Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
Cyber Security for Government 2013 Conference Brochure

Cyber Security for Government 2013 Conference Brochure

Ratings: (0)|Views: 68|Likes:
Published by Goku Missile Crisis
With a successful series of Cyber Security for Government events, Government IQ is proud to announce its return to Sydney in August 2013. With cyber security being highlighted as one of the key national security strategy priorities for the next five years, the public sector is recognising the increasing prominence of cyber threats and the risks that they pose to data confidentiality, integrity, and availability.

We’ve listened to your feedback from our previous events, and we’re evolving our conference agenda to deliver on what you’ve asked us for. So for 2013 we’ll be focusing on:

• Securing BYOD and mobile
• Mitigating internal IS threats
• Defining the cyber security role for the Non-IT person
• Implementation challenges of application whitelisting
• Reducing information security risks of social media adoption
• Moving towards an integrated, whole of government approach to data security
• Guarding against mobile malware threats
• Partnering IT and business leadership to build cyber capabilities
• Improving cyber security through system design and governance
With a successful series of Cyber Security for Government events, Government IQ is proud to announce its return to Sydney in August 2013. With cyber security being highlighted as one of the key national security strategy priorities for the next five years, the public sector is recognising the increasing prominence of cyber threats and the risks that they pose to data confidentiality, integrity, and availability.

We’ve listened to your feedback from our previous events, and we’re evolving our conference agenda to deliver on what you’ve asked us for. So for 2013 we’ll be focusing on:

• Securing BYOD and mobile
• Mitigating internal IS threats
• Defining the cyber security role for the Non-IT person
• Implementation challenges of application whitelisting
• Reducing information security risks of social media adoption
• Moving towards an integrated, whole of government approach to data security
• Guarding against mobile malware threats
• Partnering IT and business leadership to build cyber capabilities
• Improving cyber security through system design and governance

More info:

Published by: Goku Missile Crisis on Oct 15, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/15/2013

pdf

text

original

You're Reading a Free Preview
Pages 2 to 6 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->