Create your personal agenda –check the favourite icon
Ensuring Australia's defence capabilities whilst executing large scale digital and information transformation
Stephen Pearson, CIO, Australian Department of Defence
Digital Capabilities in Support of Organisational Resilience to COVID-19
Trust by Design – Who do you trust and why?
- Royal Commissions are highlighting a breakdown in trust
- Are new technologies A.I. and ML adding fuel to the fire
- Do we need more regulations, a new governance approach, both?
Achieving citizen centric digital transformation across government
- What are our citizens telling us that they want to improve the experience with government?
- How are we working together across government to deliver better outcomes through digital transformation?
- What are all the moving parts we need to bring together to make digital transformation work?
Developing machine learning and AI-based applications in supporting government services
Leanne Fry, National Manager Innovation & Technology Solutions, AUSTRAC
Data Essential for Identity: How next gen identity management may improve identity data
Before identity can be data, the identity itself must be assured. Disparate data in anonymous systems can mean inaccurate identity resolution. To help assure greater identity integrity, the underlying architecture of an identity management system must be constructed in a manner conducive to the highest assurance possible that disparate identity data is creating an accurate "identity", especially when that identity is used proactively to establish a security risk or access to government services.
- Identity data standards necessary for identity resolution
- Key concepts in next generation identity management architecture
- An overview of the US Department of Defense next generation identity management system
How the Australian Federal Police Uses Knowledge Graphs to Enable Better Governance
This session will explain:
- That the AFP has a need to cut red tape, support its frontline and reduce manual effort while remaining committed to continuous improvement of its governance and accountability mechanisms;
- How and why the AFP built a “Governance Knowledge Graph” using Natural Language Processing (NLP) to extract and map key governance entities and their relationships, including a demonstration on AFP public domain governance instruments; and
- What the benefits have been to date and what future steps could include.
AI Powered business transformation
- Sport Integrity Australia has moved from a paper based agency to fully in the cloud (at Protected) in 18 months which saw us win the IPAA Government innovation award last year.
- Sport Integrity Australia operates on a global stage with extensive global collaboration and partnerships.
- AI and data are the backbone of the transformation forming an informed and automated organisation.
- Talk about the lessons learnt, what went right and wrong and how Government agencies can use AI to accelerate their modernisation.
How to Combat the Fake News and Disinformation being used to Attack Your Organisation
A global cold war is being fought in cyberspace, and IT pros like you are finding themselves in the trenches. With all of this going on, how can you equip your employees and protect your networks from a malicious attack?Join Jacqueline Jayne, KnowBe4's Security Awareness Advocate for a deep dive into how the technology we rely on every day is being exploited to deliver powerful disinformation, misinformation, fake news, and other malicious exploits.We’ll discuss:
- How both facts and lies are weaponized
- Types of delivery systems (email, social media, videos, deep fakes, and more)
- What’s being done to address these trends
- Tips to protect your organisation and build your human firewall
Jacqueline Jayne, Security Awareness Advocate - APAC, KnowBe4
Identity, Data, and the Challenge of AI Deepfake Technology - A Brief Perspective
- Why is identity more important that ever?
- How can your identity data be collected, stored, and used?
- How can AI resources be used to defeat or confound identity authentication?
Personalising digital services through AI
People judge all digital services by the best digital services they see, and the best digital services subtlety and effectively personalise their customer experiences. Stephen will use a Financial Services case study to introduce you to the opportunities and challenges in using AI and machine learning on your data to build personalised digital services for Australians, including:
- Activating internal data:Learn the design patterns that allow data from deep within an organisation's data infrastructure to be used in customer facing digital services.
- Closed-loop Machine Learning:Discover how continuous intelligence systems learn in real-time about constantly changing customer behaviours and adapt their responses.
- Ethical AI: Understand how personalisation systems can be kept within ethical guide rails set by your organisation.
Australia's key international cyber and critical technology objectives
Identification Standards for the Future
- New Zealand has launched a new suite of Identification Standards that do things differently
- Flexible, yet robust controls that support new innovative approaches
- Standards that work in any delivery mode and designed with inevitable technological change in mind
Roundtable 01: Does Governance need to change to keep up with technology changes?
- With A.I. and Machine Learning, was H.A.L. from A Space Oddity a warning?
- Educating people, “Teach a hacker to Phish and they can hack for life”.
- And what about the customer?
Roundtable 02: Modern standards for strong authentication: Building a brick house for better security
- Development of FIDO Standards.How does Essential 8 rate FIDO Standards
- When will Australian organisations accept FIDO credentials?
