This 2-hour online course will empower you with the fundamentals needed to secure yourself against common cyber-threats.
The session will dive into the simple and effective measures you must have in place to protect your personal data—practical no-cost steps you can implement immediately to reduce your risk.
This 2-hour online course is designed for team leaders and small business owners, guiding them on how to work securely and prevent common cyber-attacks against their organisation.
The course will cover ways data can leak, be lost, or stolen from your organisation, and provide strategies to manage and mitigate these risks.
This 2-hour online course will empower you with the fundamentals needed to secure yourself against common cyber-threats.
The session will dive into the simple and effective measures you must have in place to protect your personal data—practical no-cost steps you can implement immediately to reduce your risk.
This 90-minute online course is designed for Human Resource/People & Culture team members, guiding them on how to work securely with organisational personal and sensitive data.
The course will the cover the various ways that data can leak, be lost, or stolen from your organisation, and provide strategies to manage and mitigate these risks.
This 2-hour online course is designed for team leaders and small business owners, guiding them on how to work securely and prevent common cyber-attacks against their organisation.
The course will cover ways data can leak, be lost, or stolen from your organisation, and provide strategies to manage and mitigate these risks.
This course looks to bring senior executives up to speed with the current threat landscape, and how this may impact their organisation. It reviews the more common cyber threats and delves into mitigation strategies.
The session aims to empower senior leaders and executives with a strategic approach to objectively assessing an organisation’s cyber and data security. It introduces a framework-based approach to managing cyber risk, introducing governance, and reporting the organisation’s posture & progress at the leadership level.
In Manufacturing, as in many other industries, there is a growing use of automation technology to increase the efficiencies and quality of production output. This digital transformation of industrial processes (often called Industry 4.0) comes with its own unique security challenges.
This online course outlines best-practice strategies to securing both your office (“IT”) environment, as well as the operational technology (“OT”) that keeps the systems on your shop floor running.
This 2-hour online course will empower you with the fundamentals needed to secure yourself against common cyber-threats.
The session will dive into the simple and effective measures you must have in place to protect your personal data—practical no-cost steps you can implement immediately to reduce your risk.
The Essential Eight has become the cornerstone of security for all Federal Government departments & agencies. And it has also become the preferred security framework adopted by Australian businesses, due to its ability to dramatically reduce cyber-attack risk through a manageable list of strategies.
Recently, the requirements for all organisations working with Defence has changed. For new and existing DISP members, the minimum compliance level has been lifted to the full eight strategies at Maturity Level 2. This course helps guide organisations that need to uplift their compliance, as well as those looking for a solid framework on which to base their organisation’s cyber strategy.
For nearly a full decade, the Essential Eight has been the primary security framework for both Australian governments and businesses alike.
This in-person workshop is a deep technical dive into each of the Maturity Levels of the ACSC Essential Eight strategies. It focusses on helping attendees understand how the 152 controls can be implemented in their own environment.
This face-to-face workshop is designed for the individuals responsible for creating a Cyber Incident Response Plan for their organisation. The session includes detailed templates and checklists that will be used as the focus to build out a comprehensive plan suitable to each attendee’s organisation.
This is unique course designed for IT Professionals. Its purpose is to provide practical technical guidance to those responsible for managing the IT environment of an organisation. It focuses on the techniques, approaches and solutions that help mitigate attacks in the growing sophistication of the threat landscape.
This 90-minute online course is designed for Human Resource/People & Culture team members, guiding them on how to work securely with organisational personal and sensitive data.
The course will the cover the various ways that data can leak, be lost, or stolen from your organisation, and provide strategies to manage and mitigate these risks.
In Manufacturing, as in many other industries, there is a growing use of automation technology to increase the efficiencies and quality of production output. This digital transformation of industrial processes (often called Industry 4.0) comes with its own unique security challenges.
This online course outlines best-practice strategies to securing both your office (“IT”) environment, as well as the operational technology (“OT”) that keeps the systems on your shop floor running.
This 2-hour online course is designed for team leaders and small business owners, guiding them on how to work securely and prevent common cyber-attacks against their organisation.
The course will cover ways data can leak, be lost, or stolen from your organisation, and provide strategies to manage and mitigate these risks.