We also specialize in custom projects and welcome inquiries about creating a rack mount kit for any appliance, subject to a minimum order quantity to keep it cost-efficient.

Team Cymru logo
Team Cymru’s mission is to save and improve human lives. We are unrivaled across three disciplines; digital business risk platforms, free-to-use community services, and support services to over 143 Go...
Team Cymru logo

Team Cymru

Team Cymru’s mission is to save and improve human lives. We are unrivaled across three disciplines; digital business risk platforms, free-to-use community services, and support services to over 143 Government CSIRT teams.

Our business risk and threat intelligence platforms empower global organizations with unmatched Threat Reconnaissance and Attack Surface Management capabilities to meet the challenges of today’s cyber threats.

Community Services equip those who run the internet to defend it from criminals who wish to disrupt and cause harm, and CSIRT enables Governments the tools to outmaneuver nation-state threat actors.

Since 2005, our reputation remains unchallenged.

Gathid logo
Gathid (previously RightCrowd Access Analytics) helps organisations to better manage their identities and access. Our focus is on providing comprehensive visibility into access privileges, ensuring th...
Gathid logo

Gathid

Gathid (previously RightCrowd Access Analytics) helps organisations to better manage their identities and access. Our focus is on providing comprehensive visibility into access privileges, ensuring that only authorised individuals have access.

Gathid is our identity governance platform. It offers an easy way to gather identity and access insights from day 1. Data-driven, contextual insights help to streamline and automate user access reviews (UARs), enabling companies to demonstrate that they're meeting access compliance controls standards such as; SOX, ISO 27001, SOC 2, and more, every day.

Powered by our patented technology and a graph database, the cloud-based solution uniquely establishes virtual connections between any related identity and access data without the need for complicated custom integrations. It provides a clear and concise view of essential identity and access information, empowering your teams to make better, faster, more-informed access decisions, when they're needed.

SureCity Networks logo
SureCity Networks excel in Cyber and Network security offering consultancy, managed services and cyber security products. With offices in Melbourne, Sydney and London, we bring over 20 years of global...
SureCity Networks logo

SureCity Networks

SureCity Networks excel in Cyber and Network security offering consultancy, managed services and cyber security products.

With offices in Melbourne, Sydney and London, we bring over 20 years of global expertise, spanning the legal, manufacturing, finance, media and logistic sectors.

SureCity Networks limits attackers abilities to move throughout Networks and Systems. We have a global world-class team, leveraging best-of-breed software and processes. We are the market leader in the Cyber and Network Security space.

What sets us apart from the rest is being a true, vendor and solution agnostic company focused on business outcomes. We take the time to understand each customers requirements and tailor a solution to meet their needs.

SureCity Networks partners with vendors who share our philosophy to deliver optimised security outcomes across private cloud, public cloud and endpoint.

InfoSecAssure logo
At InfoSecAssure, we're paving a transformative path in the landscape of information security assurance. Our platform empowers businesses, regardless of size, to evaluate their cybersecurity resilienc...
InfoSecAssure logo

InfoSecAssure

At InfoSecAssure, we're paving a transformative path in the landscape of information security assurance. Our platform empowers businesses, regardless of size, to evaluate their cybersecurity resilience against a comprehensive array of Australian and international standards. Driven by the vision to democratise cybersecurity, we aim to alleviate the pain of endless security questionnaires that plague businesses.

Understanding that every business is unique, InfoSecAssure offers assessments tailored to each companies unique risk profile that provide stakeholders with risk-informed and framework-based insights. Instead of getting overwhelmed by the complexities of cybersecurity, businesses can now rely on our intuitive platform to:

- Centralise Security Governance: Keep all cybersecurity governance details up-to-date in one place, ensuring effortless accessibility.

- Gain Crucial Insights Instantly: Understand your company's risk profile at a glance, pinpoint key actions to mitigate significant risks, and gauge maturity against global standards.

- Versatile Reporting: From overarching dashboards that showcase the health of your security governance to detailed reports for auditors or clients, InfoSecAssure ensures businesses demonstrate their commitment to trustworthiness and security.

In a digital era where security is paramount, we're championing the cause by offering user-friendly tools that allow businesses to excel in their core areas, without the shadow of security uncertainties. Join us in making cybersecurity accessible, affordable, and above all, effective. With InfoSecAssure, redefine how you perceive and manage security.

Peloton Cyber Security logo
At Peloton Cyber, our proven process starts with people, not tools and technology. We understand it’s not possible to reduce cybersecurity risk to zero. But we know it is possible to regain control an...
Peloton Cyber Security logo

Peloton Cyber Security

At Peloton Cyber, our proven process starts with people, not tools and technology. We understand it’s not possible to reduce cybersecurity risk to zero. But we know it is possible to regain control and visibility over threat landscapes—and when we pull in the same direction, we can turn cyber security into a competitive advantage.

