Sponsors


Thank you to all our 2021 sponsors. Click on the logos to learn more about each organisation.

Gold Stand

Fortinet logo
Fortinet secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding att...
Fortinet logo

Fortinet

Fortinet secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.
Smartsheet (NYSE: SMAR) is the enterprise platform for dynamic work. By aligning people and technology so organizations can move faster and drive innovation, Smartsheet enables its millions of users t...

SmartSheet

Smartsheet (NYSE: SMAR) is the enterprise platform for dynamic work. By aligning people and technology so organizations can move faster and drive innovation, Smartsheet enables its millions of users to achieve more.Backed by enterprise-grade security, Smartsheet is used by more than 75% of the companies in the Fortune 500 to implement, manage, and automate processes across a broad array of departments and use cases.Aurion Systems - a Smartsheet Gold Partner, helps set up a tailored-to-fit Cyber Security Portfolio/Program/ Project delivery framework in the fastest time resulting in high-value and high-quality Cyber Security Project deliveries right from day one. We enable our customers to accurately deliver, measure and improve on successful KPIs like CVSS scores for national critical infrastructure at the lowest cost possible.We support Australia-wide Cybersecurity initiatives by providing. Strategic Advisory, Project Delivery, Integrations, Governance Dashboards, and People Change management. This enables our customers to receive accurate organization-wide Cybersecurity program delivery, visibility, and real-time Governance.
LogMeIn logo
Protect every level of your organisation, with the access solution that you and your employees will love: LastPass Enterprise. LastPass simplifies access management for companies of every size, with t...
LogMeIn logo

LogMeIn (LastPass)

Protect every level of your organisation, with the access solution that you and your employees will love: LastPass Enterprise. LastPass simplifies access management for companies of every size, with the tools your entire organisation needs to secure your business and centralise control of employee passwords and apps. In addition to the increased security provided by our cloud-based password vaulting and single sign-on solution, LastPass increases employee productivity by removing the time lost in password resets. LastPass Enterprise includes a cloud-based administrative console for the management and oversight of the program, allowing you to enforce policies, track usage through detailed reports and take control of employee access. Join the more than 25,000 businesses worldwide who use LastPass Enterprise to create, enforce, and measure a meaningful access management policy. Visit www.lastpass.com to start your free trial today.

For more information, visit http://www.lastpass.com

Silver Stand

Okta logo
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organisations to securely connect the right people to the right technologies at the right time....
Okta logo

Okta

Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organisations to securely connect the right people to the right technologies at the right time. With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 10,000 organisations, including Beach Energy, JetBlue, Nordstrom, Takeda Pharmaceutical, Teach for America, T-Mobile and Twilio, trust Okta to help protect the identities of their workforces and customers.
Carbonite and Webroot logo
Carbonite and Webroot, OpenText companies, harness the cloud and artificial intelligence to provide comprehensive cyber resilience solutions for businesses, individuals, and managed service providers....
Carbonite and Webroot logo

Carbonite and Webroot

Carbonite and Webroot, OpenText companies, harness the cloud and artificial intelligence to provide comprehensive cyber resilience solutions for businesses, individuals, and managed service providers. Cyber resilience means being able to stay up and running, even in the face of cyberattacks and data loss. That’s why we’ve combined forces to provide endpoint protection, network protection, security awareness training, and data backup and disaster recovery solutions, as well as threat intelligence services used by market leading technology providers worldwide. Leveraging the power of machine learning to protect millions of businesses and individuals, we secure the connected world. Carbonite and Webroot operate globally across North America, Europe, Australia, and Asia. Discover cyber resilience at carbonite.com and webroot.com.
Forescout Technologies Inc logo
About ForescoutForescout Technologies, Inc. actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Fortune 1000 companies trust Foresco...
Forescout Technologies Inc logo

Forescout Technologies Inc

About ForescoutForescout Technologies, Inc. actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Fortune 1000 companies trust Forescout as it provides the most widely deployed, enterprise-class platform at scale across IT, IoT and OT managed and unmanaged devices. Forescout arms customers with more device intelligence than any other company in the world, allowing organizations across every industry to accurately classify risk, detect anomalies and quickly remediate cyberthreats without disruption of critical business assets. Don’t just see it. Secure it.The Enterprise of Things – Secured.
Qualys logo
Qualys Inc. (NASDAQ: QLYS), helps organizations streamline and consolidate their IT, security and compliance applications. The Qualys Cloud Platform and its singular Cloud Agent provides organizations...
Qualys logo

