<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" 
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:admin="http://webns.net/mvcb/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
	<channel>
<title>My RSS Feed</title><link>http://www.swoose.com.au/index.html</link><description>Hot News&#x21;</description><dc:language>en</dc:language><language>en</language><dc:creator>user@domain.com</dc:creator><dc:rights>Copyright 2013 Milton Baar</dc:rights><dc:date>2017-10-28T16:32:39+11:00</dc:date><admin:generatorAgent rdf:resource="http://www.realmacsoftware.com/" />
<admin:errorReportsTo rdf:resource="mailto:user@domain.com" /><sy:updatePeriod>hourly</sy:updatePeriod>
<sy:updateFrequency>1</sy:updateFrequency>
<sy:updateBase>2000-01-01T12:00+00:00</sy:updateBase>
<lastBuildDate>Sat, 28 Oct 2017 16:36:51 +1100</lastBuildDate><item><title>Swoose lecturing at La Trobe University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2017-10-28T16:32:39+11:00</dc:date><link>http://www.swoose.com.au/news/files/579534af6ac0840b48fd4915fadd6725-29.html#unique-entry-id-29</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/579534af6ac0840b48fd4915fadd6725-29.html#unique-entry-id-29</guid><content:encoded><![CDATA[Milton Baar, Cybersecurity Director, is teaching at La Trobe University as a Visiting Academic for 2017/2018.  In this capacity, Milton will be creating and lecturing the following courses for the School of Engineering & Mathematical Sciences:<strong><br /></strong><strong><br />CSE5CFN Computer Forensics</strong>.  <span style="font:13px Arial, Verdana, Helvetica, sans-serif; color:#292C28;">This subject introduces the procedures related to digital forensic and investigation in a computer and a networking scenario.  Students will develop an understanding of the key concepts associated with the data hiding, evidence collection and validation and traffic analysis required to perform forensic analysis in a digital environment.  Students will learn about the importance of the legal considerations and documentation of forensic evidence. This subject will incorporate tutorials to teach practical forensic tools.</span>  Course details may be found at <a href="http://www.latrobe.edu.au/students/your-course/subjects/current/cse5cfn-computer-forensics">http://www.latrobe.edu.au/students/your-course/subjects/current/cse5cfn-computer-forensics</a>]]></content:encoded></item><item><title>Swoose chairing and speaking at Public Sector Digital Transformation Officers Summit 2017</title><dc:creator>user@domain.com</dc:creator><category>Conferences</category><dc:date>2017-03-16T16:56:04+11:00</dc:date><link>http://www.swoose.com.au/news/files/e58b895a97b7e970e3ac1cffa30c8fa8-28.html#unique-entry-id-28</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/e58b895a97b7e970e3ac1cffa30c8fa8-28.html#unique-entry-id-28</guid><content:encoded><![CDATA[Swoose was invited to chair the conference and also speak on the topic "Cybersecurity as an enabler"<br /><br />Improved understanding of cyber security has allowed teams to collaborate more securely and more effectively. It is important to think of cyber security as a plus, not a minus. It is an enabler for creating change and a means of better using ICT to improve efficiency and productivity.  In this session, Milton will draw on his experience of public and private sector projects, including NSW Public Transport Ticketing System (Opal Card) to discuss:<br /><ul class="disc"><li>Identifying where the risks are and how to mitigate them;</li><li>Information Security strategy and implementation; and</li><li>Undertaking technical reviews to gain certifications.</li></ul><strong><br />The 2017 Theme is "Innovation in Delivery"</strong><br />A digital transformation strategy will never be complete, it is a journey, not a destination. Business priorities are in a continual state of flux and as fast as systems and policies are developed - new technologies arrive and new projects are created. However, the one constant of this environment is the requirement to continually innovate to improve service delivery. To advance your understanding of the key issues we have invited top Public Sector digital leaders and experts in digital and technology focused roles to share advice and insights on innovation and strategy.<br /><br />More conference information may be found at <a href="http://liquidlearninggroup.com/documents/PSDS0417A/PSDS0417A_C1.pdf" rel="external">http://liquidlearninggroup.com/documents/PSDS0417A/PSDS0417A_C1.pdf</a>]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2017-01-20T22:50:31+11:00</dc:date><link>http://www.swoose.com.au/news/files/fe5376120128c3bc75f723e775c12a13-25.html#unique-entry-id-25</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/fe5376120128c3bc75f723e775c12a13-25.html#unique-entry-id-25</guid><content:encoded><![CDATA[Milton Baar, Cybersecurity Director, is teaching at Macquarie University as an Adjunct Lecturer for 2017.  In this capacity, Milton will be lecturing the following courses for the Department of Computing:<br /><br /><strong>ITEC803 - Advanced Topics in Networking</strong>.  <span style="font:13px Arial, Verdana, Helvetica, sans-serif; color:#292C28;">This unit aims to address various advanced aspects of networking, particularly the current and emerging research topics in network. The focus will be on material drawn from the recent research literature. Topics include but are not limited to label switching, VPN architectures, Inter-domain routing, advanced multicast routing models, traffic engineering, congestion control, quality of service, and multimedia networks. The unit consists of lecture, reading, discussion and assignment components.