- What are the barriers to (large scale) FIDO adoption?
- What are the benefits?Are they understood?
- What would the 3 Little Pigs do?
- Lessons learnt from international deployments
Roundtable 03: How to Engage Your Users so They Understand Their Role in Cybersecurity
Cybercrime has gone pro. More than ever, your users are the weak link in your network security. Wouldn't it be great if all your users understood their role when it comes to cybersecurity? The answer is a big YES and it is one of the biggest challenges IT professionals face today.The focus is on you so join this round table discussion to share your unique challenges. Jacqueline Jayne, KnowBe4's Security Awareness Advocate will provide guidance along with three specific recommendations that will make this process easier for you.
Jacqueline Jayne, Security Awareness Advocate - APAC, KnowBe4
Roundtable 04: Barriers and solutions to activating data for automated decisioning
Sharing and discussion of the common barriers and solutions that exist in activating data for automated decisioning. This will consider a) Ethics; b) Data Access; c) Modelling; d) Production; and e) Monitoring.In addition to hearing from your Departmental peers, we will share our own insights from both the private and public sectors and also provide some thought leadership aimed at helping you assess your current state and determining your future roadmap.
Roundtable 05: Pivot to deliver seamless citizen-centric services with zero risk
The bush fires in Australia were still very fresh in our memories when the pandemic kicked in – hardly giving the nation a chance to recover and overwhelming our ability to serve our citizens. Volunteer firefighters stepped up during the bush fires and collaboration platforms used by qualified doctors helped to serve patients without the need for waiting rooms. Is there a safe and secure collaboration model where government and citizens can come together to support the nation without compromising security and privacy?
Marcus Vogt, Customer Success Manager, Micro Focus
Niel Pandya, Business Consultant, Micro Focus
Roundtable 06: The Value of Digital Identity
Explore the value of digital identity and discuss how to transform the citizen's experience while abiding by new regulations stemmed from the rising rate of cybercrimeGovernments are pressured to adapt to a ‘new normal’ while quickly evolving and delivering exceptional user experiences. But at the same time, regulations are changing businesses globally.As a result, enterprises have found themselves increasingly dependent on their IT departments but they appear to be understaffed and overloaded. So, how can you do more with less?
Allan Foster, Chief Evangelist, ForgeRock
Roundtable 07: Is your DevOps readiness meeting or hampering citizen needs?
Join this round table and learn the findings from our 2020 joint study with research firm Omdia on the government’s digital maturity in adopting DevOps and Agile methodologies to automate and deliver high quality, secure applications that will enhance citizen-centric services. We will explore the different drivers and challenges of leveraging vast sources of data and technology such as AI in becoming a trusted citizen-centric government agency.
John Garratt, Federal Government Chief Technologist, Micro Focus
Roundtable 08: The criteria for a successful transformation program in Government?
- How do teams working in silos collaborate?
- How can we more effectively communicate between teams on the low to the high side in a highly secure (sensitive) environment?
- How do you measure “Speed to Mission” or is it not important?
- When is it best to engage security teams in the transformation program?
Roundtable 09: Upskilling, the missing link to close the cyber security gap
- How equipped is the government to upskill their cyber capabilities?
- Upskilling Appsec- an important part of building cyber resilience, protecting software and critical infrastructure in the modern day
- Should minimum standards and certifications be introduced to ensure we have security aware people working in the industry
Roundtable 10: Challenges and benefits of Private Public Partnerships in Government Cloud Applications: insights with a commercial SME drug and testing solutions provider
- Benefits & challenges in pairing commercial agility with government need
- Leveraging Technology to address risks: Cloud, 5G, Cybercrime
- The Covid19-Informed Future: Emerging technologies in a remote health and cloud-driven world
Roundtable 11: A Case Study - why the US Department of Defense chose Menlo Security to keep their 3.5 million personnel 100% Malware Free
- What is Isolation Technology?An introduction to the World’s Only Cloud Proxy Platform Built on Isolation Core which can guarantee 100% Malware Protection.
- How Menlo Security solved a big problem for the US Department of Defense.And why they stayed away from legacy cyber security providers.
- A 2 minute sneak peek of the platform; Q & A;A competition and a special prize of a 90 days free trial for a limited number of Teams.
Technology Business Management (TBM) in NSW Government: Strategic intent and practical experience - Presentation supported by Apptio
Learn how Transport for NSW has built a sustainable business, reduced the unit cost of delivering IT and built trust through strategic intent and how the discipline of Technology Business Management (TBM) is utilised across NSW Government to optimise technology spend.