Qualys

Qualys Inc. (NASDAQ: QLYS), helps organizations streamline and consolidate their IT, security and compliance applications. The Qualys Cloud Platform and its singular Cloud Agent provides organizations a single view, for real-time security across their entire global hybrid-IT environment, from prevention to detection to response – all from a single cloud-based app.
Saviynt logo
Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity gove...
Saviynt logo

Saviynt

Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience. The world’s largest brands trust Saviynt to accelerate digital transformation, empower distributed workforces, and meet continuous compliance, including BP, Western Digital, Mass Mutual, and Koch Industries. For more information, please visit saviynt.com.??ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the United States and/or other countries.
Rapid7 logo
Organisations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the compl...
Rapid7 logo

Rapid7

Organisations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks.
Illumio logo
Illumio enables organizations to realize a future without high-profile breaches by preventing the lateral movement of attackers across any organization. Founded on the principle of Zero Trust in 2013,...
Illumio logo

Illumio

Illumio enables organizations to realize a future without high-profile breaches by preventing the lateral movement of attackers across any organization. Founded on the principle of Zero Trust in 2013, Illumio provides visibility and segmentation for endpoints, data centers and clouds. The world’s leading organizations, including Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite and hundreds of others, trust Illumio to reduce cyber risk. For more information, visit https://www.illumio.com/what-we-do and engage us on LinkedIn and Twitter.
Attivo Networks logo
Attivo Networks, the leader in preventing identity privilege escalation and detecting lateral movement attacks, delivers a superior defense for countering threat activity. - Asset Defense - Network-ba...
Attivo Networks logo

Attivo Networks

Attivo Networks, the leader in preventing identity privilege escalation and detecting lateral movement attacks, delivers a superior defense for countering threat activity. - Asset Defense - Network-based post-compromise detection and engagement to misdirect attackers and collect adversary intelligence. - Endpoint Defense - Endpoint protection suite to restrict discovery, lateral movement, and privilege escalation. - Active Directory Protection - A standalone solution to efficiently conceal real objects and return fake information when attackers query AD. Attivo has won over 150 awards for its technology innovation and leadership.
Malwarebytes logo
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes comple...
Malwarebytes logo

Malwarebytes

Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions.

Malwarebytes completely replaces antivirus with artificial intelligence-powered technology that stops cyberattacks before they can compromise home computers and business endpoints.

Malwarebytes’ comprehensive protection catches increasingly sophisticated threats by monitoring and analyzing behavior, where many traditional solutions fall short by focusing on file-based malware and signature tracking for established threats.

Further differentiating from standard security solutions, Malwarebytes allows devices attacked by ransomware to rollback up to three days to restore conditions prior to the attack.

Bronze Stand

Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Fut...

Recorded Future

Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable. In a world of ever-increasing chaos and uncertainty, Recorded Future empowers organizations with the visibility they need to identify and detect threats faster; take proactive action to disrupt adversaries; and protect their people, systems, and assets, so business can be conducted with confidence. Recorded Future is trusted by more than 1,000 businesses and government organizations around the world. Learn more at www.recordedfuture.com and follow us on Twitter at @RecordedFuture.
Ampion is a technology services provider delivering a new level of specialisation at scale. Our integrated consulting services and solutions provide enterprise-scale assurance, security, and transform...

Ampion

Ampion is a technology services provider delivering a new level of specialisation at scale. Our integrated consulting services and solutions provide enterprise-scale assurance, security, and transformation expertise to help you overcome the technology challenges you face every day.We deliver specialised scalability through our growing local team of more than 600 consultants: to offer the breadth of capabilities of a large global systems integrator combined with the depth of skill of a small boutique provider.Ampion’s three areas of specialisation provide a strategic approach across software assurance (Assure), technology security (Secure), and digital transformation (Transform), to help your organisation navigate complexity with ease and scale up your digital initiatives.
InfoTrust is a cybersecurity platform provider that combines next-gen security controls, with the InfoTrust “Connective Tissue”, a customer success, analytics, and response service. This ensures your...

