Overview Register Now

There has been an evident surge in malware, phishing, and distributed denial of services since the onset of the pandemic across the Commonwealth of Australia. With the intent to take appropriate actions against these threat actors, the region along with its member states and international partners are to reinforce their collaboration on technical operations at judicial as well as diplomatic levels.

Organizations today, need to not only move beyond compliance and implement dynamic security integration through a multi layered approach, but also need to embrace an enterprise wide culture of cyber risk ownership. To achieve optimum cyber resilience and safeguard business continuity, a dynamic risk management framework is extremely essential for organizations.

The recent release of the Australian Cyber Security Strategy 2020 will give a much-needed incentive to the creation of a secure digital ecosystem to safeguard the nations citizens, business community and critical infrastructure functionality.

EC Council’s CISO MAG as an enabler of strategic community integration has planned a crisp half day virtual engagement designed to create more awareness on the need for cybersecurity and its related implications in these testing times.

The Australia CISO Confluence will derive realistic insights from senior industry experts on how to redefine security frameworks, mitigate threats and encourage a new culture of cybersecurity to sustain continuity across the region’s business intensive digital ecosystems.

Overview Register Now

The worlds most advanced ethical hacking course with 20 of the most current security domains an ethical hacker will want to know when planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification!

+

1. Introduction to Ethical Hacking

2. Footprinting and Reconnaissance

3. Scanning Networks

4. Enumeration

5. Vulnerability Analysis

6. System Hacking

7. Malware Threats

8. Sniffing

9. Social Engineering

10. Denial-of-Service

11. Session Hijacking

12. Evading IDS, Firewalls, and Honeypots

13. Hacking Web Servers

14. Hacking Web Applications

15. SQL Injection

16. Hacking Wireless Networks

17. Hacking Mobile Platforms

18. IoT Hacking

19. Cloud Computing

20. Cryptography

Dates

October 26th-29th 2020 at 10 am – 1 a.m UTC

+

EC-Council Certified Ethical Hacker (CEH) Live Course

CEH Printed Courseware (US courses Only)

CEH iLabs, Live Labs/Cyber Range

CEH Certification Exam

Exam Insurance Program

CEH Online Self-Paced Streaming Video Course (1 year access)

CEH Practical Exam – Live Cyber Range Challenge (Up to 6 hours)

CEH CyberQ Practice Exam

AND your choice between:

CPENT (Pen-Test) Course:

CPENT Online Self-Paced Streaming Video Course (1 year access)
CPENT E-Courseware
iLabs (6 Months Access)
Practice Range (90 days Access)
CPENT Live Range Exam
Exam Insurance Program

OR

CHFI (Computer Forensics) Course:
CHFI Online Self-Paced Streaming Video Course (1 year access)
CHFI E-Courseware
CHFI iLabs, Live Labs/Cyber Range
CHFI Certification Exam
Exam Insurance Program

You also receive:

Cybersecurity *Meet Up Networking Event (Priceless)
20% OFF Voucher for next course

*Meet-ups are subject to availability, space, instructor schedules, and local interest. For live in person only.

+

Overview Register Now

The CCISO program trains individuals who are looking to make the jump from middle management to the executive ranks by focusing on high-level management skills specifically needed for IS executives. From project to audit management, procurement and finance, to strategy and policy, students will be taught to steer complex security programs strategically and successfully. The CCISO program was created and is taught by sitting high-level information security executives from across industries, resulting in the most relevant, challenging, and applicable content on the market.

+

1. Definitions

2. Information Security Management Program

3. Information Security Laws, Regulations, & Guidelines

4. Privacy Laws

+

1. Design, Deploy, and Manage Security Controls in Alignment with Business Goals, Risk Tolerance, and Policies and Standards

