Your monthly cyber security update
PARTICIPATING VENDORS
OVERWATCH SESSIONS ARE NOW COMPLETE FOR THIS YEAR, STAY TUNED FOR MORE EXCITING OVERWATCH CONTENT IN THE NEW YEAR!
CATCH UP ON PREVIOUS SESSIONS
The State of Passwordless – Insights & Trends
Increasingly, enterprises are removing them altogether, to eliminate these attack vectors and make it significantly harder for unauthorized users to gain access. NEXTGEN’s Cyber Guru, Hayden Loader unpacks this topic and findings of this report with OpenText’s Director of Product Marketing, Harley Adams & Senior Product Marketing Manager, Kent Purdy
Session resources
Cyber Resilience
For a deeper understanding of the cybersecurity landscape in Australia and New Zealand, and to learn more strategies for enhancing cyber defences, join Commvault’s APAC CTO, Gareth Russell and NEXTGEN’s Cyber Guru, Hayden Loader as they unpack and discuss the findings of this report.
Session resources
Defining Human-Centric Security Beyond Awareness and AI
Watch this session to take a closer look at the findings from Proofpoint’s 2024 State of the Phish and Data Loss Landscape Reports. In the session, Director of Cybersecurity Strategy for Asia-Pacific and Japan (APJ) at Proofpoint, Jennifer Cheng and NEXTGEN’s Cyber Guru, Hayden Loader will discuss the shift from security awareness to human risk management. They will explore sources of human risks, including and beyond novel phishing tactics, and strategies for mitigation.
Session resources
Win the Cyberwar with Zero Trust
Zero Trust is revolutionising network security architecture: it is data and device-centric and designed to stop data breaches while protecting critical infrastructure and making cyber-attacks unsuccessful.
In this session, the Creator of Zero Trust, John Kindervag and NEXTGEN’s Cyber Guru, Hayden Loader will discuss the reality of the concept of Zero Trust. Additionally, John will explain how adopting Zero Trust leads to accelerated and more secure cloud adoption.
Cyber Security in the Era of Generative AI
Join Chris Hockings, IBM Cyber Security CTO for APAC, NEXTGEN's Cyber Guru, Hayden Loader as they discuss Generative AI and how it can be leveraged in the world of cyber security.
In this session, Chris will talk through the cybersecurity journey of AI and how’s being used and expanded to incorporate the ChatGPT craze, and what that impact will be for security professionals.
Adopting a Zero Trust Approach to Container Security
Join Peter Lees Head of Solution Architecture, Asia-Pacific at SUSE and NEXTGEN's Cyber Guru, Hayden Loader as they discuss the changing threat landscape considering the latest threat research and explore key steps to maintain visibility and manage risks.
Session resources
Staying ahead of the cyber risks of IT/OT convergence
Across all industries modern organisations are connecting people, sites, and things to be more agile and leverage technology and data for analytics, new services, increased efficiency, and automation. This change in our ways of working is increasing our attack surface and requires us to take a more comprehensive approach when building out our cyber resilience strategies.
Join Christina Hoefer, Vice President of Global Industrial Enterprise at Forescout Technologies and NEXTGEN's Cyber Guru, Hayden Loader as they discuss the changing threat landscape considering the latest threat research and explore key steps to maintain visibility and manage risks.
Session resources
The State of Securing Digital Identity
Protecting digital identities has never been more crucial as cyber attacks rapidly increase in sophistication and volume. And the question remains: How effectively are organisations maintaining rigorous security measures, and what strategies are they harnessing against the menace of compromised credentials? More importantly, what does it look like when identity management is executed to perfection?
Session resources
Building Trust from Scratch: Unleashing the Power of Zero Trust Environments for Customer Success.
Re-watch cyber guru, Hayden Loader and special guest Rudolph Araujo, VP, Security Product Strategy & Business Development, at Arista Networks, as they discuss how best-in-class organisations have approached the zero trust journey by leveraging maturity models from the likes of the Cybersecurity and Infrastructure Agency (CISA) and the analyst firm Forrester.
Session resources
The Hard Truths Of Data Security featuring Rubrik
That’s one of the several alarming findings from Rubrik Zero Labs’s inaugural report, “The State of Data Security: The Human Impact of Cybercrime,” which examines how the constant threat of cyber-attacks is affecting organisations and the people charged with protecting them.
Join NEXTGEN's Cyber Guru, Hayden Loader, and special guest Steve Stone, Head of Zero Labs at Rubrik, as they explore the findings of the report and discuss the challenges IT and security decision-makers face, the impacts of these challenges, and potential solutions.
Session resources
Mitigating software supply chain risk featuring Opentext
Cyber Security Strategist Irfan Najeeb from Opentext Cybersecurity, joins NEXTGEN's Cyber Guru, Hayden Loader as they explore key industry trends and emerging threat landscapes, robust zero-trust security controls, integrating security within DevOps, adopting a shift-left approach to application security, empowering developer talent and, when necessary, protecting data by securing sensitive information.
