Peter Brittliff
Sydney, New South Wales, Australia
2K followers
500+ connections
View mutual connections with Peter
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Peter
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
About
As a strategic and hands-on Product Marketing Leader, I am excellent at turning around…
Contributions
-
What do you do if you want to expand your content's reach to a broader audience?
In my experience, understanding your audience's needs and motivations is crucial in B2B tech marketing. Using demographic, firmographic, and Jobs-to-be-Done frameworks helps create content that resonates and engages. It's not about altering our brand's voice but adapting our message to connect with a wider audience effectively. This approach has significantly broadened our reach and fostered a more engaged community, proving that tailored, value-driven content is key to building lasting audience relationships.
-
What are the key steps to prepare and rehearse a successful product demonstration?
Couldn't agree more. I've critiqued and coached many a product demo and the number one problem I see is people fail into education mode describing every feature. Often jumping straight into the admin part of the product or platform and totally confusing the buyer. Start with the customer outcome (value) and make it super simple. Then using use cases describe how you got there - but only if it's relevant.
-
What do you do if your product marketing interview requires showcasing your experience and achievements?
Visual aids are a must; however, in my experience, this can be a little tricky for two reasons. First, as a PMM, you'll work with confidential information that shouldn't be shared. Second, the tech industry moves so fast that content is updated frequently to stay relevant or pivot to new opportunities. My one tip is to create an online portfolio with copies of your work, hiding any sensitive information to keep it anonymised.
Activity
-
Kicking off a new adventure at UpGuard. I'll be diving back into all things cybersecurity, focusing on BreachSight - helping businesses manage their…
Kicking off a new adventure at UpGuard. I'll be diving back into all things cybersecurity, focusing on BreachSight - helping businesses manage their…
Shared by Peter Brittliff
-
It’s been a week of learning, networking and reconnecting with old colleagues! Thanks to ADAPT for an insightful CMO presentation. Thanks to axel…
It’s been a week of learning, networking and reconnecting with old colleagues! Thanks to ADAPT for an insightful CMO presentation. Thanks to axel…
Liked by Peter Brittliff
-
The password paradox: A great reminder that cybersecurity isn't always intuitive for those outside our industry, and the more we try to make it…
The password paradox: A great reminder that cybersecurity isn't always intuitive for those outside our industry, and the more we try to make it…
Liked by Peter Brittliff
Experience
View Peter’s full profile
Other similar profiles
-
Nick Wilson
Sydney, NSWConnect -
Michele Clarke
Gosford, NSWConnect -
Hamish Wyatt
Brisbane, QLDConnect -
Reianna Vercoe
Senior Product Manager | Building Next-Gen HR Compliance Solutions
Greater Brisbane AreaConnect -
Jeremy Wood
Sydney, NSWConnect -
Frederico Pravatta Rezende
Seattle, WAConnect -
Peter Georghiou
Senior Manager in Portfolio & Marketing
Sydney, NSWConnect -
Jane Betschel
Finance Broker | Problem Solver | Dream Maker | Leader | Financial Services | Marketing | Small Business Owner
Melbourne, VICConnect -
Richard Phillips
North Ryde, NSWConnect -
Toby Roger
Melbourne, VICConnect -
Edward Murphy
Greater Melbourne AreaConnect -
Derek Laney
Technology Evangelist
Sunshine Coast, QLDConnect -
Jeff Peake
A passion for combining Products & Technology
Macquarie Park, NSWConnect -
Jay Rusden
Melbourne, VICConnect -
Stuart Haywood
Enjoying the 5/2 Flip of Semi Retirement
Greater Newcastle AreaConnect -
Jay Daley
Greater Sydney AreaConnect -
Sophie Pank
Greater Sydney AreaConnect -
Alice Mouatt
Greater Sydney AreaConnect -
Bruce Minty
Greater Melbourne AreaConnect -
Margaux Macaire
Melbourne, VICConnect
Explore more posts
-
Dr Rizwan Ahmad
Towards a Unified Framework with ISO 27001:2022 Various standards enable companies to implement cyber security, each with its unique features tailored to specific needs. Achieving certification, attestation, and compliance post-implementation can increase costs and workload in the long term. This may lead to confusion and unnecessary burdens that hinder effective cyber security implementation and risk assessment. In New Zealand and Australia, companies adopt various attestation or certification schemes like ISO 27001, NZISM, ISAE 3402, and PCI DSS. While each scheme offers benefits, opting for ISO 27001, a standard with a proven track record, can streamline certification processes, harmonize requirements, strengthen management systems, and mitigate risks using controls from other standards. This presentation will also highlight lessons learnt from the audit to improve company's cybersecurity posture. You can join at https://lnkd.in/ghRGss4f
35 -
Nikola Bojovic