</span>  Course details may be found at <a href="http://handbook.mq.edu.au/2017/Units/PGUnit/ITEC803" rel="external">http://www.handbook.mq.edu.au/2017/Units/PGUnit/ITEC803</a><br /><br /><strong>ITEC852 - Advanced System and Network Security</strong>.  <span style="font:13px Arial, Verdana, Helvetica, sans-serif; color:#292C28;">As organisations and users increasingly rely upon networked applications for assessing information and making critical business decisions, securing distributed applications is becoming extremely significant. The unit is concerned with the protection of information in computing systems and networks. It will address concepts and techniques for securing distributed applications.</span>  Course details may be found at <a href="http://unitguides.mq.edu.au/unit_offerings/76191/unit_guide">http://unitguides.mq.edu.au/unit_offerings/76191/unit_guide</a><br /><br /><strong>ITEC854 - Information Security Management</strong>.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.  The 13 week course as a practical exercise, introducing students to ISO27001 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2017/Units/PGUnit/ITEC854" rel="external">http://www.handbook.mq.edu.au/2017/Units/PGUnit/ITEC854</a>]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2016-01-20T22:49:30+11:00</dc:date><link>http://www.swoose.com.au/news/files/45d528e61094af8f7f33cb2c7d7fe50f-24.html#unique-entry-id-24</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/45d528e61094af8f7f33cb2c7d7fe50f-24.html#unique-entry-id-24</guid><content:encoded><![CDATA[Milton Baar, Cybersecurity Director, is teaching at Macquarie University as an Adjunct Lecturer for 2016.  In this capacity, Milton will be lecturing the following courses for the Department of Computing:<br /><br /><strong>ITEC803 - Advanced Topics in Networking</strong>.  <span style="font:13px Arial, Verdana, Helvetica, sans-serif; color:#292C28;">This unit aims to address various advanced aspects of networking, particularly the current and emerging research topics in network. The focus will be on material drawn from the recent research literature. Topics include but are not limited to label switching, VPN architectures, Inter-domain routing, advanced multicast routing models, traffic engineering, congestion control, quality of service, and multimedia networks. The unit consists of lecture, reading, discussion and assignment components.</span>  Course details may be found at <a href="http://handbook.mq.edu.au/2016/Units/PGUnit/ITEC803" rel="external">http://www.handbook.mq.edu.au/2016/Units/PGUnit/ITEC803</a><br /><br /><strong>ITEC854 - Information Security Management</strong>.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.  The 13 week course as a practical exercise, introducing students to ISO27001 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2016/Units/PGUnit/ITEC854" rel="external">http://www.handbook.mq.edu.au/2016/Units/PGUnit/ITEC854</a>]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2015-02-01T17:36:11+11:00</dc:date><link>http://www.swoose.com.au/news/files/613cdbd24cadfd917ce0d2ad13050912-23.html#unique-entry-id-23</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/613cdbd24cadfd917ce0d2ad13050912-23.html#unique-entry-id-23</guid><content:encoded><![CDATA[Milton Baar, Cybersecurity Director, is teaching at Macquarie University as an Adjunct Lecturer for 2015.  In this capacity, Milton will be lecturing the following courses for the Department of Computing:<br /><br /><strong>ITEC803 - Advanced Topics in Networking</strong>.  <span style="font:13px Arial, Verdana, Helvetica, sans-serif; color:#292C28;">This unit aims to address various advanced aspects of networking, particularly the current and emerging research topics in network. The focus will be on material drawn from the recent research literature. Topics include but are not limited to label switching, VPN architectures, Inter-domain routing, advanced multicast routing models, traffic engineering, congestion control, quality of service, and multimedia networks. The unit consists of lecture, reading, discussion and assignment components.</span>  Course details may be found at <a href="http://handbook.mq.edu.au/2015/Units/PGUnit/ITEC803" rel="external">http://www.handbook.mq.edu.au/2015/Units/PGUnit/ITEC803</a><br /><br /><strong>ITEC854 - Information Security Management</strong>.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.  The 13 week course as a practical exercise, introducing students to ISO27001 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2015/Units/PGUnit/ITEC854" rel="external">http://www.handbook.mq.edu.au/2015/Units/PGUnit/ITEC854</a>]]></content:encoded></item><item><title>Swoose speaking at the Fifth Cybercrime and Trustworthy Computing Conference</title><dc:creator>user@domain.com</dc:creator><category>Conferences</category><dc:date>2014-11-24T09:00:00+11:00</dc:date><link>http://www.swoose.com.au/news/files/fbee4e1eaf4758c23e0cf4cce465bd63-27.html#unique-entry-id-27</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/fbee4e1eaf4758c23e0cf4cce465bd63-27.html#unique-entry-id-27</guid><content:encoded><![CDATA[Swoose spoke at the Fifth Cybercrime and Trustworthy Computing Conference held at Massey University in Auckland, NZ.  <br /><br />The presentation was titled: Management Approach to Non-Technical Cybersecurity Standards - or &ldquo;How can I pass the buck and avoid the blame at the same time?