ISACA Canberra

Prochain(s) (4)

Image principale de Jidoka – Automation with a Human Touch

Jidoka – Automation with a Human Touch

Thu, May 30, 5:30 PM

Libre

Image principale de Cybersecurity Risk; Strategy and Regulatory Consultation

Cybersecurity Risk; Strategy and Regulatory Consultation

Thu, Jun 27, 5:30 PM

Libre

Image principale de From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

Thu, Jul 25, 5:30 PM

Libre

Image principale de ISACA Canberra Conference 2024

ISACA Canberra Conference 2024

Fri, Nov 1, 9:00 AM

Vérifier le prix du billet sur l'événement

Image principale de Jidoka – Automation with a Human Touch

Jidoka – Automation with a Human Touch

Thu, May 30, 5:30 PM

Libre

Image principale de Cybersecurity Risk; Strategy and Regulatory Consultation

Cybersecurity Risk; Strategy and Regulatory Consultation

Thu, Jun 27, 5:30 PM

Libre

Image principale de From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

Thu, Jul 25, 5:30 PM

Libre

Image principale de ISACA Canberra Conference 2024

ISACA Canberra Conference 2024

Fri, Nov 1, 9:00 AM

Vérifier le prix du billet sur l'événement

Dernier(s) (27)

Image principale de Supply Chain security – how to discuss it with your grandmother

Supply Chain security – how to discuss it with your grandmother

Thu, Apr 18, 5:00 PM

Libre

Image principale de General Meeting & Running AI while retaining Security

General Meeting & Running AI while retaining Security

Thu, Mar 21, 5:00 PM

Libre

Image principale de How to hack an AI

How to hack an AI

Thu, Feb 29, 5:00 PM

Libre

Image principale de Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Thu, Nov 30, 5:00 PM

Libre

Image principale de ISACA Canberra Conference 2023

ISACA Canberra Conference 2023

Fri, Nov 3, 9:00 AM

Vérifier le prix du billet sur l'événement

Image principale de When is a Trusted Insider not a Trusted Insider

When is a Trusted Insider not a Trusted Insider

Thu, Oct 26, 5:00 PM

Libre

Image principale de Cybersecurity Careers Pathways

Cybersecurity Careers Pathways

Thu, Sep 28, 5:00 PM

Libre

Image principale de Precision Matching through Skills Analytics

Precision Matching through Skills Analytics

Thu, Aug 31, 5:00 PM

Libre

Image principale de Overcoming the limits of Enterprise GRC Systems

Overcoming the limits of Enterprise GRC Systems

Thu, Jul 27, 5:00 PM

Libre

Image principale de Harnessing asset data to transform your cyber security program

Harnessing asset data to transform your cyber security program

Thu, Jun 29, 5:00 PM

Libre

Image principale de Applying the fundamentals - An approach to auditing machine learning

Applying the fundamentals - An approach to auditing machine learning

Wed, Jun 21, 5:00 PM

Libre

Image principale de Mission Critical / Introspectus Joint Session

Mission Critical / Introspectus Joint Session

Thu, May 25, 5:00 PM

Libre

Image principale de Supply Chain security – how to discuss it with your grandmother

Supply Chain security – how to discuss it with your grandmother

Thu, Apr 18, 5:00 PM

Libre

Image principale de General Meeting & Running AI while retaining Security

General Meeting & Running AI while retaining Security

Thu, Mar 21, 5:00 PM

Libre

Image principale de How to hack an AI

How to hack an AI

Thu, Feb 29, 5:00 PM

Libre

Image principale de Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Thu, Nov 30, 5:00 PM

Libre

Image principale de ISACA Canberra Conference 2023

ISACA Canberra Conference 2023

Fri, Nov 3, 9:00 AM

Vérifier le prix du billet sur l'événement

Image principale de When is a Trusted Insider not a Trusted Insider

When is a Trusted Insider not a Trusted Insider

Thu, Oct 26, 5:00 PM

Libre

Image principale de Cybersecurity Careers Pathways

Cybersecurity Careers Pathways

Thu, Sep 28, 5:00 PM

Libre

Image principale de Precision Matching through Skills Analytics

Precision Matching through Skills Analytics

Thu, Aug 31, 5:00 PM

Libre

Image principale de Overcoming the limits of Enterprise GRC Systems

Overcoming the limits of Enterprise GRC Systems

Thu, Jul 27, 5:00 PM

Libre

Image principale de Harnessing asset data to transform your cyber security program

Harnessing asset data to transform your cyber security program

Thu, Jun 29, 5:00 PM

Libre

Image principale de Applying the fundamentals - An approach to auditing machine learning

