Are you prepared? | Are you resilient? | How will you respond?

(ISC) 2 Melbourne Chapter has partnered with the CISO Leaders Summit which is Australia’s leading event for the CISO’s and Heads of Information Security & Cyber from every major corporate company in Australia. The strictly invitation-only Summit will be held on Thursday 10th May 2018 at the Melbourne Convention Centre and will attract over 100+ delegates and speakers.

(ISC)2 Melbourne Chapter members who are CISOs, heads of IT security, industry thought leaders and/or experts in the information security field can register their interest to attend by visiting www.cisoleaders.com.au and clicking the REGISTER INTEREST button near the top-right. Registering interest is not necessarily a guarantee that an invitation will be offered. A member of the team will be in touch with more details shortly after receiving an expression of interest.

Cybercrime is on the rise and last year spending reached over $80 billion. “According to Gartner” that figure will rise to over $1 trillion dollars with both Public and Private sector being faced with unprecedented threat levels in the next 5 years.

The CISO Leaders Summit Melbourne will help your organisation and security leaders to discuss, debate and benchmark some of the critical challenges being faced around Cyber Security. More details are available on the Summit website, however in summary you can look forward to:

 

  • Network with 100+ of Australia’s leading CISO’s & Heads of IT Security & Cyber
  • 20+ Expert Presentations, Roundtable Sessions & Workshop Discussions
  • Tailored Personalised Agenda
  • Up to date content and industry knowledge from national and international industry experts

 

Effective April 15, 2018

Amidst the changes in technology and the evolving threat landscape occurring in information security, the CISSP exam is continuously updated to stay relevant. Effective 15 April 2018, the CISSP exam will be based on a new exam blueprint.

Refreshed content has been added to the CISSP to reflect the most current topics in information security. The result of these enhancements is an exam that most accurately reflects the competence required from an information security professional.

As a result of the content refresh, we have updated some of the domain names to describe the topics accurately.

For more information on the changes that will be made to the CISSP exam on 15 April 2018, please refer to the FAQs and Exam Outline

New CISSP Courseware and Study Materials 

We will be releasing new courseware and study materials reflecting the updated CISSP domains:

  • Official (ISC)² CISSP Training Course (classroom-based and online instructor-led) in April 2018
  • Sybex CISSP Study Guide in May 2018
  • Official (ISC)² CISSP CBK, Practice Test Book and CISSP for Dummies in Q3 Summer 2018

 

What do I need to do?

Effective April 15, 2018, the CISSP exam will be based on a new exam blueprint. Please refer to the appropriate outline based on when you plan to sit for the exam:

Prior to April 15, 2018

Effective on April 15, 2018

(ISC)2 official training partner gives official (ISC)2 CISSP training course in Melbourne 

http://www.es2.com.au/training-services

ES2 (http://www.es2.com.au) is an (ISC)2 official training partner (OTP). They are running the official (ISC)2 CISSP training course in Melbourne on 7th – 11th May 2018 and led by a certified (ISC)2 instructor.

If anyone is interested in attending, please Kelly Cochrane on This email address is being protected from spambots. You need JavaScript enabled to view it. or visit http://www.es2.com.au/training-services for more details.

 

Jez Clement, CISSP, CISA, CISM & ISO 27001 Lead Auditor, MSc

https://www.linkedin.com/in/jezclement/

Jez is an experienced, pragmatic and highly-driven information security professional. I have extensive knowledge of the industry gained from working in the software & services, financial services and professional services sectors, as well as public sector IT in the UK and Australia. He is CISSP, CISA, CISM & ISO 27001 Lead Auditor qualified, and also holds a MSc. in IT.

In the last fifteen years Jez has focussed on information security strategy, architecture and governance. He has held various management, strategy, and technical roles during my career. In his last role within the UK he was responsible for security leadership, strategy, architecture & information security compliance activities as the head of the IT security group within a large City financial services firm with over 100 offices across the UK. Prior to that he was responsible for guiding and assessing the information security activities of member firms within PricewaterhouseCoopers' (PwC) African & Middle East regions.

Jez is a member of several professional bodies, including the ISSA, AISA, British Computer Society and ISACA. He was the Director of Mentoring for the UK chapter of the ISSA for several years and also previously worked closely with members of the London Local Government IT security community.

APAC Secure Webinar 2018

𝗠𝗶𝗻𝗶𝗺𝗶𝘇𝗲 𝗖𝘆𝗯𝗲𝗿 𝗘𝘅𝗽𝗼𝘀𝘂𝗿𝗲 𝗶𝗻 𝗮 𝗪𝗼𝗿𝗹𝗱 𝗼𝗳 𝗖𝗹𝗼𝘂𝗱, 𝗖𝗼𝗻𝘁𝗮𝗶𝗻𝗲𝗿𝘀 𝗮𝗻𝗱 𝗢𝘁𝗵𝗲𝗿 𝗠𝗼𝗱𝗲𝗿𝗻 𝗔𝘀𝘀𝗲𝘁𝘀

24 Jan 2018 (Wednesday) | Duration: 1 Hour | 17:00 Melbourne

Join here (no (ISC)2 membership required): https://www.isc2.org/News-and-Events/Webinars/APAC-Webinars?commid=296931&utm_source=apac_nm180104&utm_medium=edm&utm_campaign=tenablejan24

As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers' build processes while complementing existing solutions. 

Attend this webinar to discover: 

  • Where vulnerability management for today's assets needs to start 
  • What the new faces of attacks and remediation look like
  • Why prioritization should not be based on scan results 
  • Why reports using Excel are no longer the answer 
  • How DevOps can be part of the solution to incorporate security 

Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 17:00 (AEDT) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.

Hear expert insights from:

Presenter: 𝗥𝗼𝗯𝗲𝗿𝘁 𝗛𝗲𝗮𝗹𝗲𝘆, Senior Director Marketing, APAC, Tenable Network Security

Info available here, but note this is a a tracking link, so we take no responsibility for your personal information. Better to just google for him.
https://images.magnetmail.net/images/clients/ISC2/attach/AP/Speaker_Bios/Webinar_Tenable_RobertHealey.pdf