Session resources
- Creating a secure software supply chain you can trust
- State of Code Security: The AppSec Maturity Marathon
- Data Discovery: Key to Data Privacy and Cyber Resilience
CONFUSION TO CONFIDENCE: Fed Gov Cybersecurity Compliance Explained.
NEXTGEN Group's Hayden Loader hosts special guest panellists, Hamish Hansford (Department of Home Affairs), Alexandra Caples (Australian Strategic Policy Institute), and Mick Lehmann (NEXTGEN’s FedGov lead) as they share unique insights into why the game has changed for critical infrastructure’s cyber security; what the new obligations and timelines are; and what the future holds.
Session resources
Secure Access Service Edge (SASE): Multi-cloud must-have or over-hyped sales jargon? Featuring Palo Alto Networks
In a post pandemic hybrid work environment where workloads are increasingly being moved to cloud, a security posture that complements and aligns to this shift is paramount. Hayden Loader along with Palo Alto Networks’ ANZ CTO, Riccardo Galbiati, share unique insights to the commercial and technical opportunity available to partners via SASE.
Session resources
Evolving Threat Landscape Around Identity Featuring Okta
Join NEXTGEN Group's Hayden Loader along with Okta's Clare Robson and Ben Lanciano Finding, that almost all APAC companies surveyed will have a Zero Trust strategy in plan or in play by the end of 2022. Many of these organisations have moved beyond the preliminary phases of implementation such as MFA, SSO and connected used directories.
Session resources
How Secure Are Hybrid Work Environments? Featuring Netskope
NEXTGEN Group's cyber guru, Hayden Loader joins Netskope's Con Ioannou for a virtual fireside chat to discuss the best practices for securing Hybrid Work with topics such as contextual and private access, dealing with sanctioned & non-sanctioned apps, detecting threats and preventing data loss, and cloud visibility.
Session resources
Join NEXTGEN's Hayden Loader for PART #2 of our 3-PART DEEP DIVE on CTEM with XM Cyber’s VP Asia Pacific and Japan, Stree Naidu.
Continuous Threat Exposure Management (CTEM) is a proactive and continuous five-stage program or framework that helps organizations monitor, evaluate, and reduce their level of exploitability and validate that their analysis and remediation processes are optimal. Organisations worldwide are leveraging CTEM to efficiently address exposures and improve their security posture.
Continuous Threat Exposure Management (CTEM) is a proactive and continuous five-stage program or framework that helps organizations monitor, evaluate, and reduce their level of exploitability and validate that their analysis and remediation processes are optimal. Organisations worldwide are leveraging CTEM to efficiently address exposures and improve their security posture.
Learn more about CTEM and XM Cyber in NEXTGEN’s latest Overwatch Session hosted by Hayden Loader and featuring XM Cyber’s Vice President for Asia Pacific and Japan Mr Stree Naidu.
RECENT ARTICLES
MEET YOUR SOCI OBLIGATIONS
WITH NEXTGEN
The Security of Critical Infrastructure Act 2018 (SOCI) is a key compliance obligation that cuts to the core of Australia’s cyber security strategy. SOCI is in the news because the Government wants to make Australia a world leader in cyber security by 2030. As part of this, SOCI’s obligations have been significantly broadened and strengthened across Australia’s 11 new critical infrastructure sectors. The clock is ticking to meet these obligations, with the compliance grace period running out on 17 August this year.
A STRATEGIC VIEW OF THE RAPIDLY CHANGING BATTLEFIELD
There is a military adage that also rings true for cyber security. A leader is always asking themselves: “What now? What next? What if?” As the impacts of the Optus breach ripple out through the community, we’re reminded of that wisdom … and of the warning from the Government’s last Cyber Threat Report that Australia faces
REGULATORY OBLIGATIONS: SO…WHAT’S A SOCI?
Like other countries, Australia’s economic, social, and political futures will be significantly digital. To help secure these futures, Government has strengthened the Security of Critical Infrastructure Act (SOCI) through two large amendments, which are broad and far-reaching in their impact on business in Australia’s 11 new critical infrastructure sectors.
REGULATORY OBLIGATIONS: THERE'S NOW AN 18-MONTH DEADLINE TO IMPLEMENT A CRITICAL INFRASTRUCTURE RISK MANAGEMENT PROGRAM
The implementation of Australia’s #criticalinfrastructure reforms (SOCI 2018) is continuing and gaining practical momentum. On 17 Feb, Minister Claire O’Neil activated the legislation’s Risk Management Program (RMP) obligations for 13 specific critical infrastructure asset classes, including data processing and storage, and payment systems.