In pictures: Symantec Symposium
Symantec Australia held its annual symposium at the Sydney convention centre. Delegates heard insights from Symantec's Brenton Smith, Sean Kopelke and Fujitsu’s John Kaleski.
05 Sep | View galleries
A capacity crowd of security executives attended CSO Australia’s SecureIT conference this month, with a compelling lineup that was kicked off by former LulzSec hacker Mustafa al-Bassam, whose exploits hacking top-tier businesses landed him in handcuffs at just 16 years old.
David Braue | 18 Jun | Read more
Cisco's Kate Pearce presented at this year's AusCERT conference on of embracing diversity in the security industry and not living and working in an infosec echo chamber. Her focus was on the small differences we can bring in and the big difference they can make.
Anthony Caruana | 16 Jun | Read more
Working alongside the Prime Minister’s special adviser for all things cyber gives Jacob Boyle a unique perspective on the government’s role in securing the country – not just with all the services offered by government but also in working with businesses and the security industry.
Anthony Caruana | 13 Jun | Read more
The relaunching of the McAfee brand as a standalone company – after 7 years in which the company formerly known as Intel Security functioned as a division of Intel – will give the security giant more latitude to capitalise on runaway demand across the Asia-Pacific region, according to the company’s regional head.
David Braue | 04 Apr | Read more
If you’re a security executive new to an organization you know better than most that you often suffer from not knowing the state of your security posture and because of this you are forced to operate tactically. What’s needed is a baseline about the current state of your security posture across people, process and technology which ultimately alleviates headaches and allows you to approach security more strategically.
Brian Contos | 07 Mar | Read more
The C-suite is getting a little more crowded these days. Pull up a chair for the chief data officer, and it might be next to the CISO.
Stacy Collett | 14 Dec | Read more
Developing plans to protect your digital information and network while complying with state and federal regulations can be a legal challenge for any corporation. Is relying on in-house counsel enough, or should companies have a cybersecurity attorney on retainer?
Kacy Zurkus | 05 Aug | Read more
Immunity Inc.'s Dave Aitel talks about disclosure, bounty programs, and vulnerability marketing with CSO, in the first of a series of topical discussions with industry leaders and experts.
Steve Ragan | 07 Jul | Read more
WhiteHat's Robert Hansen talks about disclosure, bounty programs, and vulnerability marketing with CSO, in the first of a series of topical discussions with industry leaders and experts.
Steve Ragan | 30 Jun | Read more
BeyondTrust's Morey Haber talks about disclosure, bounty programs, and vulnerability marketing with CSO, in the first of a series of topical discussions with industry leaders and experts.
Steve Ragan | 30 Jun | Read more
Interactive reference guide for Security services wins/references.