2. Information Security Risk Assessment

3. Risk Treatment

4. Residual Risk

5. Risk Acceptance

6. Risk Management Feedback Loops

7. Business Goals

8. Risk Tolerance

9. Policies and Standards

10. Understanding Security Controls Types and Objectives

11. Implementing Control Assurance Frameworks

12. COBIT (Control Objectives for Information and Related Technology)

13. BAI06 Manage Changes

14. COBIT 4.1 vs. COBIT 5

15. ISO 27001/27002

16. Automate Controls

17. Understanding the Audit Management Process

+

1. The Role of the CISO

2. Information Security Projects

3. Security Operations Management

+

1. Access Controls

2. Physical Security

3. Disaster Recovery

4. Network Security

5. Threat and Vulnerability Management

6. Application Security

7. Systems Security

8. Encryption

9. Computer Forensics and Incident Response

+

1. Security Strategic Planning

2. Alignment with Business Goals and Risk Tolerance

3. Relationship between Security, Compliance, & Privacy

4. Leadership

5. Enterprise Information Security Architecture (EISA) Models, Frameworks, and Standards

6. Security Emerging Trends

7. It’s all about the Data

8. Key Performance Indicators (KPI)

9. Systems Certification and Accreditation Process

10. Resource Planning

11. Financial Planning

12. Procurement

13. Vendor Management

14. Request for Proposal (RFP) Process

15. Integrate Security Requirements into the Contractual Agreement and Procurement Process

16. Statement of Work

17. Service Level Agreements

Dates

October 26th-29th 2020 at 10 am – 1 a.m UTC

+

EC-Council Certified CISO (CCISO) Live Course

CCISO Printed Courseware (US courses Only)

CCISO Certification Exam

Exam Insurance Program

CCISO Online Self-Paced Streaming Video Course (1 year access)

AND

Risk Management Approach & Practices:

Risk Management Approach and Practices Deep Dive Online

Self-Paced Streaming Video Course

RM E-Courseware

PLUS

CertifIed Project Manager:

Certified Project Manager (CPM) Online Self-Paced Streaming Video Course

CPM E-Courseware

CPM Exam Voucher - $1899

You also receive:

Automatic invitation and free pass to Global CISO Forum, EC-Council’s annual executive invite-only event

Cybersecurity *Meet Up Networking Event (Priceless)

20% off Voucher for next course

Certified Secure Computer User (CSCU) License up to 100 users**

Oh Phish license [One free OhPhish License capable of launching one email phishing simulation campaign for up to 2,000 users and is valid for 3 months after activation.]

*Meet-ups are subject to availability, space, instructor schedules, and local interest. For live in person only.

**You have 1 year from the date of training to request Certified Secure Computer User (CSCU) License

+

Overview Register Now

In this one-day course you will set up EC-Council’s Mobile Security Toolkit (STORM) OS to interface with your drone, then learn about drone hacking. This will include a wide arrange of topics from the basics of drones and the FCC rules, to the capture, examination, and exploitation of drone data.

Course Outline:

Module 01: Technical Introduction Drone Hacking

Module 02: Drone Ethics

Module 03: Part 1 Robotics as an ecosystem

Module 04: Part 2 Ground Stations: Servers / Cloud

Module 05: Drone Hacking

Dates

October 28th October 2020

+

1. e-Book (1 Year Access)

2. Certificate of Attendance (.pdf)

3. Tello Drone Quadcopter

4. iLabs, Online Labs (6 months Access)

5. EC-Council Drone Program Carry case

6. Alfa Long-Range Dual-Band AC1200 Wireless USB 3.0 Wi-Fi Adapter w/2x 5dBi External Antennas

7. EC-Council Drone Program T-shirt

Connect. Engage. Create Impact

Our Eminent Speakers

Sample

Nicki Doble

Group Chief Information Officer,
Cover More Insurance

Sample

Damien Manuel

Chairman,
Australian Information Security Association

Sample

Salvatore Trimboli

Chief Technology Officer,
E.L & C. Baillieu Limited

Sample

Rassoul Ghaznavi Zadeh

Director of Information Security,
ResMed

Sample

Andrew Wan

Chief Information Security Officer,
The Smith Family

Sample

Helaine Leggat

Managing Partner,
ICTLC Australia

Sample

Andrew Collins

Chief Chief Officer & Chief Security Officer,
Sport Integrity Australia

Sample

Daniel Pludek

Chief Technology Officer,
Kips McGarth Education Centers

Sample

Jacqueline Kernot

Partner Cyber Security,
EY

Sample

Rafael Narezzi

Chief Information Security Officer,
WiseEnergy

Sample

Bradley Busch

Chief Information Security Officer, Tyro Payments & Chairman of the Board, itSMF Australia

Sample

Ts. Dr. Aswami Ariffin

SVP Cyber Security Responsive Services Division, CyberSecurity Malaysia, President DFRS

What we can offer to Sponsors?

  • Social media promotion on CISO MAG and EC-Council pages
  • Branding on post event video
  • Press release uploaded on CISO MAG website and on all social media channels
  • Conduct a poll for event audience
  • Share product highlights with industry experts
  • Get Exclusive coverage in our Monthly Magazine
  • Get your training needs resolved by our exclusive enterprise packages
  • Why attend?

  • Global connectivity and wider expert reach
  • Dynamic mix of strategic and real time insights
  • Emphasis on implication of ongoing pandemic (COVID – 19)
  • Comprehensive to enable Any-time and any-where access