The potential of robotics and AI to solve Australia’s grand challenges
- Australia’s strength in cyber-physical systems
- Advances in robotics and AI
- The relationship between robots and humans
Building cyber security capability in the healthcare sector
- With an increased use of technology comes a need to focus on securing sensitive information.
- Cyber security is a team sport - how we can support each other to better understand and mitigate risks of informaton security
- Building cyber security defence capabilities across the entire health ecosystem
Anthony Kitzelmann, Chief Information Security Officer, Australian Digital Health Agency
Smartphones and Artificial Intelligence: A new paradigm for remote identity proofing and document authentication
Government agencies and commercial entities that rely on the services of identity providers within a digital identity ecosystem will require various levels of confidence in establishing the legitimacy of an individual’s identity. This is achieved via an identity proofing process which continues to rely on, among other attributes, government-issued documents as evidence of identity. The ability to remotely verify the authenticity of those physical documents is an important element in the resident’s digital identity on-boarding process. In this respect, a new paradigm is on the way.
- Why physical documents are important in the context of digital identity
- The role of highly secure Diffractive Optically Variable Image Devices (DOVIDs) in protecting documents
- Remote verification of DOVIDs using smartphones and Artificial Intelligence?
Producing lean governance service models for scaling robot telepresence to help sick kids
- Using technology to drive policy change across complex problems, government sectors and jurisdictions
- Applying innovation principles to developing new-breed governance service models capable of scaling solutions
- Solving social problems by mobilising the strengths of government, private sector, social enterprise and not-for-profits
Driving service delivery through the adoption of Intelligent Automation and AI
Know Your Adversaries Through Genetic Analysis - A Strategic Advantage For National CERTs
Ari Eitan, VP Research, Intezer
Achieving interoperability health systems
Zoran Bolevich, Chief Executive And CIO, NSW Health
Automated Records Capture for Government Employees
- Everyone who works for a government agency needs to make records
- Automated capture systems don’t always capture everything
- EzeScan fills the gap between manual and fully automated and makes records capture simple for everyone
How Artificial Intelligence is used to improve our transport system
Ensuring cyber safety and protecting yourself from the latest online scams
- An explanation of the role of the ACCC’s Scamwatch function in the Australian government’s fight against scams.
- The latest scams affecting Australians in 2020, noting some in particular have risen in prevalence as a result of lifestyle changes due to the recent pandemic.
- Scam protection advice, both generally and with respect to the most common scams at the moment.
ConnectID: Eftpos’ national digital identity infrastructure
- The eftpos digital identity infrastructure for Australia
- Digital Identity framework interoperability, TDIF and TrustID
- Use cases for Government
Singapore's National Digital Identity Project
Designing a strong coordinated response against cyber-attacks on your organisation
Create your personal agenda –check the favourite icon
Detect, Derail and Respond to attacks using Active Defence
- Detect attackers that evade perimeter defences
- Derail their attack by hiding your assets and presenting false assets
- Prevent Lateral Movement and Privilege Escalation
Protecting the United States with biometrics
- USBP’s biometric initiatives
- USBP’s biometric response to back to back border crises
- USBP’s use of biometric technology during the COVID-19 pandemic
Australia's Blockchain Future: What does federal blockchain policy mean for the Australian Public Service?
Chloe White will provide an overview of the federal government’s first National Blockchain Roadmap 2020-25 and its relevance to the public service.
The NSW Spatial Digital Twin
- A complete 3D and 4D model (the NSW Spatial Digital Twin) covering eight local governments (8,000KM2, 400,000 parcels) in Western Sydney has been completed as a Minimum Viable Product, as part of building the Business Case for a state-wide implementation
- Preparation of the Business Case is underway, with completion expected in February 2021
- The preparation of the MVP has been invaluable in understanding the cost and benefits that a NSW Spatial Digital Twin will deliver.
David v Goliath in the Cyber Space, a story of effective Government collaboration
Troy Micallef, Deputy Chief Information Officer, Sport Integrity Australia
Aligning Identity across Government
- How do you identify people across multiple programs when we all capture data in different ways? What happens when you cannot share information due to legislation.
- How do we work across Commonwealth, State and Local government to achieve these outcomes.
- How do we ensure that the business change and the IT change is complementary and meets the needs of the people.
