BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Australian Cyber Security Magazine - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Australian Cyber Security Magazine
X-ORIGINAL-URL:https://australiancybersecuritymagazine.com.au
X-WR-CALDESC:Events for Australian Cyber Security Magazine
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20140101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150916
DTEND;VALUE=DATE:20150918
DTSTAMP:20260406T054333
CREATED:20150908T201517Z
LAST-MODIFIED:20150908T205241Z
UID:6617-1442361600-1442534399@australiancybersecuritymagazine.com.au
SUMMARY:CIO Leaders Summit Australia - Melbourne
DESCRIPTION:The CIO Leaders Summit Australia 2015 is invitation only and intended for Australia’s senior IT leaders to gather for a strategic one day event in order to exchange knowledge and interact as one over a range of important issues facing the industry. The one-to-one meetings with leading supplier companies will also provide a wealth of knowledge and offer opportunities for all attending delegates\, while the informal networking sessions promise to create a unique interactive forum.
URL:https://australiancybersecuritymagazine.com.au/event/cio-leaders-summit-australia-melbourne/
LOCATION:Novotel Melbourne On Collins\, 270 Collins St \, Melbourne\, VIC\, 3000\, Australia
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20150917T090000
DTEND;TZID=UTC:20150917T094500
DTSTAMP:20260406T054333
CREATED:20150908T210436Z
LAST-MODIFIED:20150908T210436Z
UID:6625-1442480400-1442483100@australiancybersecuritymagazine.com.au
SUMMARY:Protecting critical value data from the inside
DESCRIPTION:More than one-third of all cybercrime incidents and security breaches are caused by insiders. Insiders have many motivations\, including financial\, political or emotional. But no matter the reason\, insiders inappropriately access an organisation’s critical value data. \nJoin Keith Lowry\, Senior Vice President of the Business Threat Intelligence and Analysis Team at Nuix and Stan Gallo\, Director and National Leader of Forensic Technology at KPMG\, as they cover: \n\nThe definition of an insider threat\nWhat organisations are doing wrong in their approach to managing insider threats\nHow to design and implement an insider threat program.\n\nRegister your details now to learn more. If you can’t attend\, a recording will be made available via email after the webinar. \nVisit http://info.nuix.com/protecting-critical-value-data-from-inside-webinar-ASM.html to register now!
URL:https://australiancybersecuritymagazine.com.au/event/protecting-critical-value-data-from-the-inside/
ATTACH;FMTTYPE=image/jpeg:https://australiancybersecuritymagazine.com.au/wp-content/uploads/2015/09/nuix.jpg
END:VEVENT
END:VCALENDAR