Applying the fundamentals - An approach to auditing machine learning

Wed, Jun 21, 5:00 PM

Libre

Image principale de Mission Critical / Introspectus Joint Session

Mission Critical / Introspectus Joint Session

Thu, May 25, 5:00 PM

Libre

Événements

Image principale de Jidoka – Automation with a Human Touch

Jidoka – Automation with a Human Touch

Thu, May 30, 5:30 PM

Libre

Image principale de Cybersecurity Risk; Strategy and Regulatory Consultation

Cybersecurity Risk; Strategy and Regulatory Consultation

Thu, Jun 27, 5:30 PM

Libre

Image principale de From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

Thu, Jul 25, 5:30 PM

Libre

Image principale de ISACA Canberra Conference 2024

ISACA Canberra Conference 2024

Fri, Nov 1, 9:00 AM

Vérifier le prix du billet sur l'événement

Image principale de Jidoka – Automation with a Human Touch

Jidoka – Automation with a Human Touch

Thu, May 30, 5:30 PM

Libre

Image principale de Cybersecurity Risk; Strategy and Regulatory Consultation

Cybersecurity Risk; Strategy and Regulatory Consultation

Thu, Jun 27, 5:30 PM

Libre

Image principale de From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

From Fragile to Fortified: Reimagining Australia’s Sovereign Capabilities

Thu, Jul 25, 5:30 PM

Libre

Image principale de ISACA Canberra Conference 2024

ISACA Canberra Conference 2024

Fri, Nov 1, 9:00 AM

Vérifier le prix du billet sur l'événement

Image principale de Supply Chain security – how to discuss it with your grandmother

Supply Chain security – how to discuss it with your grandmother

Thu, Apr 18, 5:00 PM

Libre

Image principale de General Meeting & Running AI while retaining Security

General Meeting & Running AI while retaining Security

Thu, Mar 21, 5:00 PM

Libre

Image principale de How to hack an AI

How to hack an AI

Thu, Feb 29, 5:00 PM

Libre

Image principale de Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Thu, Nov 30, 5:00 PM

Libre

Image principale de ISACA Canberra Conference 2023

ISACA Canberra Conference 2023

Fri, Nov 3, 9:00 AM

Vérifier le prix du billet sur l'événement

Image principale de When is a Trusted Insider not a Trusted Insider

When is a Trusted Insider not a Trusted Insider

Thu, Oct 26, 5:00 PM

Libre

Image principale de Cybersecurity Careers Pathways

Cybersecurity Careers Pathways

Thu, Sep 28, 5:00 PM

Libre

Image principale de Precision Matching through Skills Analytics

Precision Matching through Skills Analytics

Thu, Aug 31, 5:00 PM

Libre

Image principale de Overcoming the limits of Enterprise GRC Systems

Overcoming the limits of Enterprise GRC Systems

Thu, Jul 27, 5:00 PM

Libre

Image principale de Harnessing asset data to transform your cyber security program

Harnessing asset data to transform your cyber security program

Thu, Jun 29, 5:00 PM

Libre

Image principale de Applying the fundamentals - An approach to auditing machine learning

Applying the fundamentals - An approach to auditing machine learning

Wed, Jun 21, 5:00 PM

Libre

Image principale de Mission Critical / Introspectus Joint Session

Mission Critical / Introspectus Joint Session

Thu, May 25, 5:00 PM

Libre

Image principale de Supply Chain security – how to discuss it with your grandmother

Supply Chain security – how to discuss it with your grandmother

Thu, Apr 18, 5:00 PM

Libre

Image principale de General Meeting & Running AI while retaining Security

General Meeting & Running AI while retaining Security

Thu, Mar 21, 5:00 PM

Libre

Image principale de How to hack an AI

How to hack an AI

Thu, Feb 29, 5:00 PM

Libre

Image principale de Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Boards & Leadership: Cybersecurity Accountability, Responsibility & Risk

Thu, Nov 30, 5:00 PM

Libre

Image principale de ISACA Canberra Conference 2023

ISACA Canberra Conference 2023

Fri, Nov 3, 9:00 AM

Vérifier le prix du billet sur l'événement

Image principale de When is a Trusted Insider not a Trusted Insider

When is a Trusted Insider not a Trusted Insider

Thu, Oct 26, 5:00 PM

Libre

Image principale de Cybersecurity Careers Pathways

Cybersecurity Careers Pathways

Thu, Sep 28, 5:00 PM

Libre

Image principale de Precision Matching through Skills Analytics

Precision Matching through Skills Analytics

Thu, Aug 31, 5:00 PM

Libre

Image principale de Overcoming the limits of Enterprise GRC Systems

Overcoming the limits of Enterprise GRC Systems

Thu, Jul 27, 5:00 PM

Libre

Image principale de Harnessing asset data to transform your cyber security program

Harnessing asset data to transform your cyber security program

Thu, Jun 29, 5:00 PM

Libre

Image principale de Applying the fundamentals - An approach to auditing machine learning

Applying the fundamentals - An approach to auditing machine learning

Wed, Jun 21, 5:00 PM

Libre

Image principale de Mission Critical / Introspectus Joint Session

Mission Critical / Introspectus Joint Session

Thu, May 25, 5:00 PM

Libre