Join me on the webinar ! Understanding Quantum-Enabled Cyber Risks: Prepare A Plan Now 🛡️ 📅 Date and Time: 24th May, 2:30 PM - 3:00 PM (NZT) / 10:30 AM – 11:00 AM (HKT) I’ll be talking about quantum computing’s impact and strategies for transitioning to quantum-resistant encryption. Don't miss out on this important discussion! Register here for more details: https://lnkd.in/gnuEXn4T (https://lnkd.in/gnuEXn4T) #QuantumComputing #CyberSecurity #Webinar #Encryption #DataProtection
53 Comments -
Kate Fitzgerald
🗞 It seems like data breaches are in the news every day at the moment. 👀 Today's victim is Ticketmaster (although they are yet to confirm it) who have experienced a HUGE data breach affecting over 560 MILLION customers. 💻 The data is being held to ransom by the notorious hacker group ShinyHunters, who claimed the personal details it had for sale included names, addresses, emails, phone numbers, and the last four digits and expiration date of credit cards. 🔐 Incidents like these underscores the urgent need for robust cybersecurity measures to protect user data in an increasingly digital world. Read more about the attack https://lnkd.in/gABGfdYm #cybersecurity #databreach #cyberattack #datasecurity #dataprivacy #data #personaldata
41 Comment -
Hope Frank
Gathid | Gathered Identities WINS START-UP OF THE YEAR 🏆 for bringing unique, innovative cyber security solutions to market. The Gathid Identity Graph and Gathid Digital Twin Approach Awarded: 👉 Official Press Release: https://lnkd.in/g-WdxP2w 👉 Discover how Gathid can resolve your identity challenges and refine access management: https://lnkd.in/guZ7mX3r 👉 Learn more about Role Based Access Control features: https://lnkd.in/gyiStm5V As Australia’s leading industry body for information and cyber security, the Australian Information Security Association (AISA) awards program is designed to showcase excellence, innovation, integrity, leadership and outstanding achievements in the cyber security sector. Now in its 12th year, the awards are judged by a panel of senior leaders, academics and entrepreneurs, ensuring peer-reviewed recognition of an organization’s accomplishments. The award acknowledges the innovative spirit that drives us. Our patented approach is fundamentally different from traditional identity approaches. Most organizations have significant identity debt and find it difficult to easily trace their identities (including non-human) and their access. By using knowledge graph technology to generate daily digital twins of an enterprise’s identity ecosystem, Gathid delivers complete, actionable visibility over their identity landscape in ways never seen before. #DigitalTwin #IdentityGovernance #Identity #KnowledgeGraph #security #GathidGraph #GathidIdentityGraph #Gartner #IdentityGraph #GartnerIAM #IAM #GartnerIAM2024 Australian Information Security Association (AISA) #CES2025 #CES -#AI
232 Comments -
Arjen ☑ Lentz
This morning's keynote at CyberCon 2024 Melbourne by Nina Schick on responsible generative "AI" (quotes are mine) left me disappointed, frustrated, and frankly angry. I didn't find any vision, nor critical analysis. The key word "responsible" wasn't touched at all. There was a lot of justification, likely related to purely US cultural centric view and deep involvement in US based corporations. It was ok for LLMs to simply reflect the warped data corpus that's out on the net even beyond the warped aspects of our society that negatively affect women, minorities, and other cultures on a daily basis. Only threat risks were mentioned, not societal. Research on synthetic datasets was a positive thing, and using LLMs for supporting the elderly or people dealing with mental health challenges is a great solution. Unsurprisingly, that is not how I see things, in fact pretty much the opposite. A teddy bear is great, but no substitute for an empathic fellow human who listens to your concerns, and gives you a hug. And an LLM is not a teddybear. It's really not too much to ask for a human to review an application for something, rather than have a decision be made purely by a computer model. The latter is, at best, a good intern: you can send it on some tasks, but you always check everything. We can and just do better. ML and LLMs can be useful, but not just running loose.
511 Comments -
David Cullen
And that’s a wrap for our latest quarterly roundtables, where we bring together CISOs and security leaders from the largest and most critical organisations across Australia and New Zealand. Throughout the many insightful conversations across the CISO Lens community, there were several common themes best summed up by the 5 B’s: 🗣️ Boards - the importance of continually educating board members on strategic cyber risk, while balancing active interest against over-reach. 💰Budgets – maximising the value of existing tools and services against a backdrop of reducing security budgets. 📱Basics – the relentless (and ongoing) pursuit of basic cyber hygiene across the organisation. 🔥 Burnout - protecting ourselves and team members from burnout at a time when we’re all being asked to do more with less, and when the expectations placed upon us only continue to grow. 🗺️ Business continuity – testing whether the organisation can operate without access to essential platforms and technology. Thanks to everyone who contributed to the fantastic conversations!