InfoTrust

InfoTrust is a cybersecurity platform provider that combines next-gen security controls, with the InfoTrust “Connective Tissue”, a customer success, analytics, and response service. This ensures your security controls remain optimally configured and well managed. Collectively, this approach creates secure and more productive clients. InfoTrust seeks to establish a trusted security partner status with its clients, with the goal of supporting the customers’ security journey, maturing their posture over time, protecting and mitigating against the risks associated with cybercrime.
Today’s enterprises depend on the cloud, data and software to make decisive decisions. That’s why the most respected brands and largest organisations in the world rely on Thales Cloud Protection & Lic...

Thales

Today’s enterprises depend on the cloud, data and software to make decisive decisions. That’s why the most respected brands and largest organisations in the world rely on Thales Cloud Protection & Licensing to help them protect their most sensitive information and software wherever it is created, accessed or stored – from the cloud and data centres to devices and across networks. As the global leader in cloud and data protection, our solutions enable organisations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in the devices and services used by millions of consumers every day
Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Our solutions have been recognized by Gartner, IDC, Forrester Re...

Radware

Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Our solutions have been recognized by Gartner, IDC, Forrester Research and Frost & Sullivan for helping leading organizations protect sensitive data, build trust and loyalty with consumers, and grow their businesses by creating a secure climate for customers.Radware’s portfolio of data center, cloud and application protection solutions include DDoS Protection, SSL Attacks Protection, Web Application Firewall (WAF), Bot Manager and API Protection, all offered as cloud services, on-premises or hybrid solutions. Radware provides one of the most comprehensive, advanced, single-vendor integrated application and network security solution for companies worldwide to protect their services & applications across any environment. For more information, please visit www.radware.com.
ExtraHop is on a mission to arm security teams to confront active threats and stop breaches. Our Reveal(x) 360 platform, powered by cloud-scale AI, covertly decrypts and analyzes all cloud and network...

ExtraHop

ExtraHop is on a mission to arm security teams to confront active threats and stop breaches. Our Reveal(x) 360 platform, powered by cloud-scale AI, covertly decrypts and analyzes all cloud and network traffic in real time to eliminate blind spots and detect threats that other tools miss. Sophisticated machine learning models are applied to petabytes of telemetry collected continuously, helping ExtraHop customers to identify suspicious behavior and secure over 15 million IT assets, 2 million POS systems, and 50 million patient records. ExtraHop is a market share leader in network detection and response with 30 recent industry awards including Forbes AI 50, Cybercrime Ransomware 25, and SC Media Security Innovator.Stop Breaches 84% Faster.
ContentKeeper’s mission is to ensure your success as you move seamlessly into the future state of multi-layered cloud security. For more than two decades, we’ve helped global enterprises, educational...

ContentKeeper Technologies

ContentKeeper’s mission is to ensure your success as you move seamlessly into the future state of multi-layered cloud security. For more than two decades, we’ve helped global enterprises, educational institutions, government agencies, as well as healthcare and financial organizations protect their people, networks, and digital assets with unmatched technology, security expertise, and support.We know exactly what it takes to create, implement, and optimize comprehensive Cloud, Hybrid, and On-Prem solutions to enforce the highest level of cyber defence without impeding engagement or productivity. We can also help you embrace a SASE-based Cloud-First infrastructure, so you can further expand flexibility and security while lowering costs.ContentKeeper is committed to continuously develop leading-edge technology, advanced solutions, and automated processes to keep you ahead of evolving cyber threats.
Progress MOVEit is used by thousands of organisations around the world to provide complete visibility and control over file transfer activities. MOVEit provides secure collaboration and automated file...

Progress Software

Progress MOVEit is used by thousands of organisations around the world to provide complete visibility and control over file transfer activities. MOVEit provides secure collaboration and automated file transfers of sensitive data and advanced workflow automation capabilities without the need for scripting. Encryption and activity tracking enable compliance with regulations such as PCI, HIPAA, and GDPR. Over 1,700 independent software vendors, 100,000+ enterprise customers, and a three-million-strong developer community rely on Progress to power their critical business applications. For more information about Progress MOVEit, please visit www.ipswitch.com/moveit
Dragos logo
Dragos has a global mission: to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The practitioners who founded Dragos were drawn to this missio...
Dragos logo

