WHERE Stock Exchange Hotel, 131 Edward Street, Brisbane
WHEN Thursday 19 May, Arrive 3.30pm
RSVP Thursday 12 May
Techniques to attack computer networks are never static. Methods and tools evolve, as do the attackers themselves. The attacker landscape from a few years ago—where individuals or small groups attacked organisations for fun and profit—no longer exists.
The truth is, cyber security that was good enough in the past isn’t any more. Cyber attackers have become more sophisticated, technology is more complex and security experts are in short supply. You need the tools and resources to protect your infrastructure across multiple fronts. It’s not a matter of IF you will be breached, but WHEN you will be breached. The odds are stacked against you.
Attend Comlinx TechEd to even the odds. This free event offers insights on high-profile breaches, practical advice from top security experts and customer stories that demonstrate the true value of effective security.
Session topics include:
• The state of the threat landscape
• The real cost of “good enough” security
• How to make the most of threat intelligence
• New threats, new intelligence and new strategies
Zscaler, Vice President of Asia Pacific and Japan, Scott Robertson
We are lucky enough to welcome Scott Robertson, Vice President of Asia Pacific and Japan for Zscaler. Scott has over 20 years experience in IT and IT Security, having previously held senior leadership positions at WatchGuard, CRYPTOcard and Microsoft. Scott has a combined MBA from the University of Washington and Macquarie Graduate School of Management, with a concentration in entrepreneurial studies
A data breach happens in seconds, however, most companies take up to six months to recognise that a breach has even occurred. In 80% of cases, companies are blind to the fact that a breach has ever taken place…..…
A10, Regional Manager, Tim Blombery
According to a survey by Gartner, “less than 20% of organisations with a firewall, an intrusion prevention system (IPS) or a unified threat management (UTM) appliance decrypt inbound or outbound SSL traffic.” This means that for over 80% of organisations, attackers can simply tunnel attacks in SSL traffic to circumvent defenses.
To stop cyber threats like malware and targeted attacks, businesses need to inspect all types of traffic, including encrypted SSL communications. A10’s Tim Blombery is an expert in Network security and will talk the group through how to Protect Critical Assets without Degrading Firewall Performance.
FireEye, Director Systems Engineering, Rich Costanzo
Security professionals are already strained from meeting the demands of their day to day jobs. A security incident can push security teams to the breaking point. FireEye Director Systems Engineering, Rich Costanzo will discuss how companies can be better prepared during an incident response scenario. Whether it’s before, during, or post-incident, there are best practices that can be conducted to make sure you get through the crisis.
Juniper Networks, System Engineering Manager – Enterprise Solution, Michael Purcell
Today’s layered security model (based on perimeter security) is not enough to protect against new sophisticated threats and the increasing surface area of possible attacks. As malware evolves and its attacks become more specialized and highly targeted, a new category of advanced security has also emerged that can detect, analyze, and prevent these advanced threats, which are able to bypass traditional security methods. Juniper Networks’ Systems Engineering Manager, Michael Purcell, will discuss the application of Software Defined Secure Networks and how it delivers a more agile security model by leveraging the cloud to solve current network security issues more effectively.
To contact Comlinx, email email@example.com or telephone 07 3852 9800.