1502 Comments -
Charles Fonceca
TOP ATTACK AND BREACHES - 26th July 2024 Australian healthcare firm MediSecure has suffered a ransomware attack that resulted in the theft of 6.5TB of data belongs to approximately 12.9M Australians. The data includes names, contact information, and healthcare details. No ransomware group has claimed responsibility yet. Apace HugeGraph A recently disclosed critical remote code execution vulnerability, CVE-2024-27348, impacts Apache HugeGraph-Server and is actively exploited in the wild. This flaw, present in the Gremlin graph traversal language API, affects all versions before 1.3.0 and allows attackers to bypass sandbox restrictions, gaining complete control over the server. Paris Olympics 2024 Threat researchers have tracked Increase in cyber threats targeting the Paris 2024 Olympics, revealing a significant rise in darknet activity related to French organizations, with a notable 80% to 90% increase in threats since the second half of 2023. Key concerns include phishing schemes, fraudulent ticket sales, and the use of infostealers like Raccoon, which accounts for 59% of detections in France. Cisco SSM On-Prem and SSM Satellite products are affected by a critical vulnerability, CVE-2024-20419, which allows attackers to change any user or admin password. Rated 10 on the CVSS scale, this flaw demands no user interaction or privileges. Successful exploitation involves sending crafted HTTP requests to access the web UI or API with the compromised user’s privileges. Ukrainian defense enterprises: ....were attacked by the UAC-0180 threat group. The attacks involve emails with ZIP file attachments containing a malicious PDF link. In the end of the infection chain, a bootloader facilitates the download and execution of the ATERA remote control program. SolarWinds has released security updates for Access Rights Manager (ARM) software to address 13 vulnerabilities. Eight flaws rated as critical, including CVE-2024-23472, CVE-2024-28074, and CVE-2024-23469, could allow attackers to read, delete files, and execute code with elevated privileges. #security #OT #healthcare #cyber #preventionfirst #checkpoint #quantumforce #harmony #technology #CISO
11 -
Sean Coady
Most people know that I don't spruik products too often, rather I like to focus on the business problem. In the VM space; security and IT are often at logger heads and as one CISO said to me "throwing chairs across the room at each other" in reference to VM reports vs the actual status of the environment. How does this get reconciled and reported on? What if your vulnerability reporting tool was able to accurately report on the real status of the IT estate; convert this to value at risk for reporting (and insurance premium adjustment and strategy) and give the IT team a tool that can patch/mitigate or isolate an at risk asset so everyone is on the same page?
5 -
Kiranraj Govindaraj (KG)
Several NSW Government, Queensland Government departments and Commonwealth agencies are starting to leverage Microsoft Azure Sentinel for their SIEM & SOAR requirements. This whitepaper outlines the Strategies for success in data ingestion and incident response. Here is the TL;DR version 1. 𝗗𝗮𝘁𝗮 𝗜𝗻𝗴𝗲𝘀𝘁𝗶𝗼𝗻 𝗮𝗻𝗱 𝗦𝗼𝘂𝗿𝗰𝗲 𝗖𝗼𝗻𝗻𝗲𝗰𝘁𝗶𝘃𝗶𝘁𝘆: Ensure that all relevant data sources, including both Microsoft and non-Microsoft products, are connected to Azure Sentinel. This includes leveraging built-in connectors, Syslog, Common Event Format (CEF), and APIs for seamless integration across diverse environments. 2. 𝗖𝗼𝘀𝘁 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 𝗮𝗻𝗱 𝗟𝗼𝗴 𝗜𝗻𝗴𝗲𝘀𝘁𝗶𝗼𝗻 𝗣𝗹𝗮𝗻𝗻𝗶𝗻𝗴: Carefully plan which logs and alerts to ingest to control costs, as certain logs (e.g., Azure Active Directory) may incur additional charges. Utilize free logs, such as Azure Activity and Office 365 Audit Logs, where possible. 3. 𝗜𝗻𝗰𝗶𝗱𝗲𝗻𝘁 𝗥𝗲𝘀𝗽𝗼𝗻𝘀𝗲 𝗮𝗻𝗱 𝗔𝘂𝘁𝗼𝗺𝗮𝘁𝗶𝗼𝗻: Set up advanced alert rules and automated incident creation within Azure Sentinel to streamline response times and ensure that incidents are automatically created from high-priority alerts. 4. 𝗧𝗵𝗿𝗲𝗮𝘁 𝗛𝘂𝗻𝘁𝗶𝗻𝗴 𝗖𝗮𝗽𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀: Leverage Azure Sentinel’s built-in hunting queries, real-time investigation tools like Livestream (in public preview), and Jupyter notebooks for advanced threat hunting. This enhances proactive security monitoring. 5. 𝗦𝗰𝗮𝗹𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗮𝗻𝗱 𝗩𝗶𝘀𝗶𝗯𝗶𝗹𝗶𝘁𝘆 𝗔𝗰𝗿𝗼𝘀𝘀 𝗪𝗼𝗿𝗸𝘀𝗽𝗮𝗰𝗲𝘀: Utilize Azure Sentinel’s capacity to scale automatically across multiple environments and workspaces, making it ideal for organizations with complex or segmented security setups.
