<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">




CISO Demo Day: 
Threat Detection and Response

Buy Tech. Better.

31 August 2021, 09:30 - 11:35 AEST, Online

Request your FREE place


CISO Demo Day

The CISO Demo Day series is designed to help IT Security professionals like you streamline your vendor evaluation process for upcoming projects.

In just a few short hours, you can meet 4-6 leading providers in a specific vendor category through a series of relaxed group product demonstrations, ask your questions and discuss challenges with peers who are on the same journey. 

You will accelerate your information discovery stage and quickly move to a short-list of potential suppliers whom you are confident are able to meet your unique requirements.

Request your FREE place

Your Threat Detection strategy

CISO Demo Day

Protecting your organisation’s network from the increasing number of cyber threats is only becoming more complex with the rise in devices on the edge and the move to multi and hybrid-cloud environments.

In this new reality, employing advanced threat detection to help shift from a reactive to a proactive approach is essential but also laden with challenges and a bewildering number of tools to evaluate as part of implementing your strategy.

At CISO Demo Day you will evaluate a range of potential threat detection solutions allowing you to quickly shape your technology roadmap. We will be exploring: 

Intrusion Detection

Behaviour Analytics

Threat Intelligence

Cloud Access & Security Brokers

Endpoint Detection & Response

Network Firewalls





How does it work?



Experience & Insight

You join a group video call with 20 IT Security executives for a 15 minute opening session where a leading industry practitioner will share their experience of selecting and implementing Threat Detection solutions.



Demo & Q&A

You will then evaluate a series of 20 minute product demonstrations with the opportunity to ask your questions to each presenter and quickly assess its suitability for your business.



Evaluate & Repeat

At the end of each demonstration a new supplier will join and showcase their offering. This repeats until you have met all the suppliers and had the chance to evaluate each product.

Opening Session

Rob Wiggan_QUT_Photo-1

The process of implementing Threat Detection & Response systems and the milestones in getting there

Rob Wiggan, CISO, QUT

Join Rob for our opening presentation as he shares his experiences of implementing threat detection and response solutions. He’ll present his insights on choosing the best approach, the challenges he was trying to overcome, how the implementation process went, and some of the results he has achieved. At the end of his presentation, you will have the opportunity to ask your questions around his journey.

Rob is an accomplished IT professional with over 25 years of industry experience, specialising in building teams to deliver and manage secure Information Security Operations within complex working environments. Previous roles include senior leadership positions that have focussed team on Team Engagement and Development, Delivery and Operational Management of Information Security infrastructure, Financial and Strategic Planning. An innovative leader who prioritises conflicting priorities well and has an excellent sense of teamwork to get results by instilling the values of commitment, trust, fairness, loyalty and service culture. Strengths include solid communication and problem solving skills.

20 Executives

3 Hours

4+ Demos

Demonstration Partners

Over the coming weeks we will be evaluating and confirming our demonstration partners enabling you to gauge a breadth of innovative and industry-leading solutions.



Exabeam_logo_ primary_ dark


Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. We are reinventing the way security teams use analytics and automation to solve threat detection, investigation, and response (TDIR), from common security threats to the most critical that are difficult to identify. The Exabeam Security Management platform is a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. It is designed and built to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives, and make security success the norm. For more information, visit 

Qualys Inc. (NASDAQ: QLYS), helps organizations streamline and consolidate their IT, security and compliance applications. The Qualys Cloud Platform and its singular Cloud Agent provides organizations a single view, for real-time security across their entire global hybrid-IT environment, from prevention to detection to response – all from a single cloud-based app



IBM is the global leader in business transformation through an open hybrid cloud platform and AI, serving clients in more than 170 countries around the world. Today 47 of the Fortune 50 Companies rely on the IBM Cloud to run their business, and IBM Watson enterprise AI is hard at work in more than 30,000 engagements. IBM is also one of the world’s most prolific
corporate research organisations, with 28 consecutive years of patent leadership. Above all, guided by principles for trust and transparency and support for a more inclusive society, IBM is committed to being a responsible technology innovator and a force for good in the world. For more information about IBM visit: https://www.ibm.com/au-en

Rubrik, the Zero Trust Data Management Company, enables cyber and operational resilience for enterprises; including ransomware protection, risk compliance, automated data recovery, and a fast track to the cloud. For more information please visit www.rubrik.com and follow @rubrikInc on Twitter and Rubrik, Inc. on LinkedIn.About Zero Trust Data Management
Zero Trust Data Management follows the NIST principles of Zero Trust for everyone interacting with data. This means operating with the assumption that no one is trustworthy. No user. No application. No device. To meet this standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. This means data is ready at all times so you can recover the data you need, and avoid paying a ransom.




Become a supplier

Previous Demonstration Partners

0851 CISO Demo Day_Email (4)


Register to attend

Request your FREE place

Upcoming Demo Days

CISO Demo Day

Endpoint Security

Register your interest


Identity & Access Management

Register your interest


Cloud Security

Register your interest