In just a few short hours, you can meet 4-6 leading providers in a specific vendor category through a series of relaxed group product demonstrations, ask your questions and discuss challenges with peers who are on the same journey.
You will accelerate your information discovery stage and quickly move to a short-list of potential suppliers whom you are confident are able to meet your unique requirements.
In this new reality, employing advanced threat detection to help shift from a reactive to a proactive approach is essential but also laden with challenges and a bewildering number of tools to evaluate as part of implementing your strategy.
At CISO Demo Day you will evaluate a range of potential threat detection solutions allowing you to quickly shape your technology roadmap. We will be exploring:
You join a group video call with 20 IT Security executives for a 15 minute opening session where a leading industry practitioner will share their experience of selecting and implementing Threat Detection solutions.
You will then evaluate a series of 20 minute product demonstrations with the opportunity to ask your questions to each presenter and quickly assess its suitability for your business.
At the end of each demonstration a new supplier will join and showcase their offering. This repeats until you have met all the suppliers and had the chance to evaluate each product.
The process of implementing Threat Detection & Response systems and the milestones in getting there
Rob Wiggan, CISO, QUT
Join Rob for our opening presentation as he shares his experiences of implementing threat detection and response solutions. He’ll present his insights on choosing the best approach, the challenges he was trying to overcome, how the implementation process went, and some of the results he has achieved. At the end of his presentation, you will have the opportunity to ask your questions around his journey.
Rob is an accomplished IT professional with over 25 years of industry experience, specialising in building teams to deliver and manage secure Information Security Operations within complex working environments. Previous roles include senior leadership positions that have focussed team on Team Engagement and Development, Delivery and Operational Management of Information Security infrastructure, Financial and Strategic Planning. An innovative leader who prioritises conflicting priorities well and has an excellent sense of teamwork to get results by instilling the values of commitment, trust, fairness, loyalty and service culture. Strengths include solid communication and problem solving skills.