The cyber-threat landscape has shifted in recent years, with increasingly organised and sophisticated threat actors (attackers) recruiting technology experts into purpose-built teams. These teams are then deploying military-grade cyber weaponry against Australian organisations.
Threat actors deny organisations access to their own information technology services, and steal sensitive information including intellectual property, trade secrets, engineering blueprints and customer data.
Although cybersecurity has become the subject of much practice and research, the focus of organisations has traditionally been on identifying and mitigating technology vulnerabilities and less on organisational strategy.
This webinar presents a case study of a large-scale organisation that successfully defended itself from advanced and persistent cyber-attacks over a period of years. The webinar presents the organisation’s prevention strategy and details how its cybersecurity teams respond to cyber-attacks.
Understanding the broad context of cyber-attacks and defence is critical for all professionals, however particularly valuable to engineers working in critical infrastructure sectors.
This webinar is the first in a series delivered in partnership with the University of Melbourne aimed to improve knowledge and capability of engineers in securing and protecting organisational data and intellectual property.
This webinar was recorded and is available to watch through Engineers Australia’s new online streaming platform, EA On Demand.
We can deliver this webinar exclusively to you and your organisation.
For groups of 10 or more we provide cost-effective, customised and outcome-focused in-house training.
Find out how we can help you and your team by completing an enquiry form or calling us on +61 3 9321 1700.
- Describe and critically reflect on cyber-attacks and defence in the context of contemporary organisations
- Critically analyse the role and utility of cybersecurity incident response in protecting information assets in organisations
- Critically analyse organisational response to cyber-attacks from the integrated perspective of people, process and technology
- Identify key people, process and technology barriers to effective incident response to cyber attacks
Is this course for you?
This course is relevant to all engineers with a minimum of 3 years' experience, all IT professionals, and leaders working in critical infrastructure sectors such as:
Engineering roles include:
- Product Engineer
- Project Engineer
- Consulting Engineer
- Maintenance Engineer
- Software Engineer
- Systems Engineer
There are no prerequisites for this course.
- Foundational principles of cybersecurity strategy
- Understanding the broad role and function of cybersecurity in organisations
- The shifting threat landscape and the emergence of new threat actors
- The problem with ‘best practice’ industry standards in cybersecurity
- An in-depth case study of an exemplar organisation
- Socio-technical barriers to an agile response to cyber-attack
Dr. Atif Ahmad is an Associate Professor at the University of Melbourne where he serves as Deputy Director for the Academic Centre of Cyber Security Excellence. This webinar is unique in that it is informed by fifteen years of research in cybersecurity management practice including over 40 case studies of Australian organisations. The case study in this webinar is a large technology-driven customer focused enterprise which granted Atif deep access - a rare opportunity that recognises Atif’s standing among cybersecurity professionals.
Delivered via Webinar
Designed in collaboration with our industry facilitators and education experts, EEA Webinars focus on modules from our most popular face-to-face training courses. Content has been carefully crafted to deliver targeted and achievable learning outcomes within the hour and the sessions are interactive to keep you engaged.
Webinar platform - Zoom
These sessions run through Zoom. On the day of the webinar you will receive the unique Zoom link at least one hour before the webinar is scheduled to begin.
We suggest that you download the Zoom Desktop Client to ensure you can fully participate in the webinar. If you view the webinar through the Zoom web browser or via a phone or tablet device you may not be able to participate in the interactive elements such as answering polling questions.
Please read through the following information on Zoom to ensure you are prepared for the webinar: