Inside The Mind Of A Hacker

The 3 Secrets They Don’t Want You To Know – That Will Let You Take Back Control and Win The Cyber Security War

rubik nsw_health jardine_lloyd citrix dimension_data aussie_commerce HR_Daily

Are You A Technology Leader That’s…

Constantly Managing Threats & Attacks With No End In Sight?

Frustrated By The Lack Of Awareness Within The Organisation?

Competing With Other High Profile Management Priorities?

Concerned About The Bench Strength Of Your Team?

If you’ve answered YES to any of the issues above, don’t worry, you are not alone.  The vast majority of Technology Leaders struggle with these same issues too.

However, smart leaders seek advice from quality mentors and advisors because – truth be told – there is another way.

Keep reading to find out more…

Discover 9 Transformational Strategies To Prevent Cyber Threats

Over the last intense 5 years Andrew Constantine has been a private advisor to technology leaders and CIO’s helping them build a 3% paradigm. Many of Andrew’s clients now have achieved bullet-proof confidence, 10 out of 10 cyber control and set a benchmark level reputation as ASX listed businesses.

Through troubleshooting, configurations, and errors Andrew has designed his methodologies into 9 core strategies.

For the very first time, Andrew is going to share with you, all of the 9 core strategies and he’s going to do it in just 90 minutes! And… This event is 100% FREE.

NOTE: We will only accept a maximum of 20 leaders per event. This is to ensure we work privately and exclusively with our community.

Why You’d Be Crazy To Miss This 90 Minute Workshop

Watch This…


Here’s What You’ll Learn …

The Threat Triangle

3 Key steps to back control and win the cyber security war

What motivates 97% of Unethical and Ethical hackers

What 3% of technology leaders are doing to maintain a 3 step advantage of cyber attacks

The Risk Pyramid

4 stages building bullet-proof confidence and setting that benchmark level reputation for executive management & boards

What the top 3% of successful technology leaders are doing to maintain that 10 out of 10 cyber control

Why 97% of all companies are often facing unknown levels of cyber risk. Where does your business fit in the cyber security risk pyramid?

The Response Matrix

Understand why some approaches to cyber security succeed while others fail miserably

Why 97% of technology leaders assign a job description to cyber security and why you’ve already lost

4 Key methods to upgrade your cyber security strategy

The 3% Paradigm

What it takes to be part of the top 3% of technology leaders that have complete control and bullet-proof confidence about their cyber security

Learn the 9 Key strategies to create that 10 out of 10 cyber control

How the top 3% of companies think differently and how have they created an entirely new paradigm in which cyber security is under control and no longer stressing the business

Westpac Logo

“Thanks Andrew for all your advice! I have known Andrew for many years. He has provided excellent service to our Banking Delivery team.”

Kathy Thomas Project Manager, Westpac

QBE Logo

“Andrew’s Unorthodox Strategies have really been a significant impact to me. We were able to build a level of clarity and confidence and i’d love to see him achieve his overall mission of educating 10,000 technology leaders all over the world!”

Jay Hira PCI and Data Privacy Project Manager, QBE

NSW Health Logo “Over a course of 6 months Andrew has given me a different perspective on networking and infrastructure design and security – He was able to build out a roadmap with knowledge we didn’t receive from other providers. He is a real asset to the community.”

Chris Didaskalou Network Specialist, NSW Health

UNO Homeloans Logo

“Andrew is never one to use marketing jargon or buzzwords; rather he cuts to the chase and helps his clients understand and address issues that matter. Many Thanks.”

Thomas Gao CTO/Architect, Uno Homeloans

iComp Logo

“I love Andrew’s methodology and his simple approach, to identifying and securing business technology systems. We were so impressed with Andrew’s strategy that we have subsequently chosen to work with him and his team to enable cyber security and analytics services within our clients.”

Rob Zatta CIO, iCOMP Business Solutions

Young Gun Entrepreneur and Author

Andrew Constantine is a business and technology young gun and the author of the CIO Solution Book.

Andrew started his career straight out of high school and has been working for large corporate companies ever since. Now building a multi-million dollar company, enabling Andrew to devote his time outside of work including, investing, philanthropy, cycling and travelling.

Andrew has been featured in Telstra, ABC, SBS, and The Sydney Morning Herald.

Here’s What Other Industry Experts Thought ..

“When One Teaches, Two Learn”. Click PLAY Below.

Cyber Security Success


Cyber Security Success


Real Talk From A Private Advisor

  We believe CIOs and Technology Leaders are smart people, but they are often misled and misguided.

Andrew refuses to sugar coat and believes jargon is useless.  He believes telling it like it is and how it is, rather than beating around the bush. Because Andrew believes playing chess, while everyone else is playing checkers is the key to delivering transformational results.

Expect, world class content that’s organised, energetic, engaging and not your traditional seminar where you’ll be talked down to.  Rather Inclusive, Collaborative and Network-like-approach.

90 Minutes. 9 Strategies.
Book Now

Click on your nearest city below to claim your FREE tickets, before they run out!


TUE, 25th July, 2017
Doltone House – Hyde Park
Breakfast Included
Registration from 7.30am


TUE, 1st August, 2017
Crown Towers – Melbourne Southbank
Breakfast Included
Registration from 7.30am


THU, 3rd August, 2017
Rydges Southbank – Brisbane
Breakfast Included
Registration from 7.30am


TUE, 8th August, 2017
Pan Pacific – Perth
Breakfast Included
Registration from 7.30am


THU, 10th August, 2017
Hotel Sofitel – Auckland
Breakfast Included
Registration from 7.30am

Claim Your FREE Tickets Now

I found the session extremely useful and very interactive which I believe this to be best approach, I found the analysis through the triangle of the motives of hackers quite informative and the entire overall morning breakfast was fantastic.

Assine George

Strategic CIO and Business Transformation Leader

I loved Andrew’s morning workshop. Overall informative and a solid understanding of what motivates attackers in our digital world today.

Alex Kesik


Presented by