Explore
Communities
All Communities
General Discussion
Cyber Security and Risk Management
Data, Analytics and AI
Digital Services and Customer Experience
IT Modernization and Cloud
Workforce, Skills and Capability
Events
Upcoming events
Past event highlights
Event management services
Sponsorship
Academy
Overview
Courses
Insights
Marketplace
Join now
Login
My homepage
Communities
Communities
Toggle communities dropdown
All Communities
General Discussion
Cyber Security and Risk Management
Data, Analytics and AI
Digital Services and Customer Experience
IT Modernization and Cloud
Workforce, Skills and Capability
Events
Upcoming events
Past event highlights
Event management services
Sponsorship
Academy
Overview
Courses
Insights
Marketplace
Menu
Join now
Login
Learn
Upskill
Connect
Attend
Solve
Join
Become a member
Insights
Access quality content from global government thought leaders
Search text
Members-only
Public
Reset
Most Recent
Most Popular
Content Type
---------
Fundamentals
Industry Trends
Interviews
Benchmark
Case Studies
Deep Dive
Guides
On Demand
Whitepapers & Reports
Region
Select region...
Australia
Canada
New Zealand
United Kingdom
United States
Communities
Cyber Security and Risk Management
Data, Analytics and AI
Digital Services and Customer Experience
General
IT Modernization and Cloud
Workforce, Skills and Capability
Cyber Security and Risk Management
Case Study Highlights : Cyber Incident Response Strategy
Apart from just providing forecasts, the BOM also “supports flood activity, cyclones, fires and all other critical weather related activities.” In many ways, “we’re primarily a data organisation, and we support a lot of critical infrastructure as well.” As such, “our data is extremely important,” and this was proven in drastic ways when “we had a major cybersecurity attack in 2016.” It is unclear exactly who was responsible, but the attack was conducted with the use of remote malicious software aimed at mining data about “who we communicate with, but also who our customers and partners are. This set the …
Cyber Security and Risk Management
2022's Top 3 Rising Cyber Threats
As Australia and New Zealand carry on the battle against Covid-19 and companies continue to move to a hybrid model of working, cybersecurity has become more important than ever. Cyber-attacks grew exponentially in 2021 and 2022 looks set for more of the same. Below are three rising threats companies are facing in the year ahead. Ransomware attacks continue to threaten the security of critical data across the globe. Cyber criminals have exploited the pandemic by carrying out more large scale phishing attacks, affecting businesses of all sizes across Australia and New Zealand. These attacks succeed largely due to human error, …
Cyber Security and Risk Management
Cyber Culture & Awareness with CSCRC
While we need to adapt and respond quickly to cyber threats, when it comes to strengthening our own defences, we also need to think carefully about the ethical implications of modern technologies. It is a tricky and delicate balancing act. We do need to consider what should be done with technology, rather than just being swept up in what could be done, and the endless potential of the digital world we live in. Importantly, we also need to remember that trends and crystal ball gazing is vital but just getting the basics right is something that the government also needs …
Cyber Security and Risk Management
Taking Cyber Security Seriously with Experts Across ANZ
This paper brings together a selection of the keynote presentations from experts across Australia and New Zealand as part of a Cyber Security Roadshow that was hosted in collaboration with PwC Australia and held mostly held virtually due to ongoing COVID-19 lockdowns in August 2021. Though each of the presenters came from different jurisdictions and a different perspective, it is remarkable that so many of their views were aligned and complimentary.
Cyber Security and Risk Management
State of Identity in a Post-Covid World
Obviously the pandemic has been and continues to be “a period of profound geopolitical, technological and societal change.” As part of that though, it has also been a “truly a fantastic opportunity to build more digitally enabled services, but these solutions and approaches must come hand in glove with ensuring that innovation remains secure-by-design, with cyber security practices and methodologies embedded into the process.” More than that, cyber security has become “an organisational imperative” because there’s been a surge in internet traffic and activity which has led to criminals “seeking to strategically disrupt critical infrastructure and global supply chains to …
Cyber Security and Risk Management
Embedding Security Rules and Controls to keep networks safe
In our connected world, when all industries are using technology and the internet for work as much as for communication and entertainment, it is important to ensure that the networks are safe and secure, and that the policy settings are appropriate. ““Securing our networks is about people, processes and technology. Our job is to protect the organisation from the world, but also to protect the world from our organisation. Last year we blocked over 190,000 viruses, and we also had to stop inquisitive students trying to penetrate our systems.”” Steve Woodhouse, Chief Information Security Officer, Department of Education (QLD) ““To …
Cyber Security and Risk Management
Innovative Solutions to combat Cyber-Attacks
Cyber-attacks are becoming more prevalent and the attackers are becoming more brazen and creative. Combatting these attacks requires innovative solutions like endpoint security and protection. This paper brings together the perspectives of three cybersecurity professionals, with a focus on security protection, security deployment and security awareness. The lessons from these perspectives will assist in ensuring that the right protections are in place, and that data is as secureas it can be.
Cyber Security and Risk Management
Protecting your Digital Identity in our modern world
Protecting digital identities in our modern world is critical, particularly at work. This process of identity and access management (IAM) has become so important in some large workplaces, that it has become its own very important field of practice. This paper brings together the perspectives of two IT experts, showcasing that IAM is a necessary consideration when designing or re-engineering any IT systems, and that protecting digital identities should always be a priority.
«
First
‹
Previous
…
11
12
13
14
15
16
Next
›
Last
»
Recommendations
Service Transformation in the Digital Age
On Demand
7 Nov 2024
Using the Victorian Protective Data Security Standards (VPDSS) to Manage 3rd-Party Risk
Industry Trends
30 Sep 2024
Innovation State – Setting the Stage
Industry Trends
8 Nov 2024
Let's Chat: Key Steps to Transform Traditional Government Services
Interviews
27 Aug 2024
Harnessing AI in the Public Sector
Whitepapers & Reports
18 Sep 2024