ISACA Canberra

Próximamente (4)

Imagen principal de Jidoka – Automation with a Human Touch

Jidoka – Automation with a Human Touch

Thu, May 30, 5:30 PM

Gratis

Imagen principal de Cybersecurity Risk; Strategy and Regulatory Consultation

Cybersecurity Risk; Strategy and Regulatory Consultation

Thu, Jun 27, 5:30 PM

Gratis

Imagen principal de From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

Thu, Jul 25, 5:30 PM

Gratis

Imagen principal de ISACA Canberra Conference 2024

ISACA Canberra Conference 2024

Fri, Nov 1, 9:00 AM

Comprobar el precio de la entrada en el evento

Imagen principal de Jidoka – Automation with a Human Touch

Jidoka – Automation with a Human Touch

Thu, May 30, 5:30 PM

Gratis

Imagen principal de Cybersecurity Risk; Strategy and Regulatory Consultation

Cybersecurity Risk; Strategy and Regulatory Consultation

Thu, Jun 27, 5:30 PM

Gratis

Imagen principal de From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

Thu, Jul 25, 5:30 PM

Gratis

Imagen principal de ISACA Canberra Conference 2024

ISACA Canberra Conference 2024

Fri, Nov 1, 9:00 AM

Comprobar el precio de la entrada en el evento

Pasados (27)

Imagen principal de Supply Chain security – how to discuss it with your grandmother

Supply Chain security – how to discuss it with your grandmother

Thu, Apr 18, 5:00 PM

Gratis

Imagen principal de General Meeting & Running AI while retaining Security

General Meeting & Running AI while retaining Security

Thu, Mar 21, 5:00 PM

Gratis

Imagen principal de How to hack an AI

How to hack an AI

Thu, Feb 29, 5:00 PM

Gratis

Imagen principal de Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Thu, Nov 30, 5:00 PM

Gratis

Imagen principal de ISACA Canberra Conference 2023

ISACA Canberra Conference 2023

Fri, Nov 3, 9:00 AM

Comprobar el precio de la entrada en el evento

Imagen principal de When is a Trusted Insider not a Trusted Insider

When is a Trusted Insider not a Trusted Insider

Thu, Oct 26, 5:00 PM

Gratis

Imagen principal de Cybersecurity Careers Pathways

Cybersecurity Careers Pathways

Thu, Sep 28, 5:00 PM

Gratis

Imagen principal de Precision Matching through Skills Analytics

Precision Matching through Skills Analytics

Thu, Aug 31, 5:00 PM

Gratis

Imagen principal de Overcoming the limits of Enterprise GRC Systems

Overcoming the limits of Enterprise GRC Systems

Thu, Jul 27, 5:00 PM

Gratis

Imagen principal de Harnessing asset data to transform your cyber security program

Harnessing asset data to transform your cyber security program

Thu, Jun 29, 5:00 PM

Gratis

Imagen principal de Applying the fundamentals - An approach to auditing machine learning

Applying the fundamentals - An approach to auditing machine learning

Wed, Jun 21, 5:00 PM

Gratis

Imagen principal de Mission Critical / Introspectus Joint Session

Mission Critical / Introspectus Joint Session

Thu, May 25, 5:00 PM

Gratis

Imagen principal de Supply Chain security – how to discuss it with your grandmother

Supply Chain security – how to discuss it with your grandmother

Thu, Apr 18, 5:00 PM

Gratis

Imagen principal de General Meeting & Running AI while retaining Security

General Meeting & Running AI while retaining Security

Thu, Mar 21, 5:00 PM

Gratis

Imagen principal de How to hack an AI

How to hack an AI

Thu, Feb 29, 5:00 PM

Gratis

Imagen principal de Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Thu, Nov 30, 5:00 PM

Gratis

Imagen principal de ISACA Canberra Conference 2023

ISACA Canberra Conference 2023

Fri, Nov 3, 9:00 AM

Comprobar el precio de la entrada en el evento

Imagen principal de When is a Trusted Insider not a Trusted Insider

When is a Trusted Insider not a Trusted Insider

Thu, Oct 26, 5:00 PM

Gratis

Imagen principal de Cybersecurity Careers Pathways

Cybersecurity Careers Pathways

Thu, Sep 28, 5:00 PM

Gratis

Imagen principal de Precision Matching through Skills Analytics

Precision Matching through Skills Analytics

Thu, Aug 31, 5:00 PM

Gratis

Imagen principal de Overcoming the limits of Enterprise GRC Systems

Overcoming the limits of Enterprise GRC Systems

Thu, Jul 27, 5:00 PM

Gratis

Imagen principal de Harnessing asset data to transform your cyber security program

Harnessing asset data to transform your cyber security program

Thu, Jun 29, 5:00 PM

Gratis

Imagen principal de Applying the fundamentals - An approach to auditing machine learning