Dragos

Dragos has a global mission: to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The practitioners who founded Dragos were drawn to this mission through decades of government and private sector experience. Dragos codifies the knowledge of our cybersecurity experts into an integrated software platform that provides customers critical visibility into ICS and OT networks so that threats are identified and can be addressed before they become significant events. Our solutions protect organizations across a range of industries including electric, oil and gas, manufacturing, and mining, and protect mission critical networks including ICS/OT and emerging applications such as the Industrial Internet of Things (IIOT). Dragos is privately held and headquartered in the Washington, DC area with regional presence around the world, including Canada, Australia, New Zealand, Europe, and the Middle East.
One Identity logo
One Identity, a Quest Software business, helps organizations establish an identity-centric security strategy. With a unique identity and access management (IAM) portfolio, our award-winning offering i...
One Identity logo

One Identity

One Identity, a Quest Software business, helps organizations establish an identity-centric security strategy. With a unique identity and access management (IAM) portfolio, our award-winning offering includes identity governance, AD-centered IAM, privileged access management and identity SaaS solutions, One Identity helps organizations secure their enterprise end to end, smoothly make their digital transformation, eliminate identity challenges and reduce their attack surface from internal and external threats. Our unequalled commitment to our customers’ long-term IAM success is evident in our 7,500 customers worldwide that rely on us to manage more than 125 million identities. For more information, visit www.oneidentity.com.
DDLS logo
DDLS is Australia’s largest provider of corporate IT and process training, with the largest portfolio of strategic partners and courses in Australia. We partner with world-class companies to help orga...
DDLS logo

DDLS

DDLS is Australia’s largest provider of corporate IT and process training, with the largest portfolio of strategic partners and courses in Australia. We partner with world-class companies to help organisations and individuals in the IT industry remain up-to-date with new processes, technology and platforms to reduce risk and enable efficient business practices. We have convenient locations in almost every capital in Australia as well as the Philippines, flexible delivery modalities, industry-accredited trainers, and state-of-the-art course material and labs to produce the highest quality learning outcomes for our clients.DDLS promotes a balanced approach to training with a focus on the key areas of Technology, Process and People. We provide extensive training options tailored to your organisation’s needs – from vendor-certified courses to customised training, including bespoke in-house developed courses.
BeyondTrust Software logo
BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organisations to secure and manage their entire universe of privileges. Our integrated products and platform offer...
BeyondTrust Software logo

BeyondTrust Software

BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organisations to secure and manage their entire universe of privileges. Our integrated products and platform offer the industry's most advanced PAM solution, enabling organisations to quickly shrink their attack surface across traditional, cloud and hybrid environments. The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organisations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance. Our products enable the right level of privileges for just the time needed, creating a frictionless experience for users that enhances productivity. With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 70 percent of the Fortune 500, and a global partner network. Learn more at www.beyondtrust.com.
Anomali logo
Anomali is the leader in intelligence-driven cybersecurity. More than 1,500 public and private sector organizations rely on Anomali to see and detect threats more quickly, reduce the risk of security...
Anomali logo

Anomali

Anomali is the leader in intelligence-driven cybersecurity. More than 1,500 public and private sector organizations rely on Anomali to see and detect threats more quickly, reduce the risk of security breaches, and improve the productivity of security operations Anomali solutions serve customers around the world in nearly every major industry vertical, including many of the Global 2000. As an early threat intelligence innovator, Anomali was founded in 2013 and is backed by leading venture firms including GV, Paladin Capital Group, In-Q-Tel, Institutional Venture Partners, and General Catalyst.
Synopsys Software Integrity Group logo
Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition a...
Synopsys Software Integrity Group logo

Synopsys Software Integrity Group

Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.
Securonix logo
Securonix named the Trust Award Winner in the “Best SIEM Solution” category for the 2021 SC Awards. Securonix is redefining SIEM for today’s hybrid cloud, data-driven enterprise. Built on big data arc...
Securonix logo

Securonix

Securonix named the Trust Award Winner in the “Best SIEM Solution” category for the 2021 SC Awards. Securonix is redefining SIEM for today’s hybrid cloud, data-driven enterprise. Built on big data architecture, Securonix delivers SIEM, UEBA, SOAR, Security Data Lake, NDR, and vertical-specific applications as a pure SaaS solution with unlimited scalability and no infrastructure cost. Securonix reduces noise, prioritizes high fidelity alerts, and detects and responds to advanced insider and cyber threats with behavioral analytics technology that pioneered the UEBA category.
Funded by world-class investors including Silver Lake Partners, Sequoia Capital, GV, Riverwood Capital, and others, SecurityScorecard is the global leader in cybersecurity ratings with more than 5 mil...

