Essential Eight Cyber Security Workshop: Achieving Level 2 Maturity
OVERVIEW
• Assess your organisation's maturity level and develop tailored monitoring mechanisms
• Map cybersecurity frameworks and craft documentation to support ongoing initiatives
• Develop strategies for integrating risk management with business objectives
• Implement compliance monitoring strategies and reporting mechanisms for control effectiveness
SPEAKERS
Paula Oliver
Paula Oliver is a Senior Consultant at CyberOps with extensive experience in cybersecurity and the South Australian Government. She has held key roles in the Department of Premier and Cabinet and the Department for Industry Innovation and Science, focusing on cyber risk and assurance. As Manager of the South Australian Node of AustCyber, she advanced the state’s cybersecurity initiatives and developed South Australia’s first Cyber Industry Capability Matrix. A Certified Information Security Manager (CISM), Paula advocates for a strong cybersecurity culture and workforce diversity, providing strategic guidance and security advice to government leaders, including collaboration with ASIO.
Cybersecurity Expert
CyberOps
AGENDA
Assess your maturity effectiveness
- Understand business risk and maturity model relevance
- Conduct self-assessments and track documentation
- Emphasise continuous improvement and gap analysis
Map cyber frameworks to your practices
- Explore frameworks' relevance and mapping techniques
- Align with real-time metrics in case studies
- Identify gaps for enhanced cyber resilience
Implement essential controls
- Discuss governance roles and accountability for controls
- Develop a flexible governance framework for risk
- Explore risk mitigation strategies across sectors
-
Paula Oliver Cybersecurity Expert CyberOps
Strengthen your cyber posture and risk management
- Define and assess cyber posture and risk appetite
- Analyse case studies to refine risk strategies
- Align risk management with business objectives
Ensure ongoing compliance and future-proofing
- Learn strategies for dynamic compliance maintenance
- Introduce a compliance monitoring toolkit for reporting
- Develop strategic documents for future threat assessments
Develop change management and hardening techniques
- Create adaptable change management plans and templates
- Learn application hardening techniques and updates
- Implement strategies for enterprise impact and metrics
-
Paula Oliver Cybersecurity Expert CyberOps
PRICING
Rapid Action
DISCOUNT ENDED
SAVE UP TO $500
Super Saver
Ends January 22
SAVE UP TO $200
Early Bird
Ends February 28
SAVE UP TO $100
VENUE
Join us online, from the comfort of your home or office.