Applying the fundamentals - An approach to auditing machine learning

Wed, Jun 21, 5:00 PM

Gratis

Imagen principal de Mission Critical / Introspectus Joint Session

Mission Critical / Introspectus Joint Session

Thu, May 25, 5:00 PM

Gratis

Eventos

Imagen principal de Jidoka – Automation with a Human Touch

Jidoka – Automation with a Human Touch

Thu, May 30, 5:30 PM

Gratis

Imagen principal de Cybersecurity Risk; Strategy and Regulatory Consultation

Cybersecurity Risk; Strategy and Regulatory Consultation

Thu, Jun 27, 5:30 PM

Gratis

Imagen principal de From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

Thu, Jul 25, 5:30 PM

Gratis

Imagen principal de ISACA Canberra Conference 2024

ISACA Canberra Conference 2024

Fri, Nov 1, 9:00 AM

Comprobar el precio de la entrada en el evento

Imagen principal de Jidoka – Automation with a Human Touch

Jidoka – Automation with a Human Touch

Thu, May 30, 5:30 PM

Gratis

Imagen principal de Cybersecurity Risk; Strategy and Regulatory Consultation

Cybersecurity Risk; Strategy and Regulatory Consultation

Thu, Jun 27, 5:30 PM

Gratis

Imagen principal de From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

Thu, Jul 25, 5:30 PM

Gratis

Imagen principal de ISACA Canberra Conference 2024

ISACA Canberra Conference 2024

Fri, Nov 1, 9:00 AM

Comprobar el precio de la entrada en el evento

Imagen principal de Supply Chain security – how to discuss it with your grandmother

Supply Chain security – how to discuss it with your grandmother

Thu, Apr 18, 5:00 PM

Gratis

Imagen principal de General Meeting & Running AI while retaining Security

General Meeting & Running AI while retaining Security

Thu, Mar 21, 5:00 PM

Gratis

Imagen principal de How to hack an AI

How to hack an AI

Thu, Feb 29, 5:00 PM

Gratis

Imagen principal de Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Thu, Nov 30, 5:00 PM

Gratis

Imagen principal de ISACA Canberra Conference 2023

ISACA Canberra Conference 2023

Fri, Nov 3, 9:00 AM

Comprobar el precio de la entrada en el evento

Imagen principal de When is a Trusted Insider not a Trusted Insider

When is a Trusted Insider not a Trusted Insider

Thu, Oct 26, 5:00 PM

Gratis

Imagen principal de Cybersecurity Careers Pathways

Cybersecurity Careers Pathways

Thu, Sep 28, 5:00 PM

Gratis

Imagen principal de Precision Matching through Skills Analytics

Precision Matching through Skills Analytics

Thu, Aug 31, 5:00 PM

Gratis

Imagen principal de Overcoming the limits of Enterprise GRC Systems

Overcoming the limits of Enterprise GRC Systems

Thu, Jul 27, 5:00 PM

Gratis

Imagen principal de Harnessing asset data to transform your cyber security program

Harnessing asset data to transform your cyber security program

Thu, Jun 29, 5:00 PM

Gratis

Imagen principal de Applying the fundamentals - An approach to auditing machine learning

Applying the fundamentals - An approach to auditing machine learning

Wed, Jun 21, 5:00 PM

Gratis

Imagen principal de Mission Critical / Introspectus Joint Session

Mission Critical / Introspectus Joint Session

Thu, May 25, 5:00 PM

Gratis

Imagen principal de Supply Chain security – how to discuss it with your grandmother

Supply Chain security – how to discuss it with your grandmother

Thu, Apr 18, 5:00 PM

Gratis

Imagen principal de General Meeting & Running AI while retaining Security

General Meeting & Running AI while retaining Security

Thu, Mar 21, 5:00 PM

Gratis

Imagen principal de How to hack an AI

How to hack an AI

Thu, Feb 29, 5:00 PM

Gratis

Imagen principal de Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Thu, Nov 30, 5:00 PM

Gratis

Imagen principal de ISACA Canberra Conference 2023

ISACA Canberra Conference 2023

Fri, Nov 3, 9:00 AM

Comprobar el precio de la entrada en el evento

Imagen principal de When is a Trusted Insider not a Trusted Insider

When is a Trusted Insider not a Trusted Insider

Thu, Oct 26, 5:00 PM

Gratis

Imagen principal de Cybersecurity Careers Pathways

Cybersecurity Careers Pathways

Thu, Sep 28, 5:00 PM

Gratis

Imagen principal de Precision Matching through Skills Analytics

Precision Matching through Skills Analytics

Thu, Aug 31, 5:00 PM

Gratis

Imagen principal de Overcoming the limits of Enterprise GRC Systems

Overcoming the limits of Enterprise GRC Systems

Thu, Jul 27, 5:00 PM

Gratis

Imagen principal de Harnessing asset data to transform your cyber security program

Harnessing asset data to transform your cyber security program

Thu, Jun 29, 5:00 PM

Gratis

Imagen principal de Applying the fundamentals - An approach to auditing machine learning

Applying the fundamentals - An approach to auditing machine learning

Wed, Jun 21, 5:00 PM

Gratis

Imagen principal de Mission Critical / Introspectus Joint Session

Mission Critical / Introspectus Joint Session

Thu, May 25, 5:00 PM

Gratis