Group_33592[1]
Layer_2[1]

Your monthly cyber security update

PARTICIPATING VENDORS

 

Incenta-LP Header Overlay-1466x600-Illumio


WIN THE CYBERWAR WITH ZERO TRUST
Virtual  | 2nd May |  11:00am-12:00pm AEDT

Zero Trust is revolutionising network security architecture: it is data and device-centric and designed to stop data breaches while protecting critical infrastructure and making cyber-attacks unsuccessful. 

In this session, the Creator of Zero Trust, John Kindervag and NEXTGEN’s Cyber Guru, Hayden Loader will discuss the reality of the concept of Zero Trust. Additionally, John will explain how adopting Zero Trust leads to accelerated and more secure cloud adoption.

John-Kindervag-Headshot-200x200
Incenta-LP Header Overlay-1466x600-Illumio

John Kindervag
Creator of Zero Trust, Chief Evangelist at Illumio
Learn more about John

Headshot-Loader-H-153
NEXTGEN Group Logo-COL

Hayden Loader
Cyber Security Systems Engineer
Learn more about Hayden

REGISTER NOW

link

CATCH UP ON PREVIOUS SESSIONS

ibm-logo-3

Cyber Security in the Era of Generative AI

Join Chris Hockings, IBM Cyber Security CTO for APAC, NEXTGEN's Cyber Guru, Hayden Loader as they discuss Generative AI and how it can be leveraged in the world of cyber security.

In this session, Chris will talk through the cybersecurity journey of AI and how’s being used and expanded to incorporate the ChatGPT craze, and what that impact will be for security professionals.

SUSE Logo-H-New-COL

Adopting a Zero Trust Approach to Container Security

Join Peter Lees Head of Solution Architecture, Asia-Pacific at SUSE and NEXTGEN's Cyber Guru, Hayden Loader as they discuss the changing threat landscape considering the latest threat research and explore key steps to maintain visibility and manage risks.

Session resources

Forescout Logo-COL

Staying ahead of the cyber risks of IT/OT convergence 

Across all industries modern organisations are connecting people, sites, and things to be more agile and leverage technology and data for analytics, new services, increased efficiency, and automation. This change in our ways of working is increasing our attack surface and requires us to take a more comprehensive approach when building out our cyber resilience strategies.

Join Christina Hoefer, Vice President of Global Industrial Enterprise at Forescout Technologies and NEXTGEN's Cyber Guru, Hayden Loader as they discuss the changing threat landscape considering the latest threat research and explore key steps to maintain visibility and manage risks.

Session resources

CrowdStrike-Okta-Logo

The State of Securing Digital Identity

Protecting digital identities has never been more crucial as cyber attacks rapidly increase in sophistication and volume. And the question remains: How effectively are organisations maintaining rigorous security measures, and what strategies are they harnessing against the menace of compromised credentials? More importantly, what does it look like when identity management is executed to perfection?

Session resources

Arista Logo-COL

Building Trust from Scratch: Unleashing the Power of Zero Trust Environments for Customer Success.

Re-watch cyber guru, Hayden Loader and special guest Rudolph Araujo, VP, Security Product Strategy & Business Development, at Arista Networks, as they discuss how best-in-class organisations have approached the zero trust journey by leveraging maturity models from the likes of the Cybersecurity and Infrastructure Agency (CISA) and the analyst firm Forrester.

Session resources

Rubrik Logo-H-COL

The Hard Truths Of Data Security featuring Rubrik

That’s one of the several alarming findings from Rubrik Zero Labs’s inaugural report, “The State of Data Security: The Human Impact of Cybercrime,” which examines how the constant threat of cyber-attacks is affecting organisations and the people charged with protecting them.

Join NEXTGEN's Cyber Guru, Hayden Loader, and special guest Steve Stone, Head of Zero Labs at Rubrik, as they explore the findings of the report and discuss the challenges IT and security decision-makers face, the impacts of these challenges, and potential solutions.

Session resources

1280px-OpenText_logo.svg

Mitigating software supply chain risk featuring Opentext

Cyber Security Strategist Irfan Najeeb from Opentext Cybersecurity, joins NEXTGEN's Cyber Guru, Hayden Loader as they explore key industry trends and emerging threat landscapes, robust zero-trust security controls, integrating security within DevOps, adopting a shift-left approach to application security, empowering developer talent and, when necessary, protecting data by securing sensitive information.

Session resources

 

NEXTGEN Group Logo-COL

CONFUSION TO CONFIDENCE: Fed Gov Cybersecurity Compliance Explained.

NEXTGEN Group's Hayden Loader hosts special guest panellists, Hamish Hansford (Department of Home Affairs), Alexandra Caples (Australian Strategic Policy Institute), and Mick Lehmann (NEXTGEN’s FedGov lead) as they share unique insights into why the game has changed for critical infrastructure’s cyber security; what the new obligations and timelines are; and what the future holds.