15 -
Valentine Wats
Daniel Croft - The new Cyber Security Legislation does not go far enough in providing relevant technical guidance and guidelines that organisations can adhere to, it seems too high-level and very governance-focused. Cybercrime as a problem will not be solved by governance but by practical, technical, defensive, and offensive steps prescribed by technical people, not lawyers politicians or someone from the military. This is one problem that legislating it to death is not going to solve. Also, for these two amendments or additions, Security Standards of IoT Devices & Cyber Incident review boards, you need very highly skilled subject matter experts to provide their input into both or else this is more like window dressing. The information required for these two amendments to be effective must be first distilled to low-level technical detail and then summarised at a higher level to be digested/understood by different stake holders. Check out this article below that I wrote months ago that buttresses some of the points made here. https://lnkd.in/eydDVJ9e
-
Van Lurton
"SOC Confidence is improving, but many fear legacy tools are holding them back Security practitioners are increasingly confident in their capabilities but feel they are losing ground when it comes to detecting and prioritising real threats. So, what is the disconnect? Many SOC teams are managing too many tools and still struggle with an overwhelming number of alerts, leading to concerns about missing critical threats. This is driving a lack of confidence and trust in the current threat detection tools practitioners are using, and resulting in practitioners seeking alternative solutions, such as extended detection and response solutions. The study found: Nearly two-thirds (69%) of SOC practitioners in the Asia Pacific region worry they will miss a real attack buried in a flood of alerts, and 51% believe they cannot keep pace with the increasing number of security threats. Nearly one-third (31%) do not trust their tools to work the way they need them to work, while 49% say the tools they work with actually increase the SOC workload instead of reducing it. Across Asia Pacific, 60% of SOC practitioners have more than ten tools in place and 29% have more than 20 tools. Around 60% of teams have either recently adopted or are exploring extended detection and response solutions. Legacy threat detection tools are creating more work for practitioners, resulting in growing vendor distrust and tool dissatisfaction SOC teams are increasingly frustrated with their current security tools, which are causing more challenges than they solve. Many practitioners find themselves pushing aside critical tasks to manage the overwhelming alert volume they receive, leading to dissatisfaction not only with the tools but also with the vendors providing them. Practitioners also continue to struggle with alert accuracy, with a significant number of alerts going unaddressed due to time constraints and insufficient tool support. While there are signs of improvement in areas like visibility across hybrid environments, the overwhelming volume of alerts remains a significant issue. The study also found: Across the Asia Pacific, 51% of SOC practitioners say vendors are selling threat detection tools that create too much noise and too many alerts, while 68% say vendors need to take more responsibility for failing to stop a breach. Over four-fifths (81%) spend more than two hours each day digging through/triaging security events. Some 41% say their security tools are more of a hindrance than help when it comes to spotting real attacks, noting that realistically, they are only able to deal with 34% of the alerts they receive, while they would classify 11% of them as real attacks. Over half (54%) of SOC practitioners say a lot of their security tools are bought as a box-ticking exercise for compliance." https://lnkd.in/epud4sun
-
Peter Vasey
The Essential Eight continues to be a key baseline set of strategies used by many orgs in Australia to shore up their cyber defences. We have some terrific speakers lined up for this webinar! It is ideal for practitioners looking to build their understanding of HOW the Essential Eight maps against common threats and the important role identity security plays in meeting its requirements. #EssentialEight #BeyondTrust #Compliance #IdentitySecurity #APJ
2 -
Nik Devidas