&rdquo;<br /><br />The content of the presentation was later featured in an extensive interview by Nathan Smith, published in The National Business Review (<a href="https://www.nbr.co.nz/article/calls-mandatory-reporting-cyber-attacks-computers-166015">https://www.nbr.co.nz/article/calls-mandatory-reporting-cyber-attacks-computers-166015</a>).  Other sections of the interview featured in a later article, <a href="https://www.nbr.co.nz/article/cyber-attack-risk-business-very-frightening-2015-ns-p-168077">https://www.nbr.co.nz/article/cyber-attack-risk-business-very-frightening-2015-ns-p-168077</a>.  Both articles are behind a pay-wall.<br />]]></content:encoded></item><item><title>Swoose speaking at AVAA conference</title><dc:creator>user@domain.com</dc:creator><category>Conferences</category><dc:date>2014-10-16T09:00:00+11:00</dc:date><link>http://www.swoose.com.au/news/files/82fdccd5253f1a5d3f58e3b5f2724f8b-26.html#unique-entry-id-26</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/82fdccd5253f1a5d3f58e3b5f2724f8b-26.html#unique-entry-id-26</guid><content:encoded><![CDATA[Swoose spoke at the annual Australian Auctioneers and Valuers Association annual conference in Sydney.  Recent developments in cybercrime and its impact on their business was delivered to an enthralled audience; some of the audience were perhaps less enthralled when they realised the exposures the had and the potential impact on their business.]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2014-01-23T21:29:07+11:00</dc:date><link>http://www.swoose.com.au/news/files/a1599290988378f24275bdf919018c1c-22.html#unique-entry-id-22</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/a1599290988378f24275bdf919018c1c-22.html#unique-entry-id-22</guid><content:encoded><![CDATA[Milton Baar, Cybersecurity Director, is teaching at Macquarie University as an Adjunct Lecturer for 2014.  In this capacity, Milton will be lecturing the following courses for the Department of Computing:<br /><br /><strong>ITEC850 - Network Management</strong>.  This unit covers architecture, analysis, design, standards and migration issues related to the operation, management and control of distributed systems and communication networks for voice, data, image, and networked computing. Initially the focus is on the fundamental building blocks of network management architecture. These basics are built upon by discussing advanced topics including Broadband and Web-based network management, telecommunications management, security management, management platforms and applications/research issues such as delegated agents and management of mobile or ad hoc networks.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2013/Units/PGUnit/ITEC850">http://www.handbook.mq.edu.au/2014/Units/PGUnit/ITEC850</a><br /><br /><strong>ITEC854 - Information Security Management</strong>.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.  The 13 week course as a practical exercise, introducing students to ISO17799, ISO27001 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2013/Units/PGUnit/ITEC854">http://www.handbook.mq.edu.au/2014/Units/PGUnit/ITEC854</a>]]></content:encoded></item><item><title>Swoose speaking at CeBIT GovInnovate conference in Canberra</title><dc:creator>user@domain.com</dc:creator><category>Conferences</category><dc:date>2013-11-14T12:46:59+11:00</dc:date><link>http://www.swoose.com.au/news/files/7f374d25745dd9682e107cbaea353f12-21.html#unique-entry-id-21</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/7f374d25745dd9682e107cbaea353f12-21.html#unique-entry-id-21</guid><content:encoded><![CDATA[Milton Baar, speaking in his role at the Centre for Policing, Intelligence and Counter Terrorism at Macquarie University, is speaking at the Cyber Security stream of this conference, see <a href="http://www.cebit.com.au/govinnovate?mkt_tok=3RkMMJWWfF9wsRokvqrPde%2FhmjTEU5z16ewtXqGxgokz2EFye%2BLIHETpodcMTcJlPbnYDBceEJhqyQJxPr3BLNUN09JsRhLmCA%3D%3D">http://www.cebit.com.au/govinnovate?mkt_tok=3RkMMJWWfF9wsRokvqrPde%2FhmjTEU5z16ewtXqGxgokz2EFye%2BLIHETpodcMTcJlPbnYDBceEJhqyQJxPr3BLNUN09JsRhLmCA%3D%3D</a> <br /><br />In addition to speaking, Milton is also on an Expert Panel which will discuss emerging trends and concerns to the Public Sector.]]></content:encoded></item><item><title>Swoose speaking at 3rd Cyber Security Summit</title><dc:creator>user@domain.com</dc:creator><category>Conferences</category><dc:date>2013-06-13T19:24:37+10:00</dc:date><link>http://www.swoose.com.au/news/files/33cc60f2bcba44c339c5b6d56c70e96e-18.html#unique-entry-id-18</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/33cc60f2bcba44c339c5b6d56c70e96e-18.html#unique-entry-id-18</guid><content:encoded><![CDATA[Milton Baar was a presenter at the 3rd ADM Cyber Security Summit held in Canberra.  Milton was presenting on Cyber Security and Espionage and describing research and mitigation options.