SecurityScorecard

Funded by world-class investors including Silver Lake Partners, Sequoia Capital, GV, Riverwood Capital, and others, SecurityScorecard is the global leader in cybersecurity ratings with more than 5 million companies continuously rated. Founded in 2013 by security and risk experts, Dr. Aleksandr Yampolskiy and Sam Kassoumeh, SecurityScorecard’s patented rating technology is used by over 16,000 organizations for enterprise risk management, third-party risk management, board reporting, due diligence, and cyber insurance underwriting. SecurityScorecard continues to make the world a safer place by transforming the way companies understand, improve and communicate cybersecurity risk to their boards, employees, and vendors. Every company has the universal right to their trusted and transparent Instant SecurityScorecard rating.
RSA logo
NetWitness, an RSA® Business, provides comprehensive and highly scalable threat detection and response capabilities for organizations around the world. The NetWitness Platform delivers complete visibi...
RSA logo

RSA

NetWitness, an RSA® Business, provides comprehensive and highly scalable threat detection and response capabilities for organizations around the world. The NetWitness Platform delivers complete visibility combined with applied threat intelligence and user behavior analytics to detect, prioritize, investigate threats, and automate response. This empowers security analysts to be more efficient and stay ahead of business-impacting threats

RSA, a leader in cybersecurity and risk management solutions, provides organizations with technology to address challenges across security, risk management and fraud prevention in the digital era. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user access control; and reduce operational risk, fraud and cybercrime. RSA protects millions of users around the world and helps more than 90 percent of the Fortune 500 companies thrive and continuously adapt to transformational change.

Secureworks is 100% focused on cybersecurity. In fact, it’s all we do. For nearly two decades, we’ve committed to fighting the adversaries in all their forms and ensuring that organizations like yours...

Secureworks

Secureworks is 100% focused on cybersecurity. In fact, it’s all we do. For nearly two decades, we’ve committed to fighting the adversaries in all their forms and ensuring that organizations like yours are protected.Secureworks® Taegis™, a cloud-native security analytics platform built on 20+ years of real-world threat intelligence and research, improves your ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions.

ManageEngine logo
ManageEngine is the enterprise IT management division of Zoho Corporation. Established and emerging enterprises–including 9 of every 10 Fortune 100 organizations - rely on our real-time IT management...
ManageEngine logo

Zoho Corporation (ManageEngine)

ManageEngine is the enterprise IT management division of Zoho Corporation. Established and emerging enterprises–including 9 of every 10 Fortune 100 organizations - rely on our real-time IT management tools to ensure optimal performance of their IT infrastructure, including networks, servers, applications, desktops, and more. We have offices worldwide, including the United States, the Netherlands, India, Singapore, Japan, China, and Australia as well as a network of 200+ global partners to help organizations tightly align their businesses and IT.
Gigamon logo
Gigamon helps the world’s leading organisations run fast, stay secure and innovate. We provide the industry’s first Guided-SaaS NDR (network detection and response) solution which closes the Security...
Gigamon logo

Gigamon

Gigamon helps the world’s leading organisations run fast, stay secure and innovate. We provide the industry’s first Guided-SaaS NDR (network detection and response) solution which closes the Security Operations Center (SOC) visibility gap, removes unnecessary distractions and provides expert advisory guidance when it matters most. With visibility into network traffic across their entire hybrid cloud infrastructure, organizations eliminate security blind spots while benefiting from Gigamon security expert guidance, helping improve SOC effectiveness and reducing burnout of their security teams. Gigamon has been awarded over 90 technology patents and enjoys world-class customer satisfaction with more than 4,000 organisations, including over 80 percent of the Fortune 100 and hundreds of government and educational organisations worldwide. Headquartered in Silicon Valley, Gigamon operates globally. For the full story on how Gigamon can help you to run fast, stay secure and innovate, please visit www.gigamon.com and follow us on Twitter. and LinkedIn.

