Beyond the Firewall: The Human Element in Cybersecurity
From leadership strategy to frontline readiness, discover how the public sector is reframing cybersecurity as a human challenge—one that blends technology with trust, empathy, …
37 videos
From leadership strategy to frontline readiness, discover how the public sector is reframing cybersecurity as a human challenge—one that blends technology with trust, empathy, …
Quantum computing is redefining what’s possible in data processing—and what’s at risk. As the public sector prepares for the next wave of technological disruption, …
This session explores how public sector organizations are integrating AI into their security operations to build faster, smarter, and more adaptive defense models
This panel explores how governments can lean into AI’s opportunities while addressing the risks head-on
A Whole-of-Nation Cyber Mission: Inside Lt. Gen. Michelle McGuinness’ Keynote on Australia’s Cyber Future
Australia’s next phase of cyber policy focuses on fewer initiatives, deeper impact, and stronger public–private collaboration.
A Fireside chat on ensuring AI drives innovation safely requires national collaboration, secure-by-design practices, and strong governance across government and industry.
Proactive, real-time risk visibility, not reactive patching, is now the backbone of modern cyber resilience across Australian government agencies.
Session Recap: Simplifying Micro-Segmentation for Faster, Safer Cyber Defence
Her presentation examined one of the most pressing challenges in public-sector cyber security: supply-chain risk and the growing compliance burden placed on SMEs that …
Australia’s cyber landscape is shifting fast — here’s how national leaders are preparing, protecting, and responding
Nicole Henry examines what she terms the “trust equation”—the delicate balance between innovation, security, and resilience in an increasingly interconnected world.
Local governments across Australia are facing a period of unprecedented complexity. Their responsibilities have grown far beyond the traditional “roads, rates, and rubbish,” encompassing …
Empowering women in cybersecurity requires early engagement in STEM, inclusive recruitment, and mentorship to close the gender gap.
With cybersecurity threats increasing in scale and frequency, traditional point-in-time approvals such as Authority to Operate (ATO) are no longer sufficient.
Ejaz Ahmad, Head of Cybersecurity Operations at Airservices Australia, shares how aligning compliance with risk-based security builds resilience and creates business value.
This session will show you how to apply new approaches to turn your cybersecurity strategy into practical, measurable outcomes that stop threat actors before …
Cybersecurity strategy is the big picture that gives us the chance to begin solving that puzzle, rather than just being experts on a few …
Federal cyber experts explore AI’s role in cybersecurity, strategies to demystify AI, and the balance between innovation and cyber safety. Don’t miss this insightful …
This panel explored how secure, scalable infrastructure—supported by technologies like blockchain, distributed identity, and federated learning—can strengthen data sharing in healthcare while addressing cybersecurity …
Holly Drake from Ohio Department of Administrative Services outline how the state’s strategic vision to “explore solution and service innovation through emerging technologies” is …
Cyberattacks against government agencies and critical public infrastructure have soared over the past few years. Is your cybersecurity strategy ready for today’s threats? Identity …
As IoT adoption grows, so do the risks.
Defence SA, UniSA, Check Point and Thales dives into what it really takes to grow South Australia’s cyber sector.