
PQC Transition is a leadership challenge
Background One of the defining strategic challenges in contemporary cyber security is the emergence of cryptographically relevant quantum computers (CRQC), known as Q-Day (Chong, 2025).
Luke Hally
Join me as I undertake my Masters of Cyber Security

Background One of the defining strategic challenges in contemporary cyber security is the emergence of cryptographically relevant quantum computers (CRQC), known as Q-Day (Chong, 2025).

Introduction Author’s note: I’ve had some interesting and enlightening discussions recently with an old friend and former colleague, Aaron Sempf, on trust, control, and governance

What Autonomous AI Exposes About Cybersecurity Maturity Introduction OpenClaw (and its various recent names) provides a useful case study for examining a persistent weakness in

Following on from Part IV: Report, this part of the capstone project will present a strategy proposal to achieve a human centred cybersecurity culture. NOTE:

Following on from Part III: Presentation, this report will establish the importance of humans in our systems and explore how we can integrate zero-trust principles

Following on from Part II: Intro, this report will establish the importance of humans in our systems and explore how we can integrate zero-trust principles

Following the university accepting my project proposal outlined in Part I: Pitch, this part of the capstone project will introduce the concept of zero-trust culture

Task The capstone project was the twelfth and final course of my masters. Students with an average grade of over 65% and willing external stakeholders

Task It can be useful to look at cyber-attacks in the news to prepare ourselves for similar events. While the available information may be lacking,

Task In this assessment you will consider the policy implications of your new Cyber Strategy, highlighting and explaining two policy statements which support the strategy.