A new Occasional Series by Regional Development Australia will commence in 2022/2023, featuring four Technology Specials to help local businesses navigate and stay up to date with the ever-changing and growing industry.
The webinars will be run in a blog format, encouraging engagement from participants to deliver useful information. You will be asked to provide questions for the guest speakers and what you hope to get out of the session upon registration.
The sessions will be recorded for those that cannot attend live, you will be able to access the recordings here.
For more information, please get in touch with our office on 1300 742 414 or email info@yorkeandmidnorth.com.au
Webinar Three: Construction Tech
Covering Building Information Modelling & Construction and Demolition Waste
When: Thursday, April 27 at 11:30am (rescheduled date)
Guest Speakers from The University of Adelaide:
- Professor Jian Zuo, Program Director for Master of Construction
- Dr Ruidong Chang, Senior Lecturer
Webinar Two: AgriTech
Discussing critical topics, current trends and new ideas
If you’d like to reach out to our guest speakers, you can connect with them on LinkedIn:
- Lyndsey Jackson, Cofounder & Chief Executive Officer with Platfarm
- Michael Macolino, Managing Director with SVG Ventures Thrive
Webinar One: Cyber Security for Business
Guest Speakers included:
- Nick Sincock, Assistant Director of Department of Home Affairs’ Cyber and Infrastructure Security Centre
- Jasmin Ilic, Chief Operating Officer of Control Z (IT Support) – Connect with Jasmin on LinkedIn
Key Resources from the session:
- Presentation from our speakers
- Information to assist seniors use internet securely
- Develop a Cyber Incident Response Plan
- The Essential 8: While no set of mitigation strategies are guaranteed to protect against all cyber threats, organisations are recommended to implement eight essential mitigation strategies from the ACSC’s Strategies to Mitigate Cyber Security Incidents as a baseline. This baseline, known as the Essential Eight, makes it much harder for adversaries to compromise systems,
- Download Resources & Links Sheet