As a Managed Security Services Provider (MSSP), Peloton focuses 100% on cyber security strategy and managed services. Uniquely, we are well-versed across both IT and OT environments and where they converge. We know how to bridge the knowledge gaps on every level including business strategy, risk management processes, control systems, and functional safety.

Our experienced team has helped organisations through countless cyber breaches. We use these real-world experiences and learnings to deliver security outcomes that are built from the start, with sustainability and resilience as a priority.

David Lynas Consulting Pty Ltd logo
David Lynas Consulting (DLC) are global leaders in delivering value through Business-enabling Enterprise Security Architecture.As a most trusted strategic partner, we enable our clients to meet their...
David Lynas Consulting Pty Ltd logo

David Lynas Consulting Pty Ltd

David Lynas Consulting (DLC) are global leaders in delivering value through Business-enabling Enterprise Security Architecture.

As a most trusted strategic partner, we enable our clients to meet their most important strategic goals through our application of Architectural approaches to solve complex challenges in Cyber Security, Information Risk, Resilience, Governance, Assurance and Trusted Engineering.

DLC’s methods apply cross-industry and empower our clients not just to articulate an entirely new level of strategic ambition but deliver on that vision, balancing risk with opportunity to achieve positive benefit.

Our passion for, and commitment to, our clients’ success is characterised by a unique customer experience, and our ability to make a real difference is evidenced by two principal factors that set us apart being our people and our method.

DLC’s team consists of some of the most experienced SABSA Masters and SABSA Practitioners in the world.

We leverage The SABSA Framework for Enterprise Security Architecture, using the Architecture Matrix to structure our approach.

https://www.davidlynas.com

Happiest Minds Technologies logo
Happiest Minds Technologies Limited (NSE: HAPPSTMNDS), a Mindful IT Company, enables digital transformation for enterprises and technology providers by delivering seamless customer experiences, busine...
Happiest Minds Technologies logo

Happiest Minds Technologies

Happiest Minds Technologies Limited (NSE: HAPPSTMNDS), a Mindful IT Company, enables digital transformation for enterprises and technology providers by delivering seamless customer experiences, business efficiency and actionable insights. We do this by leveraging a spectrum of disruptive technologies such as: artificial intelligence, blockchain, cloud, digital process automation, internet of things, robotics/drones, security, virtual/augmented reality, etc. Positioned as ‘Born Digital. Born Agile’, our capabilities span digital solutions, infrastructure, product engineering and security. We deliver these services across industry sectors such as automotive, BFSI, Consumer Packaged Goods, E-Commerce, Edutech, Engineering R&D, Hi-Tech, Manufacturing, Retail and Travel/Transportation/Hospitality.A Great Place to Work-Certified™ company, Happiest Minds is headquartered in Bangalore, India with operations in the U.S., UK, Canada, Australia and Middle East.

Cydarm Technologies logo
Cydarm's Cyber Response Management Platform helps organizations to uplift their security operations maturity and improve their cyber resilience through a data-informed approach. The platform's feature...
Cydarm Technologies logo

Cydarm Technologies

Cydarm's Cyber Response Management Platform helps organizations to uplift their security operations maturity and improve their cyber resilience through a data-informed approach. The platform's features ensure efficiency and precise team coordination, while providing granular attribute-based access controls which solve the challenges associated with "need-to-know" vs. "need-to-share".

Cydarm enables effective analysis, response, collaboration, and communication through capabilities that include case management, data enrichment, integrations, editable playbooks, reporting, collaboration, and response time SLAs.

Developed in Australia, the Cydarm platform is used by Government, defence, financial services, critical infrastructure, education, and third party service providers to improve security operations outcomes.

IT Junction Pty Limited logo
CYBER SECURITY an Ever-Challenged space, and a Never-Ending Journey. Yes, Digital Era is what we live in now AND Digital Identity of an individual, company or an organisation is what defines us all to...
IT Junction Pty Limited logo

IT Junction Pty Limited

CYBER SECURITY an Ever-Challenged space, and a Never-Ending Journey. Yes, Digital Era is what we live in now AND Digital Identity of an individual, company or an organisation is what defines us all today, in addition to your physical self. YOUR Digital presence & safety is more important than ever. IT Junction Pty Limited has been introducing unique, upcoming and best proven technologies & solution platforms to our customers and partners.

IT Junction’s approach is to keep Digital security at the core of an organization in whatever you do. It tackles all the key elements at play i.e. people, processes and technologies. To follow this through we work with our customers in an consultative approach in identifying possible security gaps and help secure them.

We take an inside out approach helping minimise the risk.

