Explore
Communities
All Communities
General Discussion
Cyber Security and Risk Management
Data, Analytics and AI
Digital Services and Customer Experience
IT Modernization and Cloud
Workforce, Skills and Capability
Events
Upcoming events
Past event highlights
Event management services
Sponsorship
Academy
Overview
Courses
Insights
Marketplace
Join now
Login
My homepage
Communities
Communities
Toggle communities dropdown
All Communities
General Discussion
Cyber Security and Risk Management
Data, Analytics and AI
Digital Services and Customer Experience
IT Modernization and Cloud
Workforce, Skills and Capability
Events
Upcoming events
Past event highlights
Event management services
Sponsorship
Academy
Overview
Courses
Insights
Marketplace
Menu
Join now
Login
Learn
Upskill
Connect
Attend
Solve
Join
Become a member
Insights
Access quality content from global government thought leaders
Search text
Members-only
Public
Reset
Most Recent
Most Popular
Content Type
---------
Fundamentals
Industry Trends
Interviews
Benchmark
Case Studies
Deep Dive
Guides
On Demand
Whitepapers & Reports
Region
Select region...
Australia
Canada
New Zealand
United Kingdom
United States
Communities
Cyber Security and Risk Management
Data, Analytics and AI
Digital Services and Customer Experience
General
IT Modernization and Cloud
Workforce, Skills and Capability
Cyber Security and Risk Management
New Ways to look at Cyber Vigilance
The problem though, especially from a cyber security perspective, is that the organisation has already been set up so “we are building the house while we’re living in it.” This is especially challenging since because of COVID-19 “we’ve compressed seven years of technological investment into two.” The pandemic has meant that “the concept of work has changed forever,” whilst the impact has been “profound on all of us, individually, collectively and organisationally.” Yet at the end of the day, people and organisations are mostly concerned by what all the chaos and confusion means for them. The “culture of vigilance” needs …
Cyber Security and Risk Management
5 Inter-Related Takeaways of Data & Risks
The last couple of years since the start of the pandemic have seen an increase in the types and number of cyber security threats, but also in the brazenness of the attacks. Some of the breaches have cost not just money, but reputational damage as well, whilst others have cost jobs. These …
Cyber Security and Risk Management
Spotlight: Trellix's Best Performing Technology
Organisations find themselves unable to handle the dynamic and ever-changing threats. To keep pace with these dynamic attacks and to ensure greater visibility, control and ultimate peace of mind, organisations are on the lookout for more centralised visibility and quick resolution of their security issues. We must unleash smart and adaptive capabilities inherited from artificial intelligence and machine learning. New capabilities must touch all aspects of our architecture, process and skills. With the growing sophistication of threats, it’s easy to see why so many businesses are vulnerable to attacks and also why we have to shift our thinking, our approach …
Cyber Security and Risk Management
Spotlight: Tap into Graph Technologies with Neo4j
We’re seeing very strong demand for knowledge graphs which are essentially an interconnected dataset enriched with meaning, and primed for complex decision making As complex data volumes grow, the types and composition of problems become very varied - an issue government departments and agencies (and the private sector) continue to grapple with. But we have the answer in the form of knowledge graphs that present new ways to use data to drive citizen outcomes. A graph data platform can efficiently model complex networks of entities and their interrelationships, and uncover patterns that are difficult to detect using traditional representations - …
Cyber Security and Risk Management
NDIA's Tips on sharing a Relatable Cyber Story
In an increasingly volatile cyber landscape, one of the biggest challenges facing security leaders is communicating risk and raising cyber awareness across an organisation. In order to increase resilience and maintain good cyber hygiene, it is necessary to convey the need for cyber securi…
Cyber Security and Risk Management
Illuminating Tips on Risk Management
To illustrate the importance of cyber risk management, “let us to look at the fictional case study of a small business.” It might be fictional in that this particular business does not exist, but all the components of the case study are real and based in reality. The business is run by two entrepreneurs “who have a passion to move forward, producing beautiful and functional shoes.” They have been in business for a decade, with a “strong community of customers and they have wonderful relationships with their suppliers, their artists and producers.” As entrepreneurs, the two partners are always looking …
Cyber Security and Risk Management
Case Study Highlights : Cyber Incident Response Strategy
Apart from just providing forecasts, the BOM also “supports flood activity, cyclones, fires and all other critical weather related activities.” In many ways, “we’re primarily a data organisation, and we support a lot of critical infrastructure as well.” As such, “our data is extremely important,” and this was proven in drastic ways when “we had a major cybersecurity attack in 2016.” It is unclear exactly who was responsible, but the attack was conducted with the use of remote malicious software aimed at mining data about “who we communicate with, but also who our customers and partners are. This set the …
Cyber Security and Risk Management
2022's Top 3 Rising Cyber Threats
As Australia and New Zealand carry on the battle against Covid-19 and companies continue to move to a hybrid model of working, cybersecurity has become more important than ever. Cyber-attacks grew exponentially in 2021 and 2022 looks set for more of the same. Below are three rising threats companies are facing in the year ahead. Ransomware attacks continue to threaten the security of critical data across the globe. Cyber criminals have exploited the pandemic by carrying out more large scale phishing attacks, affecting businesses of all sizes across Australia and New Zealand. These attacks succeed largely due to human error, …
«
First
‹
Previous
…
19
20
21
22
23
24
25
26
27
…
Next
›
Last
»
Recommendations
Secure Content: Agencies’ Next Zero Trust Priority
Industry Trends
31 Oct 2024
Why Do You Go To Work?
Guides
31 Oct 2024
Colorado Department of Revenue: How A Data-Driven Culture Fosters Continuous Improvement
On Demand
6 Nov 2024
The Impact of AI on Government Technology and Strategic Pathways Forward
Industry Trends
18 Oct 2024
Why Visual Learning Matters
Industry Trends
30 Oct 2024