🚨Attention Directors: Cybersecurity Just Got Added to Your Job Description! 🚨 The proposed Cyber Security Legislative Package 2024 is coming in hot, and it’s bringing new responsibilities with it. Think you can just keep an eye on finances and leave cyber to IT? Not anymore! Now, directors are officially on the cyber frontlines. This isn’t your average compliance update. We’re talking: > Reporting every “oops” moment with client data > Beefing up risk management so hackers swipe left 🚫💔 > Taking privacy from “nice-to-have” to “must-have” Ready to dive in? We’ve put together a whitepaper that’ll break down everything you need to know—and maybe even save a few headaches later. 😎 👉 Get the download here and make sure you’re ready to tackle the cyber curveball: https://smpl.is/9thlr Because nothing says “I’m a responsible director” like being one step ahead of the cyber cops! 👮♂️
8 -
Lorri Janssen-Anessi
Thank you @securitybrief.com.au and @Melaniawatson for sharing some of my thoughts/predictions for 2025. If you have a chance, please check out the following article that included some valuable insight from my colleague Austin Berglas. Some of the highlights: 🔷 AI powered threats - sophistication in phishing campaigns, social engineering, and malware 🔷 AI risks- over reliance on AI could amplify errors and and bias without human oversight 🔷 Evolving regulations - expect stricter compliance standards and more harmonized international regulations 🔷 Critical Infrastructure vulnerabilities - as digitization grows, so do threats, underscored by sophisticated attacks like those from Volt Typhoon 🔷 Talent shortages - lack of skilled professionals demanding more automation and AI incorporation, a potential reshape of the industry's workforce 🔷 Decline in ransomware - proactive measures and stronger incident response programs could be aiding in the reduction of ransomware incidents One thing that is certain is the continued need for vigilance, innovation, and strategic planning in the face of the evolving cyber threats. https://lnkd.in/exqRG7iP #supplychaindefense #tech2025predictions #cybersecuritypredictions2024 #cybersecurity #cyberdefense
104 Comments -
Abhijit (Abhi) Abhyankar
The Security of Critical Infrastructure Act 2018 (the SOCI Act). outlines the legal obligations you have if you own, operate, or have direct interests in critical infrastructure assets. #FinancialServices is one of 11 sectors covered by the SOCI Act. Join DXC Technology and Darktrace on Thursday July 18 at 1 pm AEST as our industry experts Dr Pierre Tagle, PhD and Mark Verbloot demystify the SOCI act and how Darktrace’s self learning AI and sovereign autonomous response can help you become proactive and stay ahead of novel threats. Seelan Nayagam Kylie Watson Denise Walter Sushant Arora Dan Monahan Joel Dane Eugene Low Shannon Bodnar Bianca Edgar Russell Hatton Richard James Bernice Muncaster Jim Naumovski Matt George Michael Nedelkos TM Ching Nick Jackson Daniel Biondi SF Fin Dr Michael Neary Ajith Lobo Victor Lal Hema Malhotra T Indranil Mukherjee Declan Coffey Rob Kohler Victor Lal Martin Clarke Elham Ghourbandi Aakassh S Ragunathan Rajendran Alex Ratkovsky Ashok Kumar Anand Haveri Scott Kennedy Kevin Sharp
292 Comments -
Wayne Phillips
⚕⚕ MediSecure ⚕⚕the victim of 'large-scale ransomware data breach incident’. A ransomware attack on any Australian healthcare provider is devastating but should not be surprising. This incident highlights the severe implications for patient care, data privacy, and overall confidence in healthcare systems. Healthcare providers prioritise availability-of-service over security control to ensure positive patient outcomes, but this leaves them more vulnerable to larger attacks and longer outages. Something must change. The massive impact on patients and their privacy makes healthcare a soft target to ransomware attacks. This attack raises critical questions about the robustness of cybersecurity controls in the healthcare sector. As providers increasingly rely on digital systems, the necessity for stringent cybersecurity protocols and rapid threat detection and response strategies becomes paramount to safeguard against future attacks and to ensure the resilience of vital healthcare services. Evan Davidson, Dave Bernhardt, David Gold, Jan Tietze, Keith Weisman, Lloyd Webb, Gary Gardiner, Aravind Vasudevan, Jason Duerden, Brett Williams, Trevor Van Essen, Robert Collins, Michael Francis, Laurel Martin, Rohit Ravi, ▫️Ben Estens, Tracey Reed, Liz Drysdale, Joe McPhillips, Luke Sillars, Shabeel Shah, Diwa Dayal, Jay Shah, Jeremy Ho, Leh Tee Teo, Eran Ashkenazi, Nir Kenzy, Prateek Bhajanka, Rajiv Taori, Ryuichi Tomita, Tom Martin, Jungsu Park
26
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More