• Exposing Cyber Risks and Validating Threats - RidgeBot

• Help finding Gaps in your Network Security Solution

• Endpoint Security – Preventative Soln keep the device infection free

• Email Security – Securing your Key Communication Path

• Networking Security & Remote Access – Work from Home Solution

• Cloud Security – Be vigilant

• Identity Access and Governance

• Data Protection (Backup, DR and Restore)

• Security Compliance – Essentials 8, NIST, ISO27001 etc.

Visit us on Stand 89 in Start-up Section for more details…

6pillars logo
6pillars AUTOMATE+ allows you to fix AWS misconfigurations, now.Remediating AWS misconfigurations with the same advanced automation that AWS uses themselves, 6pillars' AUTOMATE+ brings continuous comp...
6pillars logo

6pillars

6pillars AUTOMATE+ allows you to fix AWS misconfigurations, now.

Remediating AWS misconfigurations with the same advanced automation that AWS uses themselves, 6pillars' AUTOMATE+ brings continuous compliance visibility, reporting and safe, opt-in cloud configuration automation that:

- frees up cloud team resources

- reduces alert noise, and

- ensures continuous compliance with best-practice configuration

Cyber Forte logo
Cyber Forte is an Australian owned Cyber Security company providing exceptional Cyber Security services to protect your business from Cyber Attacks. Our team has 25+ years of Cyber Security experience...
Cyber Forte logo

Cyber Forte

Cyber Forte is an Australian owned Cyber Security company providing exceptional Cyber Security services to protect your business from Cyber Attacks. Our team has 25+ years of Cyber Security experience working with the biggest financial & consulting companies in Australia and globally. Our services include:

- Advanced Penetration Testing (Web,mobile,API,cloud,infrastructure)

- Compliance, Audit & Certification (ISO 27001, PCI DSS, NIST, Essential 8)

- Cyber Security Maturity Assessment

- Security Architecture Review

- Cyber Security Maturity Assessment

- Crown Jewels Assessment

- 3rd Party Assessment

- Privacy Impact Assessment

- CISO As A Service

- Dark Web Monitoring

- Phishing simulation, Security Awareness

- Security Monitoring As Service

Our goal is to protect the business of our clients. We create the best outcomes for our clients by becoming their trusted advisors.

Our Vision To protect the business of our customers with the help of our expert Cyber Security Services.

IriusRisk logo
We are IriusRisk, We make secure design the standard, scalable practice for all digital teams. IriusRisk makes secure design fast, reliable and accessible, even to non-security users, thanks to our au...
IriusRisk logo

IriusRisk

We are IriusRisk, We make secure design the standard, scalable practice for all digital teams. IriusRisk makes secure design fast, reliable and accessible, even to non-security users, thanks to our automated and intelligent Threat Modeling Solution.

Cyber Forte logo
Cyber Forte is an Australian owned Cyber Security company providing exceptional Cyber Security services to protect your business from Cyber Attacks. Our team has 25+ years of Cyber Security experience...
Cyber Forte logo

Cyber Forte

Cyber Forte is an Australian owned Cyber Security company providing exceptional Cyber Security services to protect your business from Cyber Attacks. Our team has 25+ years of Cyber Security experience working with the biggest financial & consulting companies in Australia and globally. Our services include:

- Advanced Penetration Testing (Web,mobile,API,cloud,infrastructure)

- Compliance, Audit & Certification (ISO 27001, PCI DSS, NIST, Essential 8)

- Cyber Security Maturity Assessment

- Security Architecture Review

- Cyber Security Maturity Assessment

- Crown Jewels Assessment

- 3rd Party Assessment

- Privacy Impact Assessment

- CISO As A Service

- Dark Web Monitoring

- Phishing simulation, Security Awareness

- Security Monitoring As Service

Our goal is to protect the business of our clients. We create the best outcomes for our clients by becoming their trusted advisors.

Our Vision

To protect the business of our customers with the help of our expert Cyber Security Services.

Cybermarket logo
Cybermarket is a leading cyber security talent and project portal that bridges the gap between organisations seeking top-notch cyber security expertise and skilled professionals looking to contribute...
Cybermarket logo

Cybermarket

Cybermarket is a leading cyber security talent and project portal that bridges the gap between organisations seeking top-notch cyber security expertise and skilled professionals looking to contribute their skills to the ever-evolving world of cybersecurity. With a mission to fortify digital landscapes and protect businesses from cyber threats, Cybermarket has established itself as a trusted platform for talent acquisition and project collaboration in the cybersecurity domain.

UNSW Canberra at ADFA logo
UNSW Canberra’s mission is to support lifelong learning through innovation and engagement whilst leveraging our location to build meaningful relationships across Defence, industry, government and acad...
UNSW Canberra at ADFA logo

UNSW Canberra at ADFA

UNSW Canberra’s mission is to support lifelong learning through innovation and engagement whilst leveraging our location to build meaningful relationships across Defence, industry, government and academia. We aim to create inclusive communities focused on solving real-world problems by supporting our people in leadership and research excellence. We can help you excel at your chosen career path, while enhancing the national capability and innovation of the Australian Defence Force. UNSW Canberra graduates are in high demand to address complex and contemporary challenges across Australia, the region and the globe.

