![A ‘cybersecurity profession’: what are we talking about?](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1729814194752-DO4X5WD5A1AVA976R1C8/ai-generated-8366100_1920.jpg)
A ‘cybersecurity profession’: what are we talking about?
The importance of cybersecurity to national prosperity and security ensures that it must become a profession. The question for cybersecurity practitioners is, ‘What sort of profession should it become?’
![Defence middle managers decide department priorities don’t apply to them](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1722826552641-G7VYUVB6P76V8S93D3QQ/mitchel-lensink-vXptgB3qyys-unsplash.jpg)
Defence middle managers decide department priorities don’t apply to them
Leaders need a new place to begin their analysis of the reform problem.
![In our digital lives, privacy is expected, but trust is earnt](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1698033002420-JCORCBB2HK5ZG50M3MLE/In+our+digital+lives.jpg)
In our digital lives, privacy is expected, but trust is earnt
How I calculate and place trust when I’m in my skin seems to be different from how I trust when I’m digitised.
![There are other factors at play for Australia’s cyber security strategy](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1697962619186-PLA7AQIRCQL5DQC8WWRS/matthew-henry-fPxOowbR6ls-unsplash.jpg)
There are other factors at play for Australia’s cyber security strategy
There are other factors at play for Australia’s cyber security strategy.
![Defence Enterprise culture: The most important capability](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1697958029138-H4E9ZEKYXNYPDE37RQBZ/IMG_1076.png)
Defence Enterprise culture: The most important capability
The total Defence Enterprise workforce is the delicate system at the heart of Defence capability. There’s no value in elevating one part to the exclusion or diminution of the others. If one fails, it all fails.
![Why quiet quitting is a cybersecurity risk](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1697957301693-9P372PT2Q7CD579UU868/benjamin-sow-64TjoOAj61w-unsplash.jpg)
Why quiet quitting is a cybersecurity risk
Positive cybersecurity culture is built on a thousand small interactions, decisions and actions taken daily by individuals continually calibrating their contribution to and relationship with the workplace.
![Transforming Defence and defence industry](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1697934884441-KLN2G1604HSGAFJV74BI/20230824army8629169_0308.jpg)
Transforming Defence and defence industry
There is a need to adopt an enterprise approach to supply chain resilience that reduces the risk of interference in the development and delivery of capability but also ensures sufficient depth in Australian industry’s capabilities and skills.
![We want to build nuclear submarines, but what about everything else we have to build?](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1697933905580-E6B3HTE5Z3LZP7LKPK3T/20230825ran8562933_0216.jpg)
We want to build nuclear submarines, but what about everything else we have to build?
Generating and sustaining a shipbuilding industry in Australia is not a challenge for the Navy, Defence, or Industry alone. It is one part of a national challenge where a skilled workforce is an increasingly rare resource.
![From awareness to behaviour change: The micro-foundations of cybersecurity culture](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1690666838532-9BBYOGWVHQYI1FENJKXH/From+awareness+to+behaviour+change.jpeg)
From awareness to behaviour change: The micro-foundations of cybersecurity culture
People, culture, and behaviour remain the core risk in cyber security assessments and post-incident analyses. How well do we treat the risk of human behaviour in cyber security?
![From compliance to resilience: people, culture and information security](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1690666517958-5M6GK4K7OH0YKN3QJSPJ/Security+compliace.jpeg)
From compliance to resilience: people, culture and information security
The human is both an asset and a liability in information security. Our information security culture often views humans with deep suspicion. How can we move security from compliance to resilience?
![Training is not enough: changing information security culture and behaviour](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1690666633347-JKC5ZH9UBW9M7WNVBB4Y/Training+is+not+enough.jpeg)
Training is not enough: changing information security culture and behaviour
How might we approach reshaping this culture such that people are a source of strength in information security? Security training is necessary but not enough.
![Information security strategy: it’s turtles all the way down](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1690666799349-IBV1Z8HVJN4MSQ36F12H/Turtles+all+the+way+down.jpeg)
Information security strategy: it’s turtles all the way down
Information security strategy, not technology, determines the maturity of an organisation's information security culture and behaviour.