AustCyber Stand

Cydarm logo
Founded in Australia in 2017, Cydarm Technologies was one of the first graduates of CyRise, Australia’s cyber security start-up accelerator. Our mission is to enable cyber resilience through better an...
Cydarm logo

Cydarm

Founded in Australia in 2017, Cydarm Technologies was one of the first graduates of CyRise, Australia’s cyber security start-up accelerator. Our mission is to enable cyber resilience through better and faster security operations.

The Cydarm platform provides security case management for cyber incident response. Cydarm supports best practice in incident response, with streamlined workflows, response playbooks, metrics and reporting, integration, and orchestration.

Tikabu logo
Tikabu is a software company specialising in cyber security and cyber hygiene. Glue is our proprietary cyber-hygiene software tool that empowers you to optimise your security posture. With Glue, we ca...
Tikabu logo

Tikabu

Tikabu is a software company specialising in cyber security and cyber hygiene. Glue is our proprietary cyber-hygiene software tool that empowers you to optimise your security posture. With Glue, we can consolidate data from your IT and security-management tools to identify gaps in your coverage and the effectiveness of your security controls. It provides teams with a single source of truth for reporting corporate security requirements. What’s more, it keeps both internal and external service providers honest and accountable.
Daltrey logo
Daltrey is an Australian biometric identity provider, with a mission to redefine how identity is used to create safer, more secure environments. In a climate where the threat of a security breach cont...
Daltrey logo

Daltrey

Daltrey is an Australian biometric identity provider, with a mission to redefine how identity is used to create safer, more secure environments. In a climate where the threat of a security breach continues to worsen, adopting a holistic security capability is no longer a luxury, but a basic requirement for government, enterprise and critical infrastructure. To meet this challenge, we create a single biometric credential that can be used across all access points of an organisation, both physical and digital. This gives stakeholders the ability to manage who accesses what, when and where – securely and conveniently.
Osint Combine logo
OSINT Combine is an Australian veteran owned & operated businesswho specialize in open-source intelligence (OSINT) training & software. We have successfully delivered advanced OSINT training & softwar...
Osint Combine logo

Osint Combine

OSINT Combine is an Australian veteran owned & operated businesswho specialize in open-source intelligence (OSINT) training & software. We have successfully delivered advanced OSINT training & software globally to Government organizations including national intelligence agencies, tri-service military, local & federal law enforcement through to private sector organizations including Fortune 500 & ASX 200 companies built on decades of experience working in complex, multi-national environments around the world. We provide a series of delivery options including instructor led training, bespoke customer-tailored training, & have online self-paced OSINT Academy avaialble at https://academy.osintcombine.com. We are truly unique in the OSINT training space.We are also a leading OSINT software provider in Australia with our NexusXplore platform which is simply a global leader in providing scale & efficiency for organizations to find, explore & understand open source information all from a single interface. Check out www.nexusxplore.com for more information.We are internationally recognized as OSINT leaders. Trusted & reliable
Truuth logo
Truuth was founded in 2018 with a mission to deliver the world’s most accurate, secure, and user-friendly digital identity services. Truuth’s suite of digital identity services provide industry-leadin...
Truuth logo

Truuth

Truuth was founded in 2018 with a mission to deliver the world’s most accurate, secure, and user-friendly digital identity services. Truuth’s suite of digital identity services provide industry-leading confidence levels for online user authentication with a focus on the highest risk scenarios where the risk of authenticating the wrong user can have catastrophic consequences. Use cases include onboarding employees, authenticating users for high value transactions, providing multi-factor authentication for access to secure buildings, data repositories, and removal of insecure passwords from admin accounts. Truuth’s combination of multi-biometric authentication linked to rigorous identity proofing and tests of user liveness is unmatched in the market. Our enterprise clients in the finance, telecom, and insurance sectors vouch for the superior security and ease-of-use of truuth’s SaaS solutions.

Coffee Cart

CSC is the trusted provider of choice for the Forbes Global 2000 and the 100 Best Global Brands® in enterprise domain names, domain name system (DNS), digital certificate management, as well as digita...