<br /><br />Conference details may be found at <a href="http://www.admevents.com.au/defence-conference/cyber-security-conference/agenda#dayTwo">http://www.admevents.com.au/defence-conference/cyber-security-conference/agenda#dayTwo</a> ]]></content:encoded></item><item><title>Swoose speaking at the BICSI conference</title><dc:creator>user@domain.com</dc:creator><category>Conferences</category><dc:date>2013-03-23T19:07:52+11:00</dc:date><link>http://www.swoose.com.au/news/files/4d6226752e0c4615892119a863d67f99-15.html#unique-entry-id-15</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/4d6226752e0c4615892119a863d67f99-15.html#unique-entry-id-15</guid><content:encoded><![CDATA[Milton Baar spoke at the 2013 BICSI Conference in Melbourne, presenting Commercial Innovations in Digital Security, more details at <a href="http://www.bicsi.com.au/index.php?option=com_content&view=article&id=636&Itemid=126">http://www.bicsi.com.au/index.php?option=com_content&view=article&id=636&Itemid=126</a>]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2013-02-24T19:36:40+11:00</dc:date><link>http://www.swoose.com.au/news/files/2bd87bfbd456238c1a2f52a131ecc1ae-19.html#unique-entry-id-19</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/2bd87bfbd456238c1a2f52a131ecc1ae-19.html#unique-entry-id-19</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, is teaching at Macquarie University as an Adjunct Lecturer for 2013.  In this capacity, Milton will be lecturing the following courses for the Department of Computing:<br /><br /><strong>ITEC850 - Network Management</strong>.  This unit covers architecture, analysis, design, standards and migration issues related to the operation, management and control of distributed systems and communication networks for voice, data, image, and networked computing. Initially the focus is on the fundamental building blocks of network management architecture. These basics are built upon by discussing advanced topics including Broadband and Web-based network management, telecommunications management, security management, management platforms and applications/research issues such as delegated agents and management of mobile or ad hoc networks.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2013/Units/PGUnit/ITEC850">http://www.handbook.mq.edu.au/2013/Units/PGUnit/ITEC850</a><br /><br />I<strong>TEC851 - System and Network Technologies:</strong><br /><br />Course details may be found at <a href="http://www.handbook.mq.edu.au/2013/Units/PGUnit/ITEC851">http://www.handbook.mq.edu.au/2013/Units/PGUnit/ITEC851</a><br /><br /><strong>ITEC855 - Security and Forensic Discovery</strong>.  <span style="font:12px HelveticaNeue; ">This unit covers the fundamental technologies and processes that underpin good systems security management within modern organisations. We consider the underlying mechanics of information and communications technology security infrastructures, security requirements, security architectures and models, cryptography, secure protocols, authentication, key management, PKI, access control, auditing and intrusion detection.</span>  Course details may be found at <a href="http://www.comp.mq.edu.au/units/itec855/" rel="external">http://www.handbook.mq.edu.au/2013/Units/PGUnit/ITEC855</a><br /><br /><strong>ITEC854 - Information Security Management</strong>.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.  The 13 week course as a practical exercise, introducing students to ISO17799, ISO27001 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2013/Units/PGUnit/ITEC854">http://www.handbook.mq.edu.au/2013/Units/PGUnit/ITEC854</a><br /><br />Additionally, Milton will be lecturing within the Centre for Policing, Intelligence and Counter Terrorism and will deliver the following course:<br /><br /><strong>PICT848 - Cyber Security</strong>. This unit is an introduction to cyber security threats, technologies and management practices within the public and private sectors. The threats faced in the cyber world in many ways mirror those in the physical world. Despite that they also differ in nature as they are neither inhibited by geography nor political borders. This unit will consider these threats in that context. The unit will also provide a sound understanding of the governing principles behind cyber security, the theory and practice behind technology risks and countermeasures and the role that security management plays in the wider picture of forensics analysis, policing, intelligence and counter terrorism.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2013/Units/PGUnit/PICT848">http://www.handbook.mq.edu.au/2013/Units/PGUnit/PICT848</a><br /><br />This unit was also taught for Open Universities Australia as PICX848]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2012-03-01T19:46:00+11:00</dc:date><link>http://www.swoose.com.au/news/files/787f22af7f2308efb83b4b55c5797b12-20.html#unique-entry-id-20</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/787f22af7f2308efb83b4b55c5797b12-20.html#unique-entry-id-20</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, is teaching at Macquarie University as an Adjunct Lecturer for 2012.  In this capacity, Milton will be lecturing the following courses for the Department of Computing:<strong><br /></strong><strong><br /></strong><strong>ITEC850 - Network Management</strong>.  This unit covers architecture, analysis, design, standards and migration issues related to the operation, management and control of distributed systems and communication networks for voice, data, image, and networked computing. Initially the focus is on the fundamental building blocks of network management architecture. These basics are built upon by discussing advanced topics including Broadband and Web-based network management, telecommunications management, security management, management platforms and applications/research issues such as delegated agents and management of mobile or ad hoc networks.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2013/Units/PGUnit/ITEC850">http://www.handbook.mq.edu.au/2012/Units/PGUnit/ITEC850</a><br /><br /><strong>ITEC851 - Vulnerabilities in Commercial Operating Systems</strong>.  