Session resources

Palo Alto Logo-COL

Secure Access Service Edge (SASE): Multi-cloud must-have or over-hyped sales jargon? Featuring Palo Alto Networks

In a post pandemic hybrid work environment where workloads are increasingly being moved to cloud, a security posture that complements and aligns to this shift is paramount. Hayden Loader along with Palo Alto Networks’ ANZ CTO, Riccardo Galbiati, share unique insights to the commercial and technical opportunity available to partners via SASE.

Session resources

Okta Logo-NEW-BLK

Evolving Threat Landscape Around Identity Featuring Okta

Join NEXTGEN Group's Hayden Loader along with Okta's Clare Robson and Ben Lanciano Finding, that almost all APAC companies surveyed will have a Zero Trust strategy in plan or in play by the end of 2022. Many of these organisations have moved beyond the preliminary phases of implementation such as MFA, SSO and connected used directories.

Session resources

Netskope Logo-H-COL

How Secure Are Hybrid Work Environments? Featuring Netskope

NEXTGEN Group's cyber guru, Hayden Loader joins Netskope's Con Ioannou for a virtual fireside chat to discuss the best practices for securing Hybrid Work with topics such as contextual and private access, dealing with sanctioned & non-sanctioned apps, detecting threats and preventing data loss, and cloud visibility.

Session resources

NGG Overwatch VSP+Border-COL-REV

 

XM Cyber Logo-INV-01

PART #3: PARTNER OPPORTUNITY: XM CYBER + NEXTGEN

Join NEXTGEN's Hayden Loader for PART #3 of our 3-PART DEEP DIVE with XM Cyber’s VP Asia Pacific and Japan, Stree Naidu.

 

XM Cyber Logo-INV-01

Join NEXTGEN's Hayden Loader for PART #2 of our 3-PART DEEP DIVE on CTEM with XM Cyber’s VP Asia Pacific and Japan, Stree Naidu

Continuous Threat Exposure Management (CTEM) is a proactive and continuous five-stage program or framework that helps organizations monitor, evaluate, and reduce their level of exploitability and validate that their analysis and remediation processes are optimal. Organisations worldwide are leveraging CTEM to efficiently address exposures and improve their security posture.

 

XM Cyber Logo-INV-01

Continuous Threat Exposure Management (CTEM) is a proactive and continuous five-stage program or framework that helps organizations monitor, evaluate, and reduce their level of exploitability and validate that their analysis and remediation processes are optimal. Organisations worldwide are leveraging CTEM to efficiently address exposures and improve their security posture.

Learn more about CTEM and XM Cyber in NEXTGEN’s latest Overwatch Session hosted by Hayden Loader and featuring XM Cyber’s Vice President for Asia Pacific and Japan Mr Stree Naidu.

RECENT ARTICLES

SOCI-COMPLIANCE

MEET YOUR SOCI OBLIGATIONS
WITH NEXTGEN

The Security of Critical Infrastructure Act 2018 (SOCI) is a key compliance obligation that cuts to the core of Australia’s cyber security strategy. SOCI is in the news because the Government wants to make Australia a world leader in cyber security by 2030. As part of this, SOCI’s obligations have been significantly broadened and strengthened across Australia’s 11 new critical infrastructure sectors. The clock is ticking to meet these obligations, with the compliance grace period running out on 17 August this year.

Find out more

cyber security blog

A STRATEGIC VIEW OF THE RAPIDLY CHANGING BATTLEFIELD

There is a military adage that also rings true for cyber security. A leader is always asking themselves: “What now? What next? What if?” As the impacts of the Optus breach ripple out through the community, we’re reminded of that wisdom … and of the warning from the Government’s last Cyber Threat Report that Australia faces 

Read more

Blog+News+Events-Image-Lehmann-Story-4

REGULATORY OBLIGATIONS: SO…WHAT’S A SOCI?

Like other countries, Australia’s economic, social, and political futures will be significantly digital. To help secure these futures, Government has strengthened the Security of Critical Infrastructure Act (SOCI) through two large amendments, which are broad and far-reaching in their impact on business in Australia’s 11 new critical infrastructure sectors.

Read more

Blog+News+Events-Image-Lehmann-Story-3

REGULATORY OBLIGATIONS: THERE'S NOW AN 18-MONTH DEADLINE TO IMPLEMENT A CRITICAL INFRASTRUCTURE RISK MANAGEMENT PROGRAM

The implementation of Australia’s #criticalinfrastructure reforms (SOCI 2018) is continuing and gaining practical momentum. On 17 Feb, Minister Claire O’Neil activated the legislation’s Risk Management Program (RMP) obligations for 13 specific critical infrastructure asset classes, including data processing and storage, and payment systems.

Read more

Have a question? Need help? Contact the NEXTGEN team today!

We look forward to hearing from you!

Contact Us