CSC

CSC is the trusted provider of choice for the Forbes Global 2000 and the 100 Best Global Brands® in enterprise domain names, domain name system (DNS), digital certificate management, as well as digital brand and fraud protection. As global companies make significant investments in their security posture, CSC can help them understand known security blind spots that exist and help them secure their digital assets. By leveraging CSC’s proprietary solutions, companies can get secure to protect against cyber threats to their online assets, helping them avoid devastating revenue loss, brand reputation damage, or significant financial penalties because of policies like the General Data Protection Regulation (GDPR). CSC also provides online brand protection—the combination of online brand monitoring and enforcement activities—taking a holistic approach to digital asset protection, along with fraud protection services to combat phishing. Headquartered in Wilmington, Delaware, USA, since 1899, CSC has offices throughout the United States, Canada, Europe, and the Asia-Pacific region. CSC is a global company capable of doing business wherever our clients are—and we accomplish that by employing experts in every business we serve. Visit cscdbs.com.
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organisations to securely connect the right people to the right technologies at the right time....

Okta

Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organisations to securely connect the right people to the right technologies at the right time. With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 10,000 organisations, including Beach Energy, JetBlue, Nordstrom, Takeda Pharmaceutical, Teach for America, T-Mobile and Twilio, trust Okta to help protect the identities of their workforces and customers.
BeyondTrust Software logo
BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organisations to secure and manage their entire universe of privileges. Our integrated products and platform offer...
BeyondTrust Software logo

BeyondTrust Software

BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organisations to secure and manage their entire universe of privileges. Our integrated products and platform offer the industry's most advanced PAM solution, enabling organisations to quickly shrink their attack surface across traditional, cloud and hybrid environments. The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organisations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance. Our products enable the right level of privileges for just the time needed, creating a frictionless experience for users that enhances productivity. With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 70 percent of the Fortune 500, and a global partner network.

Networking Drinks

3Columns logo
3Columns is a cyber security consulting company which inherits a unique business model. We not only provide end-to-end cybersecurity services but also professional and managed services to ensure cyber...
3Columns logo

3Columns

3Columns is a cyber security consulting company which inherits a unique business model. We not only provide end-to-end cybersecurity services but also professional and managed services to ensure cyber security is embedded at the core of your infrastructure. Specialising in the full spectrum ensures that our customers experience a one stop shop and a fully actionable strategic roadmap can be created to deliver your business outcomes. Ultimately this approach allows more secure and confident clients who can continue to grow whilst staying protected from the changing cyber threat landscape.

Juice Bar

One Identity logo
One Identity, a Quest Software business, helps organizations establish an identity-centric security strategy. With a unique identity and access management (IAM) portfolio, our award-winning offering i...
One Identity logo

One Identity

One Identity, a Quest Software business, helps organizations establish an identity-centric security strategy. With a unique identity and access management (IAM) portfolio, our award-winning offering includes identity governance, AD-centered IAM, privileged access management and identity SaaS solutions, One Identity helps organizations secure their enterprise end to end, smoothly make their digital transformation, eliminate identity challenges and reduce their attack surface from internal and external threats. Our unequalled commitment to our customers’ long-term IAM success is evident in our 7,500 customers worldwide that rely on us to manage more than 125 million identities.

Lanyard

Privasec is one of the fastest growing independent security, governance, risk and compliance consulting firms in South East Asia and Australia. We are driven by business outcomes bridging the gap betw...

Privasec

Privasec is one of the fastest growing independent security, governance, risk and compliance consulting firms in South East Asia and Australia. We are driven by business outcomes bridging the gap between the technical and business worlds to create meaningful business cases and enhance decision making. We have two lines of businesses across GRC and RED servicing Government, Financial Services, Legal, Retail, IT, Health, Entertainment and Not-for-Profit sectors. • Privasec GRC are the specialists in Governance, Risk and Compliance which covers ISO27001, ISO31000, NIST, ISM IRAP, PCI DSS, SOC2, APRA CPS 234, GDPR, the Australian Privacy Act and other key regulations required to operate in today’s market. • Privasec RED are leaders in Security and Penetration Testing, Drone Security, Red Team Attack simulations, Physical Intrusions, Theft simulations, Open Source Intelligence Gathering (OSINT), Social Engineering, and Phishing. To learn more about us and our services: www.privasec.com or call 1800 996 001 for more information.
© Cybercon Connect. All rights reserved.
Site by George.