Welcome Reception & Networking Drinks

CyberCX
CyberCX is the leading provider of professional cyber security and cloud services across Australia and New Zealand. With a workforce of over 1,300 professionals, we are a trusted partner to private an...
CyberCX

CyberCX

CyberCX is the leading provider of professional cyber security and cloud services across Australia and New Zealand. With a workforce of over 1,300 professionals, we are a trusted partner to private and public sector organisations helping our customers confidently manage cyber risk, respond to incidents and build resilience in an increasingly complex and challenging threat environment.

Block Party

Accenture
Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelera...
Accenture

Accenture

Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are a talent and innovation led company with 738,000 people serving clients in more than 120 countries. Technology is at the core of change today, and we are one of the world’s leaders in helping drive that change, with strong ecosystem relationships. We combine our strength in technology with unmatched industry experience, functional expertise and global delivery capability. We are uniquely able to deliver tangible outcomes because of our broad range of services, solutions and assets across Strategy & Consulting, Technology, Operations, Industry X and Accenture Song. These capabilities, together with our culture of shared success and commitment to creating 360° value, enable us to help our clients succeed and build trusted, lasting relationships. We measure our success by the 360° value we create for our clients, each other, our shareholders, partners and communities. Visit us at www.accenture.com

Barista Coffee Cart

InfoTrust
InfoTrust is a leading specialised cybersecurity practice that combines a customer first consulting approach with next-generation security solutions. InfoTrust specialises in key security domains; ass...
InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer first consulting approach with next-generation security solutions. InfoTrust specialises in key security domains; assurance, governance, risk and compliance, email, endpoint, cloud and network. From ensuring regulatory compliance, to assessing end-user security awareness to understanding where an organisation’s vulnerabilities lie, and more.

InfoTrust seeks to establish a trusted security partner status with its clients. With the goal of supporting the customers’ security journey, maturing their posture over time, protecting, and mitigating against the risks associated with cybercrime.

Slipstream Cyber logo
Slipstream Cyber is a business of Interactive, a technology solutions provider across Australia and New Zealand providing services across three core capabilities: cloud, cyber and systems.Slipstream C...
Slipstream Cyber logo

Slipstream Cyber

Slipstream Cyber is a business of Interactive, a technology solutions provider across Australia and New Zealand providing services across three core capabilities: cloud, cyber and systems.

Slipstream Cyber provides end-to-end cyber security management, from strategy and optimisation to incident response.

Slipstream Cyber services include:

• Active Defence

• Consulting

• Digital forensics and incident response (DFIR) and technical assurance

ES2 and 1StepGroup logo
Connected, Secured, and OptimisedES2 now part of OneStep Group was founded by a group of leading IT and business professionals whose aim was to deliver information and security technology solutions gu...
ES2 and 1StepGroup logo

ES2 and 1StepGroup

Connected, Secured, and Optimised

ES2 now part of OneStep Group was founded by a group of leading IT and business professionals whose aim was to deliver information and security technology solutions guided by the principles of trusted advice and a commitment to results. OneStep Group with over 30 years of combined experience brings a range of digital transformation capabilities that help our customers Connect, Secure and Optimise their business operations. We are not just a service provider; we are an extension of your business. Our suite of technology solutions serves and supports a diverse range of customers and in many cases has fundamentally transformed the way they conduct business. We deliver solutions that are not just connected but are also secured and optimised to fuel your business's long-term growth and resilience.

Lounge Sponsor

Cyble
Cyble is an Australia-based AI-Powered Threat Intelligence Platform, gathering intelligence from the Deep Web, Dark Web, and Surface Web, offering real-time visibility into a company's digital risk. O...
Cyble

Cyble

Cyble is an Australia-based AI-Powered Threat Intelligence Platform, gathering intelligence from the Deep Web, Dark Web, and Surface Web, offering real-time visibility into a company's digital risk. Our Threat Library helps enterprises manage and prioritize security data. Recognized by Forbes as a top cybersecurity startup and backed by Y Combinator, we're here to keep your digital world safe from cyber threats.

Lanyard

LMNTRIX
LMNTRIX XDR MDR is a fully managed hyper-converged cyber defense solution that combines an open, powerful platform with extensive security expertise for 24/7 protection.
LMNTRIX

LMNTRIX

LMNTRIX XDR MDR is a fully managed hyper-converged cyber defense solution that combines an open, powerful platform with extensive security expertise for 24/7 protection.

Opportunities