View Brochure REGISTER NOW!

Essential Eight Cyber Security Workshop: Achieving Level 2 Maturity


9th - 10th, April 2025 / Online
SAVE UP TO $500
Discount ends in 6 days

OVERVIEW


Strengthen your cyber resilience and operational agility

• Assess your organisation's maturity level and develop tailored monitoring mechanisms
• Map cybersecurity frameworks and craft documentation to support ongoing initiatives
• Develop strategies for integrating risk management with business objectives
• Implement compliance monitoring strategies and reporting mechanisms for control effectiveness

SPEAKERS


Paula Oliver

Paula Oliver is a Senior Consultant at CyberOps with extensive experience in cybersecurity and the South Australian Government. She has held key roles in the Department of Premier and Cabinet and the Department for Industry Innovation and Science, focusing on cyber risk and assurance. As Manager of the South Australian Node of AustCyber, she advanced the state’s cybersecurity initiatives and developed South Australia’s first Cyber Industry Capability Matrix. A Certified Information Security Manager (CISM), Paula advocates for a strong cybersecurity culture and workforce diversity, providing strategic guidance and security advice to government leaders, including collaboration with ASIO.

Cybersecurity Expert
CyberOps

AGENDA


Workshop

Assess your maturity effectiveness

- Understand business risk and maturity model relevance

- Conduct self-assessments and track documentation

- Emphasise continuous improvement and gap analysis


Map cyber frameworks to your practices

- Explore frameworks' relevance and mapping techniques

- Align with real-time metrics in case studies

- Identify gaps for enhanced cyber resilience


Implement essential controls

- Discuss governance roles and accountability for controls

- Develop a flexible governance framework for risk

- Explore risk mitigation strategies across sectors

  • Paula Oliver Cybersecurity Expert CyberOps

Workshop

Strengthen your cyber posture and risk management

- Define and assess cyber posture and risk appetite

- Analyse case studies to refine risk strategies

- Align risk management with business objectives


Ensure ongoing compliance and future-proofing

- Learn strategies for dynamic compliance maintenance

- Introduce a compliance monitoring toolkit for reporting

- Develop strategic documents for future threat assessments


Develop change management and hardening techniques

- Create adaptable change management plans and templates

- Learn application hardening techniques and updates

- Implement strategies for enterprise impact and metrics

  • Paula Oliver Cybersecurity Expert CyberOps

GROUP DISCOUNTS

PRICING


ENDS IN 6 DAYS

Rapid Action

Ends November 29

SAVE UP TO $500

PRICING & BOOKINGS >
PRICING & BOOKINGS >

Value Plus

Ends December 20

SAVE UP TO $300

Super Saver

Ends January 22

SAVE UP TO $200

Early Bird

Ends February 28

SAVE UP TO $100





VENUE


Online

Join us online, from the comfort of your home or office.

SHARE AGENDA


Find Your Next Event

Thank you for joining us!

Great! Keep an eye out on our updates and newsletters.