The Australian Chapter of the Association of Old Crows
This presentation is the property of its rightful owner.
Sponsored Links
1 / 11

CYBER AND INFORMATION SECURITY PowerPoint PPT Presentation


  • 142 Views
  • Uploaded on
  • Presentation posted in: General

The Australian Chapter of the Association of Old Crows The Hilton, Adelaide 16-17 April 2012. Cyber Security Operations Centre. CYBER AND INFORMATION SECURITY. This presentation is UNCLASSIFIED. Introduction – Remember when?. What is the Internet?. What is Cyber?.

Download Presentation

CYBER AND INFORMATION SECURITY

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Cyber and information security

The Australian Chapter of the Association of Old Crows

The Hilton, Adelaide

16-17 April 2012

Cyber Security Operations Centre

CYBER AND INFORMATION SECURITY


This presentation is unclassified

This presentation is UNCLASSIFIED


Introduction remember when

Introduction – Remember when?


What is the internet

What is the Internet?


What is cyber

What is Cyber?

“The Internet and everything connected to it.”


Cyber warfare and australia the cyber security operations centre dsd

Cyber Warfare and Australia The Cyber Security Operations Centre - DSD

The CSOC was established to:

Detect sophisticated threats

Provide an understanding of the national cyber threat environment for Government

Coordinate whole-of-government response.

Part of the Australian Government Cyber Security Strategy to improve cyber threat awareness and response.

DSD’smission is ‘Reveal their secrets, protect our own.’


Working collaboratively

Working collaboratively…


What who is the cyber threat

What/Who is the cyber threat?


Dsd s top 4

DSD’s top 4.

DSD’s top 4 strategies to mitigate targeted cyber intrusions


The future of cyber conclusion

The future of Cyber - Conclusion


Questions

Questions?


  • Login