Jump to content

What Engineers Should Know About Cyber-attacks and Defence in Organisations


Community Calendar

Event details


What Engineers Should Know About Cyber-attacks and Defence in Organisations

An Engineering Education Australia webinar:

The cyber-threat landscape has shifted in recent years, with increasingly organised and sophisticated threat actors (attackers) recruiting technology experts into purpose-built teams. These teams are then deploying military-grade cyber weaponry against Australian organisations.

Threat actors deny organisations access to their own information technology services, and steal sensitive information including intellectual property, trade secrets, engineering blueprints and customer data.

Although cybersecurity has become the subject of much practice and research, the focus of organisations has traditionally been on identifying and mitigating technology vulnerabilities and less on organisational strategy. 

This webinar presents a case study of a large-scale organisation that successfully defended itself from advanced and persistent cyber-attacks over a period of years. The webinar presents the organisation’s prevention strategy and details how its cybersecurity teams respond to cyber-attacks. 

Understanding the broad context of cyber-attacks and defence is critical for all professionals, however particularly valuable to engineers working in critical infrastructure sectors.

This webinar is the first in a series delivered in partnership with the University of Melbourne aimed to improve knowledge and capability of engineers in securing and protecting organisational data and intellectual property.

This webinar is delivered in partnership with the University of Melbourne.

Learning outcomes

  • Describe and critically reflect on cyber-attacks and defence in the context of contemporary organisations
  • Critically analyse the role and utility of cybersecurity incident response in protecting information assets in organisations
  • Critically analyse organisational response to cyber-attacks from the integrated perspective of people, process and technology
  • Identify key people, process and technology barriers to effective incident response to cyber attacks

More Details


Recommended Comments

There are no comments to display.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Add a comment...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Create New...