This course teaches post-graduate students the basis for vulnerabilities found in commercial operating systems and explores the various exposures and management options.  Operating Systems covered in detail are OS390, OS400, Solaris 10, HP/UX11i, OpenVMS, various Linux, Microsoft Windows 2000 Advanced Server, Microsoft Windows 2003 Server and Cisco IOS.  The course includes practical, hands-on lab time with most of the operating systems. <br />Course details may be found at<a href="http://www.handbook.mq.edu.au/2012/Units/PGUnit/ITEC851">http://www.handbook.mq.edu.au/2012/Units/PGUnit/ITEC851</a><br /><br /><strong>ITEC854 - Information Security Management</strong>.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.  The 13 week course as a practical exercise, introducing students to ISO17799, ISO27001 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2013/Units/PGUnit/ITEC854">http://www.handbook.mq.edu.au/2012/Units/PGUnit/ITEC854</a><br /><br /><strong>ITEC855 - Security and Forensic Discovery</strong>.  <span style="font:12px HelveticaNeue; ">This unit covers the fundamental technologies and processes that underpin good systems security management within modern organisations. We consider the underlying mechanics of information and communications technology security infrastructures, security requirements, security architectures and models, cryptography, secure protocols, authentication, key management, PKI, access control, auditing and intrusion detection.</span>  Course details may be found at <a href="http://www.comp.mq.edu.au/units/itec855/" rel="external">http://www.handbook.mq.edu.au/2012/Units/PGUnit/ITEC855</a><br /><br />Additionally, Milton will be lecturing within the Centre for Policing, Intelligence and Counter Terrorism and will deliver the following courses:<br /><br /><strong>PICT821 - Assessment of Low Level File and Operating Systems</strong>. This unit will examine file systems in several operating systems and within some popular portable electronic devices.   This unit examines file structure systems, cache files, logs, operating system artefacts, temporal data, technical search strategies and gives an introduction to forensic software tools and their use in data preservation and recovery.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2011/Units/PGUnit/pict821" rel="external">http://www.handbook.mq.edu.au/2011/Units/PGUnit/pict821</a><br /><br /><strong>PICT822 - Hardware: Applying Computer Forensic Practice to IT Hardware</strong>.  This unit identifies hardware, storage media devices, looks at ID markings, non computer storage media, the function of hard drives and their operation and repair, types of storage devices, backup systems, portable devices and proprietary systems.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2011/Units/PGUnit/PICT822">http://www.handbook.mq.edu.au/2011/Units/PGUnit/PICT822</a>]]></content:encoded></item><item><title>Swoose lecturing at University of Canterbury</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2012-02-17T19:02:47+11:00</dc:date><link>http://www.swoose.com.au/news/files/a188a8e669c59ac9d78a6fc66a89a9e0-14.html#unique-entry-id-14</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/a188a8e669c59ac9d78a6fc66a89a9e0-14.html#unique-entry-id-14</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, is teaching at the University of Canterbury, Christchurch NZ as a Visiting Lecturer for 2012.  In this capacity, Milton will be lecturing the COSC25 Computer and Network Forensics A for the Department of Computer Science and Software Engineering. This unit covers the social, legal and technical aspects of cyber crime as well as the forensic techniques required to combat them.<br /><br />Further information may be found at <a href="http://www.canterbury.ac.nz/courseinfo/GetCourseDetails.aspx?course=COSC425&year=2012">http://www.canterbury.ac.nz/courseinfo/GetCourseDetails.aspx?course=COSC425&year=2012</a>]]></content:encoded></item><item><title>Swoose speaking at the Data Centre Experts conferences</title><dc:creator>user@domain.com</dc:creator><category>Conferences</category><dc:date>2012-01-17T19:22:02+11:00</dc:date><link>http://www.swoose.com.au/news/files/13c2aca900a9c7ee7a5435b4bc8fc278-17.html#unique-entry-id-17</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/13c2aca900a9c7ee7a5435b4bc8fc278-17.html#unique-entry-id-17</guid><content:encoded><![CDATA[Milton Baar spoke at a series of Data Centre Experts roadshows (see <a href="http://server-racks-australia.com.au/News/index.asp#MTDCE">http://server-racks-australia.com.au/News/index.asp#MTDCE</a>) in Sydney, Melbourne, Brisbane and Canberra.  He presented on Security and Compliance in the Data Centre World.]]></content:encoded></item><item><title>Swoose lecturing at University of Canterbury</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2011-02-15T12:00:00+11:00</dc:date><link>http://www.swoose.com.au/news/files/475e5ac46573bf3a9f6fa3c77bdb1d7f-13.html#unique-entry-id-13</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/475e5ac46573bf3a9f6fa3c77bdb1d7f-13.html#unique-entry-id-13</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, is teaching at the University of Canterbury, Christchurch NZ as a Visiting Lecturer for 2011.  In this capacity, Milton will be lecturing the COSC430 Information Security and Access Management for the Department of Computer Science and Software Engineering.  