Blockchain applications in Australian agriculture
- Blockchain is next generation digital economic infrastructure for trade, smart contracts, digital payments, identity, provenance tracking
- Agricultural supply chains will move to blockchain
- This will bring massive benefit to Australian agricultural producers and exporters
Jason Potts, Director, RMIT Blockchain Innovation Hub, RMIT University
Publishing government data - interactive, easy to use and rich in meaningful insights
- Introducing our flexible self-service data dissemination platform.
- How to secure confidential data without compromising on usefulness.
- How API access can integrate your single source of truth into apps, reports and infographics and open up innovation through data re-use.
Security: A critical analysis of new risks and emerging threats
The panel will look at how the international landscape and COVID-19 are reshaping security threats for business, including rising threats of state- and non-state actors, the rapid shift to working from home, and the growing migration and reliance on cloud connectivity and platforms.
Exploring how digital identity technology and policy are being shaped in the Global South, with a particular focus on Latin America and Brazil.
- Panorama of digital identities and sectoral uses in Latin America, considering healthcare, financial inclusion, digital government and social protection. With examples from Brazil, Peru, Chile and Mexico.
- Practical examples of digital identity conjuncture in Brazil, including from a historic failure in institutionalizing a unique civil identification until our joint initiative with the Rio de Janeiro's Ministry of Finance with a decentralized mobile-based wallet for digital authentication, and its technical and legal challenges.
- How to really influence the decision-making as to maximize the benefits and minimize the harms of our digital identity design choices? In the last session of the presentation a short interaction with a social policy game (IDLand) to inform authorities and policy-makers in their decisions.
Blockchain Use Cases – overview on the potential application of Blockchain and Distributed Ledger Technologies (DLT)
Service Victoria - A customer-centric government start-up
- Why digital customer experience is moving fast
- Organisation shouldn’t impact service
- Service Victoria’s journey
Safeguarding Australia's control systems and critical infrastructure
Identity during COVID-19
Sue Egan, Director, Identity Program Fraud Control & Assurance Branch Business Integrity Division, Services Australia
Government adoption of blockchain technology - lessons around the world
- What countries are leading in government adoption of blockchain technology?
- What are they doing right and what can Australia learn?
- What does this mean for the National Blockchain Roadmap?
Steve Vallas, CEO, Blockchain Australia
Implementing a new tool to define an appropriate project management methodology
- Taking an innovative approach to the implementation of a cost effective open and transparent project/portfolio “management” solution within a NSW Government department
- Managing change, and resistance, through the planning, execution, and in the ongoing live environment.
- Influencing change across the broader Health network through innovation, and demonstrable success measures.
Levers of Human Deception: The Science and Methodology Behind Social Engineering
No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.Join Jacqueline Jayne, KnowBe4's Security Awareness Advocate as she shares her insights and examples of mental manipulation in everyday life: from the tactics used by tricky advertisers to sophisticated social engineering and online scams. Additionally, we’ll look at how to ethically use the very same levers when educating your users.We'll discuss:
- The Perception Vs. Reality Dilemma
- Understanding the OODA (Observe, Orient, Decide, Act) Loop
- How social engineers and scam artists achieve their goals by subverting OODA Loop's different components
- How we can defend ourselves and our organizations
Jacqueline Jayne, Security Awareness Advocate - APAC, KnowBe4
Facial recognition technology: A looming human rights issue
- What are the risks for the community… and government?
- Beyond the facial recognition sales pitch: accuracy and why this matters
- The right to privacy and the need to avoid mass surveillance
Cryptographic Technologies and Cyber Security in Real World Systems (Blockchain)
- Basic introduction of cryptographic technologies in real world systems
- Examples of using cryptography in our daily life
- Importance of using cryptographic technologies to provide cyber security
Cyber Resilience: An essential part of Digital Transformation
As the world continues to see Digital Transformation (DX) tested to its limits in the face of COVID-19, CISOs are focused on shifting from traditional cybersecurity to strong cyber resilience. Cyber resilience is the ability of an organisation to enable business acceleration (enterprise resiliency) by preparing for, responding to, and recovering from cyber threats. A cyber-resilient organisation can adapt to known and unknown crises, threats, adversities, and challenges. Join John Delk to hear how you can assess your DX journey and ensure security is built in throughout the journey and not a destination you reach after the fact.
John Delk, Senior Vice President and General Manager, Security Product Groups, Micro Focus
Critical Infrastructure and the Future
The presentation will focus on the future direction of Critical Infrastructure and what it means for Australia in terms of new security risks and policy challenges and will refer to the new home affairs discussion paper.
