Communities
Communities
Toggle communities dropdown
All Communities
General Discussion
Cyber Security & Risk Management
Data & Analytics
Digital Government & CX
Education & Future of Learning
Health & Human Services
Local Government & Communities
National Security & Public Safety
Operational & Process Excellence
People & Culture
Smart Cities & Mobility
Technology & Transformation
Events
Upcoming Events
Past Event Highlights
Event Management Services
Sponsorship
Academy
Overview
Courses
Insights
Marketplace
Join now
Login
My Homepage
Menu
Learn
Upskill
Connect
Attend
Solve
Join
Become a member
Insights
Access quality content from global government thought leaders
Search text
Members-only
Public
Reset
Most Recent
Most Popular
Content Type
---------
Fundamentals
Industry Trends
Interviews
Benchmark
Case Studies
Deep Dive
Guides
On Demand
Whitepapers & Reports
Region
Select region...
Australia
Canada
New Zealand
United Kingdom
United States
Communities
Cyber Security & Risk Management
Data & Analytics
Digital Government & CX
Education & Future of Learning
General
Health & Human Services
Local Government & Communities
National Security & Public Safety
Operational & Process Excellence
People & Culture
Smart Cities & Mobility
Technology & Transformation
Cyber Security & Risk Management
Spotlight: Trellix's Best Performing Technology
Organisations find themselves unable to handle the dynamic and ever-changing threats. To keep pace with these dynamic attacks and to ensure greater visibility, control and ultimate peace of mind, organisations are on the lookout for more centralised visibility and quick resolution of their security issues. We must unleash smart and adaptive capabilities inherited from artificial intelligence and machine learning. New capabilities must touch all aspects of our architecture, process and skills. With the growing sophistication of threats, it’s easy to see why so many businesses are vulnerable to attacks and also why we have to shift our thinking, our approach …
Cyber Security & Risk Management
Spotlight: Tap into Graph Technologies with Neo4j
We’re seeing very strong demand for knowledge graphs which are essentially an interconnected dataset enriched with meaning, and primed for complex decision making As complex data volumes grow, the types and composition of problems become very varied - an issue government departments and agencies (and the private sector) continue to grapple with. But we have the answer in the form of knowledge graphs that present new ways to use data to drive citizen outcomes. A graph data platform can efficiently model complex networks of entities and their interrelationships, and uncover patterns that are difficult to detect using traditional representations - …
Cyber Security & Risk Management
NDIA's Tips on sharing a Relatable Cyber Story
In an increasingly volatile cyber landscape, one of the biggest challenges facing security leaders is communicating risk and raising cyber awareness across an organisation. In order to increase resilience and maintain good cyber hygiene, it is necessary to convey the need for cyber securi…
Cyber Security & Risk Management
Illuminating Tips on Risk Management
To illustrate the importance of cyber risk management, “let us to look at the fictional case study of a small business.” It might be fictional in that this particular business does not exist, but all the components of the case study are real and based in reality. The business is run by two entrepreneurs “who have a passion to move forward, producing beautiful and functional shoes.” They have been in business for a decade, with a “strong community of customers and they have wonderful relationships with their suppliers, their artists and producers.” As entrepreneurs, the two partners are always looking …
Cyber Security & Risk Management
Case Study Highlights : Cyber Incident Response Strategy
Apart from just providing forecasts, the BOM also “supports flood activity, cyclones, fires and all other critical weather related activities.” In many ways, “we’re primarily a data organisation, and we support a lot of critical infrastructure as well.” As such, “our data is extremely important,” and this was proven in drastic ways when “we had a major cybersecurity attack in 2016.” It is unclear exactly who was responsible, but the attack was conducted with the use of remote malicious software aimed at mining data about “who we communicate with, but also who our customers and partners are. This set the …
Cyber Security & Risk Management
2022's Top 3 Rising Cyber Threats
As Australia and New Zealand carry on the battle against Covid-19 and companies continue to move to a hybrid model of working, cybersecurity has become more important than ever. Cyber-attacks grew exponentially in 2021 and 2022 looks set for more of the same. Below are three rising threats companies are facing in the year ahead. Ransomware attacks continue to threaten the security of critical data across the globe. Cyber criminals have exploited the pandemic by carrying out more large scale phishing attacks, affecting businesses of all sizes across Australia and New Zealand. These attacks succeed largely due to human error, …
Cyber Security & Risk Management
Practices to Bolster Your Fraud Intelligence Program to Prevent Corruption and Online Threats
Fraud, cybercrime, and other related issues are major hurdles that most organizations have to deal with. They take up precious business time and cost lots of money. The Canadian Anti-Fraud Centre (CAFC) was setup to identify and deal with various types of fraud, and Jeff Thomson, the Senior Criminal Intelligence Analyst with the Royal Canadian Mounted Police (RCMP) at the CAFC, says that it was set up in partnership with the RCMP, the Ontario Provincial Police and the Competition Bureau of Canada. It is an exciting and unique place to work because we’re reducing fraud every day. They don’t do …
Cyber Security & Risk Management
Cyber Culture & Awareness with CSCRC
While we need to adapt and respond quickly to cyber threats, when it comes to strengthening our own defences, we also need to think carefully about the ethical implications of modern technologies. It is a tricky and delicate balancing act. We do need to consider what should be done with technology, rather than just being swept up in what could be done, and the endless potential of the digital world we live in. Importantly, we also need to remember that trends and crystal ball gazing is vital but just getting the basics right is something that the government also needs …
«
First
‹
Previous
…
15
16
17
18
19
20
21
22
23
Next
›
Last
»
Recommendations
Let's Chat: How California Harnesses Digital Services to Benefit Citizens
Interviews
30 Apr 2024
Ground Breakers: Teresa Scott, Executive Director, Australasian Procurement and Construction Council
Interviews
8 Jul 2024
Australia's Digital ID: Modernising Identity Verification and Building Trust
Interviews
5 Jun 2024
Enhancing Cyber Security in Victoria
Industry Trends
16 May 2024
Federal Government Speaks: 27 Quotes from Australia's Top Digital Transformation, Tech & Policy Executives
Interviews
15 Jun 2024