Showing 0 of 100
From risk-based vulnerability management to exposure management: The future of cyber security
From risk-based vulnerability management to exposure management: The future of cyber security
I think I need to talk to a (cyber) lawyer: Two lawyers and a CISO decode Australia's new cybersecurity legal landscape
I think I need to talk to a (cyber) lawyer: Two lawyers and a CISO decode Australia's new cybersecurity legal landscape
Securing Australia's digital future: The critical need for software supply chain threat intelligence
Securing Australia's digital future: The critical need for software supply chain threat intelligence
Exploring cyber security incident and crisis preparation: Lessons from a whole of government cyber exercise program
Exploring cyber security incident and crisis preparation: Lessons from a whole of government cyber exercise program
Deep fake it until you make it - Social engineering in the new age
Deep fake it until you make it - Social engineering in the new age
The power of gamified learning - Insights from the frontline
The power of gamified learning - Insights from the frontline
Hardening the culture: Insider threat, cyber security risk and resilience
Hardening the culture: Insider threat, cyber security risk and resilience
Measures and Metrics: How to Track More Than Just the SOC
Measures and Metrics: How to Track More Than Just the SOC
Transforming security: Red + blue = purple, a winning formula for the board
Transforming security: Red + blue = purple, a winning formula for the board
New law on cyber security: Recent changes to federal law
New law on cyber security: Recent changes to federal law
ATT&CK and D3FEND frameworks. A common language to understand threat actors and drive action to disrupt the kill chain
ATT&CK and D3FEND frameworks. A common language to understand threat actors and drive action to disrupt the kill chain
Detecting threat actors targeting Australian businesses through TTPs
Detecting threat actors targeting Australian businesses through TTPs
Lessons learned from cyber incident response exercises
Lessons learned from cyber incident response exercises
Small Target Strategy - Shrinking Your Way to Security
Small Target Strategy - Shrinking Your Way to Security
You've survived the breach. Now what? Exploring establishment of an effective and resilient post breach security program and roadmap
You've survived the breach. Now what? Exploring establishment of an effective and resilient post breach security program and roadmap
Tiny tweaks, big impact - From nudge to necessity
Tiny tweaks, big impact - From nudge to necessity
CISOs Unplugged - 3 CISOs practically tackle cyber security's pressing challenges!
CISOs Unplugged - 3 CISOs practically tackle cyber security's pressing challenges!
The human factor: Understanding the scam and cybercrime landscape from the point of impact
The human factor: Understanding the scam and cybercrime landscape from the point of impact
SOPs, Playbooks, and You; how to document everything to optimise your team and keep your sanity
SOPs, Playbooks, and You; how to document everything to optimise your team and keep your sanity
Lessons from the Crowdstrike falcon outage: the importance of business continuity planning for your organisation
Lessons from the Crowdstrike falcon outage: the importance of business continuity planning for your organisation
Is post-quantum encryption ready for prime-time? A pragmatic assessment of the threats, possible responses and practical guidance
Is post-quantum encryption ready for prime-time? A pragmatic assessment of the threats, possible responses and practical guidance
Keynote with Dr Jordan Nguyen - Enter the Future of Technology & Humanity
Keynote with Dr Jordan Nguyen - Enter the Future of Technology & Humanity
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.