Have you built a brick house ? Operational considerations of implementing Strong Authentication
- Data breaches are costly, disruptive and unfortunately, increasing.The majority of data breaches today are still caused by stolen login credentials.Multi-factor authentication (MFA) is generally recognised as a sound mitigation strategy to prevent phishing and man in the middle attacks.As the sophistication of attacks increases, traditional two-factor authentication techniques (2FA) are no longer adequate.
- With FIDO2/WebAuthn standards for MFA, organisations can benefit from a frictionless user experience whilst strengthening security to prevent phishing and MitM attacks.The FIDO2/WebAuthn standards also pave the way for a future passwordless authentication experience.
- Understand why a brick house keeps the attackers at bay.
The role of data in defining the technology strategy for the council
Simon Weller, IT Architect & Data Capability, City of Melbourne
Cognitive computing systems in the public sector
- Critical success factors when designing, developing, and deploying CCSs
- Governance challenges that one must address to maximize value from CCSs deployments
- A maturity model to guide organisations to bolster their CCSs capabilities
Building Australia's cyber security capability through collaboration between industry, government and research
Computer vision - current applications and the future trends
Computer Vision is going to be the driving force behind many significant changes in the world in the next few years. But it won't come without its controversies.With the cost of the technology being negligible and the applications for CV being everywhere from Security to Identity and Entertainment. But with the good comes abuse with such technology as Deepfakes.This talk looks at where we are today with CV, what is going to propel is forward and what the next few years will look like.
Skeeve Stevens, Director, Future Crime Agency
Designing human centred technology solutions - Meet 'Dexter' the Ro'bot'
- Understanding human centred design principles to improve citizen services
- Using research, feedback and engagement to consider the needs of citizens
- Improving digital processes through: Introducing ‘Dexter’
How Machine Learning and AI capabilities can enhance efficiency and service delivery
Manasa Kesharaju, Senior Data Scientist, Australian Department of Defence
Frictionless Digital Trust & Government Services
How Government can embrace Digital Trust and Frictionless Citizen Experience to encourage citizens to consume government services
Allan Foster, Chief Evangelist, ForgeRock
The Smart Beaches Project
Tony Blunden, Project Manager, Lake Macquarie City Council
Natural Language Understanding (NLU) makes ALL data accessible for business transformation
Discover how NLU can empower agencies by:
- Monitoring new real-time information to support the entire intelligence process, from data acquisition to knowledge dissemination
- Automate processes dependent on understanding multiple complex documents and policies
- Provide seamless self-service in multichannel engagement, self-service systems, chatbots, email management and optimise other customer channels
Andrew Smailes, Director, Raedan AI
Cyber Security as a Team Sport
In the panel session we will discuss how to realise the benefits of increased funding for cyber security, through collaboration and teamwork amongst all level of government
Correct photo capture requirements
Critical to ensure accurate Smart Gate Border & Enrolment matching
John Rule, Managing Director & ISO Committee Member IT 032 SC 37, Brands Australia
Speed to Mission: How adopting a Cloud Native approach can help Government Agencies accelerate software delivery without compromising security
Cloud & 5G
- Best practices for a cloud native transformation and achieving speed to mission
- Improve your agencies speed to deliver innovative services
- Technologies and processes that enable dynamic cloud native environments within government agencies
Collaboration between government, industry, academia and community – a key part to Australia’s cyber security strategy
Cracking down on crime and terrorism with an effective identity program
Darren Bark, Director, Strategic Priorities & Identity, NSW Police Force
Embracing Cloud Infrastructure to improve Digital Capability and Efficiency
Cloud & 5G
- How did Geoscience Australia embrace the use of cloud technology?
- What cloud-native approaches have provided the organisation?
- Why is it that cloud is so important for velocity, quality and usefulness of our digital systems?
What makes a single solution single? A guide to buying a Payroll and HR System
When selecting a payroll and HR system, organisations have a huge number of choices. These include multiple product vendors that offer their own or white labelled software and single product solutions.But how can you tell if you are dealing with a single solution vendor or a single vendor offering multiple products as one, and which is the best approach?Join Nick Southcombe, CEO of Frontier Software and Rob McKie, Partner / Executive Director at Pitcher Partners as they examine and weigh up the options.
