Industry Thought Leaders
We understand the importance in having the correct audience surrounding you and your team on site, that is why we only look to invite and select the absolute leaders within each of their respected fields to attend the Summit.
Star Keynotes and Presenters
We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program.
Keeping in line with the main goal of our events in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails, gala dinners and informal introductions.
The CISO Leaders Summit Australia will highlight the emerging technologies that are leading the way and will examine current challenges that CISOs are faced with. The Summit will provide CISO professionals with a unique opportunity to learn and interact with their peers through a series of professionally led sessions hosted by both international and local experts, allowing all attendees the opportunity to be informed by front line executives while also having the opportunity to engage with a unique group of key suppliers through targeted pre-arranged meeting sessions.
New Zealand’s cyber security strategy
Paul Blowers —Chief Information Security Officer, New Zealand Police Force, Special Advisor National Cyber Policy Office, Department of Prime […]Read More
Cyber Crime, the changing landscape, insider threats
Jennifer Stockwell, National Cyber Security Advisor at Telstra, moderated the panel: Cyber Crime, the changing landscape, insider […]Read More
Working with suppliers to uplift their cyber security maturity
Wouter Veugelen, Chief Information Security Officer at Primary Health Care Limited presented the case study: Working with suppliers to uplift their […]Read More
Context, Collaboration, and Culture
Richard Addiscott, Director of IT Planning and Security at Curtin University presented the session “Three C’s of an effective information security […]Read More