This course covers the processes involved in the management of computer/network systems including security policies, risk assessment, management, certification and accreditation, system audit, and security in two-party outsource arrangements.  Further information on this course may be found at <a href="http://www.canterbury.ac.nz/courseinfo/GetCourseDetails.aspx?course=COSC430&occurrence=11S1(C)&year=2011">http://www.canterbury.ac.nz/courseinfo/GetCourseDetails.aspx?course=COSC430&occurrence=11S1(C)&year=2011</a><br /><br />Additionally, Milton is teaching COSC435 Computer and Network Forensics B.  Further information may be found at <a href="http://www.canterbury.ac.nz/courseinfo/GetCourseDetails.aspx?course=COSC435&year=2013">http://www.canterbury.ac.nz/courseinfo/GetCourseDetails.aspx?course=COSC435&year=2013</a>]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2011-01-01T12:00:00+11:00</dc:date><link>http://www.swoose.com.au/news/files/b8bdf3aec2841f0254ac4af229ff0400-12.html#unique-entry-id-12</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/b8bdf3aec2841f0254ac4af229ff0400-12.html#unique-entry-id-12</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, is teaching at Macquarie University as an Honorary Associate for 2011.  In this capacity, Milton will be lecturing the following courses for the Department of Computing:<br /><br /><strong>ITEC853 - Systems Administration</strong>. While distributed applications are continually being updated and new approaches to implementing data-driven technologies are adopted, there are generic skills and approaches for the successful management of an organisation's computer-based systems. This unit not only examines approaches for managing individual business critical systems (database, network, communications and the like) but also ways in which these systems are most effectively integrated. All levels of implementation are considered, from software to hardware, user to administrator, principles to pragmatics.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2011/Units/PGUnit/ITEC853" rel="external">http://www.handbook.mq.edu.au/2011/Units/PGUnit/ITEC853</a><br /><br /><strong>ITEC854 - Information Security Management</strong>.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.  The 13 week course as a practical exercise, introducing students to ISO17799, ISO27001 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2011/Units/PGUnit/ITEC854" rel="self">http://www.handbook.mq.edu.au/2011/Units/PGUnit/ITEC854</a><br /><br />Additionally, Milton will be lecturing within the Centre for Policing, Intelligence and Counter Terrorism and will deliver the following courses:<br /><br /><strong>PICT808 - Cybercrime and Cyberterrorism</strong>.  This unit will present a high-level overview of how cyberterrorist threats might be conceived in different horizontal applications, network and protocol layers. The unit explores how different vertical industries (e.g. the finance industry) face specific treats from their use of specific protocols and platforms. The "human factor" in dealing with cyberterrorist threats will be emphasised. Course details may be found at <a href="http://www.handbook.mq.edu.au/2011/Units/PGUnit/pict808" rel="external">http://www.handbook.mq.edu.au/2011/Units/PGUnit/pict808</a><br /><br /><strong>PICT821 - Assessment of Low Level File and Operating Systems</strong>. This unit will examine file systems in several operating systems and within some popular portable electronic devices.   This unit examines file structure systems, cache files, logs, operating system artefacts, temporal data, technical search strategies and gives an introduction to forensic software tools and their use in data preservation and recovery.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2011/Units/PGUnit/pict821" rel="external">http://www.handbook.mq.edu.au/2011/Units/PGUnit/pict821</a><br /><br /><strong>PICT822 - Hardware: Applying Computer Forensic Practice to IT Hardware</strong>.  This unit identifies hardware, storage media devices, looks at ID markings, non computer storage media, the function of hard drives and their operation and repair, types of storage devices, backup systems, portable devices and proprietary systems.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2011/Units/PGUnit/PICT822">http://www.handbook.mq.edu.au/2011/Units/PGUnit/PICT822</a><br /><br /><strong>PICT825 - IT Security</strong>. T his unit examines IT security including concealment, intrusion analysis, what is in place and how it affects the data under analysis, cryptology, viruses, stenography, malware and IT auditing.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2011/Units/PGUnit/pict825" rel="external">http://www.handbook.mq.edu.au/2011/Units/PGUnit/pict825</a>]]></content:encoded></item><item><title>Swoose produces white paper on cybercrime in Australia</title><dc:creator>user@domain.com</dc:creator><category>Education</category><category>Publications</category><dc:date>2010-10-01T12:00:00+10:00</dc:date><link>http://www.swoose.com.au/news/files/b25c3b49398019c49df28b72c984879a-11.html#unique-entry-id-11</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/b25c3b49398019c49df28b72c984879a-11.html#unique-entry-id-11</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, has written a white paper that will be published in a research document for the Council for Asian Terrorism Research (CATR).