strategies

Cyber Security Asia 2024

Cyber Security Asia 2024 will be taking place on 7 – 8 October 2024 at ParkRoyal Hotel Kuala Lumpur – bringing together top experts and practitioners for in-depth talks, and exclusive networking opportunities. It is a platform for the development of partnerships and strategies and highlights the latest technologies that are ensuring the safety and […]

Cyber Security Asia 2024 Read More »

Cyber Intelligence Asia 2024

We are pleased to bring our annual Cyber Intelligence Asia conference and exhibition back to Kuala Lumpur, Malaysia. Our international event brings together leading cyber security officials from across Asia-Pacific to discuss the latest national cyber security strategies and policies. As well as reviewing the national cyber security strategies and policies, our event will also

Cyber Intelligence Asia 2024 Read More »

HexCon23

HexCon is Hexnode’s annual conference dedicated to uniting leaders and change-makers across the globe and creating a space for the brightest minds and ideas to flourish. Now in its 4th year, HexCon23 brings together the Hexnode community and innovators for three days of insights on the latest practices, strategies and advancements in the cybersecurity and

HexCon23 Read More »

Ransomware Action Plan

Minister’s foreword The Australian Government’s cyber security vision is to create a more secure online world for Australians, their businesses and essential services. However, Australia faces a rapidly evolving strategic environment, punctuated by increasing malicious cyber activity conducted by transnational, serious and organised crime groups and individuals. This Ransomware Action Plan sets out the Government’s

Ransomware Action Plan Read More »

State of Cybersecurity 2020

More than ever, companies are accepting that digital business is the way of the future. Regardless of the industry, offering or customer base, digital tactics are needed to survive in a dynamic and unpredictable environment. With this in mind, cybersecurity moves from a piece of IT operations into an overarching business concern. From formal policies

State of Cybersecurity 2020 Read More »

State of Cybersecurity 2020

State of Cybersecurity 2020 – More than ever, companies are accepting that digital business is the way of the future. Regardless of the industry, offering or customer base, digital tactics are needed to survive in a dynamic and unpredictable environment. With this in mind, cybersecurity moves from a piece of IT operations into an overarching

State of Cybersecurity 2020 Read More »

An industry-driven view of identity and access management

Identity and access management (IAM) solutions enable organizations to seamlessly and securely connect employees to the work required for their role. IAM technologies work throughout the lifecycle of an employee – from onboarding, to delegating levels of access, managing user authentication during the workday, to offboarding when an employee leaves the organization. However, every business

An industry-driven view of identity and access management Read More »

FDI Strategic Analysis Paper – Evolving US Strategic Interests in the Middle East: Saudi Arabia and Iran

The United States has had a close relationship with the Middle East region since the Second World War. Since it was perceived as the main agent of the Allied victory in that war, many Arab countries that had previously had strong affiliations with Great Britain instead associated their primary interests, including their security interests, with

FDI Strategic Analysis Paper – Evolving US Strategic Interests in the Middle East: Saudi Arabia and Iran Read More »

Essential Eight Explained

The Australian Signals Directorate’s (ASD) Strategies to Mitigate Cyber Security Incidents is a prioritised list of practical actions organisations can take to make their computers more secure. The advantage of this guidance is that it is customisable to each organisation based on their risk profile and the threats they are most concerned about.

Essential Eight Explained Read More »