Digital Identity - Putting the pieces together
David Marsh, Innovation Manager, Australian Payments Network
ICT Adoption in NSW Local Government: Views from the Coalface
The rhetoric around ICT adoption in local government looms large: Smart cities, rumours of a lack of suppliers in the ERM space, and the vexatious nature of social media. But what is the experience of ICT professionals in the sector? We undertook ethics approved, anonymous in-depth interviews with 31 ICT professionals from a range of council types in NSW. We found that ICT adoptions in local governments are incredibly complex, with IT professionals having varying levels of experience in local government. New policy changes by other tiers of governments, organisational cultural factors, compliance obligations, the digital divide in the community, rapid changes in technology, the domination of ICT vendors and community engagement are some of the most apparent influences on ICT adoptions in councils. Most of all, ICT professionals want a seat at the strategy table, with only some allowed a chair.
Building a trusted research cloud
Cloud & 5G
- Delivering trusted infrastructure to enable the Australian Research Community to work with government and other sensitive data
- Challenges in connecting the research community with government data including cyber-security and data sovereignty.
- Delivering trusted network connectivity to the Research and Education Sector in Australia
Working smarter, not harder: Leveraging government procurement to improve cybersecurity and supply chains
- Government spending on ICT procurement dwarfs the budgets directly allocated under the recent cybersecurity strategy - how can this spending power be leveraged to uplift security?
- There are opportunities to stimulate suppliers to find innovative cyber security solutions that can have direct and indirect security and economic benefits to Australia
- The talk will examine the barriers to this, and provide recommendations to change the procurement systems, approach and regulations to realise these opportunities
Service Victoria: digital proof-of-identity
- Using a legislative framework to embed privacy and security by design
- Contact-less identity verification
- Reuse: opportunities and constraints
- Future-proofing digital ID
Digital Innovation: Aiming to Learn Fast in Local Government
- What is Digital Innovation?
- What are we doing differently?
- What have we learned so far?
5G topic TBC
Cloud & 5G
Matthew Schultz, President, Australian Smart Communities Association
Cyber Awareness: Exploring actions Australia can put in place for maximum impact
Our digitised world means cyber security and diligence is everyone’s responsibility. Putting in place cradle to grave capabilities in the community to lift levels of cyber awareness is a huge challenge – from addressing the growing skills gap, to reinforcing our business sector’s resilience, to future proofing government services. This discussion, with international partners of RMIT’s Cyber Ready Cloud Innovation Center, will explore actions Australia can put in place for maximum impact.
- How big is the cyber security challenge?
- How can Cyber resilience be lifted across the Australian community?
- What can we learn from best practices globally?
Digital Identity – Improving the Experience for People and Businesses
- Digital Identity is a key enabler for Digital Transformation.
- The DTA is developing a Digital Identity system that will allow people to prove who they are to access a range of government services.
- Digital Identity is entirely voluntary and provides a simple, safe and secure choice for people to verify who they are and access government services online, minimising the need to visit a shopfront.
Bridging the digital divide - with fibre’
Cloud & 5G
- Regional Australia is more connected than ever – but the digital divide still gets deeper
- Policy solutions to regional telecommunications are piecemeal and duplicative
- What will it take to not only improve connectivity in regional areas, but also incentivise private investment?
Human firewall: The ginormous cyber security challenge
- Along with Covid-19 we are living in another pandemic of cybersecurity threats and no one’s data is safe anymore in the digital age. Understanding how to identify and avoid these threats helps us to secure our digital devices and therefore our digital lives.
- How well is our enterprise or employee equipped against highly skilled criminals, malicious hackers or nations that aim to steal data or valuable digital information or service?
- How technology and The Human Firewall will keep many businesses alive, protect them from threats and ultimately give them a robust competitive advantage?
How biometric identification services are effectively utilised for visa and border processing
- Identity is an important integrity measure that contributes significantly to protecting Australia's border.
- Biometric identification services enable a greater level of assurance that a traveller entering the country is who they say they are.
- Accurately identifying people who interact with Government also streamlines visa and border services.
Enabling 5G to combat COVID-19
Cloud & 5G
The Cyber Pandemic
Imagine the current pandemic, but the Cyber version. Imagine not being able to use computers, smartphones, payment platforms. Imagine a virus or exploit so powerful that we had to shut down - everything.During the past 10 years we've already had devastating cyber vulnerabilities occur that we've been lucky to head off, but what if one comes that we don't?Skeeve Stevens and Shanti Korporaal from the Future Crime Agency provide a vision of what could occur during a Cyber Pandemic and how it would affect society.
Skeeve Stevens, Director, Future Crime Agency
Shanti Korporaal, Future Crime Agency
last published: 21/Oct/20 03:25 GMT