Skip to content

Red vs Blue -Auckland Cyber Security Event

If you’ve ever played Airsoft or involved in the military , you would have heard the terms “Red team” and ”Blue team”.

Red team describes the bad guys team that use attack techniques to gain access to the “base”, while the Blue team use skills to defend.

In Cybersecurity, its much the same !

With new regulations being enforced like GDPR, and the financial penalties that go with these regulations, organisations are having to have a serious look at their security infrastructure as they face the high risk of data breaches

Join us for a drinks and nibbles where we will hear from the two different teams on how they can work together to protect networks from breaches.

We will also hear from a legal expert who will outline the responsibility of NZ companies to protect data and outline the process when data has been breached.

He will also discuss the impact of GDPR on NZ companies .

 

For more details and to register: 

https://www.eventbrite.co.nz/e/red-vs-blue-team-which-it-security-team-do-you-back-registration-67945517873

Facebook
Twitter
LinkedIn

Related Posts

So, in recent times we’ve seen airline Qantas falling victim to a cyberattack which hit a third-party contact centre platform potentially exposing personal details of up to 6 million customers. On the NZ side of the ditch, New World took an arrow to the knee with a password spraying attack.
The landscape of remote work has transformed dramatically over the past several years. What began as a reactive shift to keep operations going during a major global disruption has now solidified into a permanent mode of working for many organisations, especially small businesses.
On Friday, 30th June 2025, Qantas confirmed a cyber incident affecting one of its offshore third-party contact centres. Approximately six million customer records were accessed, exposing personal information including names, contact details (email and phone number), Date of Birth and frequent flyer numbers. No financial or authentication credentials (such as passwords or card data) were determined to be accessed at this time.