Loading Events

Leaders Roundtable: From Boardroom to Endpoint: A Comprehensive Approach to Cybersecurity


We’ve concluded another successful event! Thanks to everyone for their Valuable contributions.

->Click here to explore hightlights and key takeaways from this Roundtable session.


Cyber threats are continuously evolving, with attackers developing increasingly sophisticated methods to exploit vulnerabilities. This makes cybersecurity a never-ending arms race.

No organisation with data is immune to cyberattacks!

A successful breach can lead to financial losses, operational disruptions, data exposure, reputational damage, and intellectual property theft, all of which can severely impact an organisation.

Ecosystm research finds that in Australia:

  • 51% of cyber leaders claim they do not have a thorough, accurate assessment of cybersecurity posture and risk
  • 50% of cyber teams find implementing and maintaining multiple cyber tools challenging
  • A staggering 67% of organisations only test their incident response plans annually

The explosion of technology and collaborative apps creates a double-edged sword for security leaders.  While it boosts productivity, it also expands the attack surface and increases security complexity. The increasing frequency and sophistication of cyber-attacks demand a proactive and well-informed approach to cybersecurity.

Join us at this exclusive executive roundtable to explore the complexities of today’s cyber environment with peers. Gain the knowledge and explore the tools to navigate cyber challenges confidently.

The discussion will focus on best practices for:

  • Tackling Business Challenges Head-On. Secure users, safeguard customer engagement, and protect critical assets like PII and patient records.
  • Comprehensive Attack Surface Awareness. Understand the attack surface of collaboration platforms, learn about current threat vectors, and discover effective mitigation strategies.
  • Human-Centric Cybersecurity. Educate your workforce to prevent phishing, improve incident response, and ensure a robust crisis plan.
  • Boardroom Strategies. Communicate technical issues to non-technical stakeholders and integrate education into your cyber resilience strategy.
  • Mitigation and Response Tactics. Learn global boardroom strategies and bridge the gap between technology and security awareness through external measures and education.
0
Venue:
The Atlantic
176 Cumberland St, The Rocks NSW 2000,
NSW 2000, Auckland 2000 Australia
Venue Directions
+61292506000
Website:
http://www.shangri-la.com/sydney/shangrila/dining/restaurants/altitude-restaurant/
Share this Event:

SPEAKERS

Image
Tim Sheedy
VP Research
Ecosystm

SPONSORS

Image
NEC
NEC Corporation, a prominent Japanese multinational, specializes in telecommunications equipment and related software and services, with its headquarters located in Tokyo.

Established in 1899, Nippon Electric Company, Ltd. (now officially NEC Corporation since 1983) was initially funded by Western Electric Company of the United States. The Japanese side of the venture was spearheaded by Iwadare Kunihiko, a telegraphic systems expert who had spent a decade in the U.S. working with inventor Thomas Edison. This partnership marked Japan's first joint venture with a foreign company, facilitating Western Electric's export of telephone equipment to the Japanese government. Over time, as Western Electric grew more confident in Japan's patent administration, it provided technical support that allowed NEC to progress from merely assembling to manufacturing telephone equipment.
Image
Check Point
Check Point Software Technologies is a global leader in cyber security solutions, dedicated to protecting corporate enterprises and governments worldwide.

THE VENUE

CONTACT US