Zero-Trust Culture V: Capstone Strategy Proposal

Following on from Part IV: Report, this part of the capstone project will present a strategy proposal to achieve a human centred cybersecurity culture. NOTE: Following this project, the Commonwealth Government’s recently released Guiding Principles to embed a Zero Trust Culture. This proposal has been updated to demonstrate alignment with this. Task In this assessment […]
Zero-Trust Culture IV: Capstone Report

Following on from Part III: Presentation, this report will establish the importance of humans in our systems and explore how we can integrate zero-trust principles into operational security (opsec). Task Write a report that investigates the concepts raised in the previous presentations which: Report Table of contents Note: with the exception of “socio-technical” in this […]
Zero-Trust Culture III: Capstone Presentation

Following on from Part II: Intro, this report will establish the importance of humans in our systems and explore how we can integrate zero-trust principles into operational security (opsec). Task Create a ten minute minute presentation which builds on the previous presentation and: Presentation In this presentation we explore the human element of cybersecurity. Transcript […]
Zero-Trust Culture II: Capstone Intro

Following the university accepting my project proposal outlined in Part I: Pitch, this part of the capstone project will introduce the concept of zero-trust culture called for in the Australian 2023-2030 Cybersecurity Strategy, and explore how we can work towards it. Task Presentation In this presentation we explore what a zero-trust culture is and how […]
Zero-Trust Culture I: Capstone Pitch

Task The capstone project was the twelfth and final course of my masters. Students with an average grade of over 65% and willing external stakeholders are eligible to submit a proposal for an Externally Directed Project – this means they can design and run a project of their own instead of completing the university aligned […]
SITA cyber-attack part II: report

Task It can be useful to look at cyber-attacks in the news to prepare ourselves for similar events. While the available information may be lacking, by analysing current events we can build scenarios to gain insights into adversary tactics, techniques and procedures as well as defences which we can adopt to mitigate similar attacks. This […]
SITA cyber-attack part I: presentation

Task Research recent cloud security incidents with prominent media coverage, and identify one to study for this exercise. For the incident you select, you will then create a five-minute presentation with a voice-over discussing the following: Describe the nature of the attack. Who is the attack actor or who was responsible for this attack? What […]
Aviation cybersecurity oversight presentation

Task In this assessment you will consider the policy implications of your new Cyber Strategy, highlighting and explaining two policy statements which support the strategy. These implications will be communicated through a presentation (5-minute recorded video presentation), and an executive brief document (1-page written summary). The presentation and brief will be aimed at the executives […]
Aviation cybersecurity oversight strategy

Task As we have previously discovered, cybersecurity in the aviation sector is an emerging field. In light of other countries introducing specific aviation cybersecurity regulation and the failed Transport Security Amendment (Critical Infrastructure) Bill 2022, Australia seems to be lagging in this area. Although the Department of Home Affairs is responsible for cybersecurity, when it […]
Risk assessment consulting report

Around the globe, car rental companies rely on technology for operating in an efficient and responsive manner. Here at RideWell we use a website and app for making and managing bookings which integrate into our back of house systems, which allows us to manage our fleet, manage customers and receive and make payments. These systems […]