<br /><br />The Council for Asian Terrorism Research (CATR) was founded in 2005 to provide specialised research that draws from the diverse expertise and perspectives of resident experts across the South and South-east Asian regions. Through regular communication and collaboration, CATR members have developed new approaches, enhanced existing capabilities and built integrated and cooperative efforts to counter terrorist, insurgent, and other violent transnational threats in the Asia-Pacific region. CATR represents a commitment by its member institutions to engage in an ongoing program to develop a deeper understanding of the causes that give rise to terrorism and politically motivated violence, to forge more effective national and regional responses to share best practices in counter-terrorism / counter-radicalisation.<br /><br />The white paper discusses aspects of cybercrime within Australia and evaluates the current state of identification and mitigation.]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2010-01-01T12:00:00+11:00</dc:date><link>http://www.swoose.com.au/news/files/76a39d08191026ac2f556d65c6835f5f-10.html#unique-entry-id-10</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/76a39d08191026ac2f556d65c6835f5f-10.html#unique-entry-id-10</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, is teaching at Macquarie University as an Honorary Associate for 2010.  In this capacity, Milton will be lecturing the following courses for the Department of Computing:<br /><br /><strong>ITEC850 - Network Management</strong>.  This unit covers architecture, analysis, design, standards and migration issues related to the operation, management and control of distributed systems and communication networks for voice, data, image, and networked computing. Initially the focus is on the fundamental building blocks of network management architecture. These basics are built upon by discussing advanced topics including Broadband and Web-based network management, telecommunications management, security management, management platforms and applications/research issues such as delegated agents and management of mobile or ad hoc networks.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2010/Units/PGUnit/ITEC850" rel="external">http://www.handbook.mq.edu.au/2010/Units/PGUnit/ITEC850</a><br /><br /><strong>ITEC853 - Systems Administration</strong>. While distributed applications are continually being updated and new approaches to implementing data-driven technologies are adopted, there are generic skills and approaches for the successful management of an organisation's computer-based systems. This unit not only examines approaches for managing individual business critical systems (database, network, communications and the like) but also ways in which these systems are most effectively integrated. All levels of implementation are considered, from software to hardware, user to administrator, principles to pragmatics.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2010/Units/PGUnit/ITEC853" rel="external">http://www.handbook.mq.edu.au/2010/Units/PGUnit/ITEC853</a><br /><br /><strong>ITEC854 - Information Security Management</strong>.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.  The 13 week course as a practical exercise, introducing students to ISO17799, ISO27001 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2010/Units/PGUnit/ITEC854" rel="self">http://www.handbook.mq.edu.au/2010/Units/PGUnit/ITEC854</a><br /><br />Additionally, Milton will be lecturing within the Centre for Policing, Intelligence and Counter Terrorism and will deliver the following courses:<br /><br /><strong>PICT808 - Cybercrime and Cyberterrorism</strong>.  This unit will present a high-level overview of how cyberterrorist threats might be conceived in different horizontal applications, network and protocol layers. The unit explores how different vertical industries (e.g. the finance industry) face specific treats from their use of specific protocols and platforms. The "human factor" in dealing with cyberterrorist threats will be emphasised. Course details may be found at http://www.handbook.mq.edu.au/2010/Units/PGUnit/pict808<br /><br /><strong>PICT821 - Assessment of Low Level File and Operating Systems</strong>. This unit will examine file systems in several operating systems and within some popular portable electronic devices.   This unit examines file structure systems, cache files, logs, operating system artefacts, temporal data, technical search strategies and gives an introduction to forensic software tools and their use in data preservation and recovery.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2010/Units/PGUnit/pict821" rel="external">http://www.handbook.mq.edu.au/2010/Units/PGUnit/pict821</a><br /><br /><strong>PICT825 - IT Security</strong>. T his unit examines IT security including concealment, intrusion analysis, what is in place and how it affects the data under analysis, cryptology, viruses, stenography, malware and IT auditing.  Course details may be found at <a href="http://www.handbook.mq.edu.au/2010/Units/PGUnit/pict825" rel="external">http://www.handbook.mq.edu.au/2010/Units/PGUnit/pict825</a><br /><br />Milton is also assisting in the creation of other units leading to a new degree in Computer Forensics, including <strong>PICT819</strong> and <strong>PICT820</strong>. For more information, check the press releases from time to time.]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2009-01-01T12:00:00+11:00</dc:date><link>http://www.swoose.com.au/news/files/3380a33f72e6621790a20c5aa284ddcd-9.html#unique-entry-id-9</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/3380a33f72e6621790a20c5aa284ddcd-9.html#unique-entry-id-9</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, is teaching at Macquarie University as an Honorary Associate for 2009.  In this capacity, Milton will be lecturing the following courses for the Department of Computing:<br /><br /><strong>ITEC851 - Vulnerabilities in Commercial Operating Systems</strong>.  This course teaches post-graduate students the basis for vulnerabilities found in commercial operating systems and explores the various exposures and management options.  Operating Systems covered in detail are OS390, OS400, Solaris 10, HP/UX11i, OpenVMS, various Linux, Microsoft Windows 2000 Advanced Server, Microsoft Windows 2003 Server and Cisco IOS.  The course includes practical, hands-on lab time with most of the operating systems. Course details may be found at http://archive.handbook.mq.edu.au/2009/Postgraduate/Units/Unit.php?UnitCode=ITEC851<br /><br /><strong>ITEC853 - Systems Administration</strong>.  While distributed applications are continually being updated and new approaches to implementing data-driven technologies are adopted, there are generic skills and approaches for the successful management of an organisation's computer-based systems. This unit not only examines approaches for managing individual business critical systems (database, network, communications and the like) but also ways in which these systems are most effectively integrated. All levels of implementation are considered, from software to hardware, user to administrator, principles to pragmatics.  Course details may be found at <a href="http://archive.handbook.mq.edu.au/2009/Postgraduate/Units/Unit.php?UnitCode=ITEC853" rel="external">http://archive.handbook.mq.edu.au/2009/Postgraduate/Units/Unit.php?UnitCode=ITEC853</a><br /><br /><strong>ITEC854 - Information Security Management</strong>.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.  The 13 week course as a practical exercise, introducing students to ISO17799, ISO27001 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://archive.handbook.mq.edu.au/2009/Postgraduate/Units/Unit.php?UnitCode=ITEC854" rel="self">http://archive.handbook.mq.edu.au/2009/Postgraduate/Units/Unit.php?UnitCode=ITEC854</a><br /><br /><strong>ITEC856 - Operating Systems Programming</strong>.  This unit covers the tools and techniques required to program the internals of an operating system.  Topics covered in detail include operating systems' internal operations and structures, accessing and manipulating system structures and device drivers.  Students complete a practical component, this year it is the creation of a device driver to control one of a selection of three student-built devices.  Course details may be found at <a href="http://archive.handbook.mq.edu.au/2009/Postgraduate/Units/Unit.php?UnitCode=ITEC856" rel="external">http://archive.handbook.mq.edu.au/2009/Postgraduate/Units/Unit.php?UnitCode=ITEC856</a><br /><br />Additionally, Milton will be lecturing within the School of Policing, Intelligence and Counter Terrorism and will deliver the following course:<br /><br /><strong>PICT808 - Cybercrime and Cyberterrorism</strong>.  This unit will present a high-level overview of how cyberterrorist threats might be conceived in different horizontal applications, network and protocol layers. The unit explores how different vertical industries (e.g. the finance industry) face specific treats from their use of specific protocols and platforms. The "human factor" in dealing with cyberterrorist threats will be emphasised. Course details may be found at <a href="http://archive.handbook.mq.edu.au/2009/Postgraduate/Units/Unit.php?UnitCode=pict808" rel="external">http://archive.handbook.mq.edu.au/2009/Postgraduate/Units/Unit.php?UnitCode=pict808</a><br /><br />Milton is also assisting in the creation of other units leading to a new degree in Computer Forensics, including <strong>PICT819</strong>, <strong>PICT820</strong>, <strong>PICT821</strong> and <strong>PICT825</strong>.  For more information, check the press releases from time to time.]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2008-01-01T12:00:00+11:00</dc:date><link>http://www.swoose.com.au/news/files/d2901b31856e493cfce9f7de14d542ef-8.html#unique-entry-id-8</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/d2901b31856e493cfce9f7de14d542ef-8.html#unique-entry-id-8</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, is teaching at Macquarie University as an Honorary Associate for 2008.  In this capacity, Milton will be lecturing the following courses for the Department of Computing:<br /><br /><strong>ITEC851 - Vulnerabilities in Commercial Operating Systems</strong>.  This course teaches post-graduate students the basis for vulnerabilities found in commercial operating systems and explores the various exposures and management options.  Operating Systems covered in detail are OS390, OS400, Solaris 10, HP/UX11i, OpenVMS, various Linux, Microsoft Windows 2000 Advanced Server, Microsoft Windows 2003 Server and Cisco IOS.  The course includes practical, hands-on lab time with most of the operating systems. Course details may be found at<a href=" http://www.ppdp.mq.edu.au/course_units/short_descriptions/index.html" rel="external"> http://www.ppdp.mq.edu.au/course_units/short_descriptions/index.html</a><br /><br /><strong>ITEC854 - Information Security Management</strong>.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.  The 13 week course as a practical exercise, introducing students to ISO17799, ISO27001 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://www.comp.mq.edu.au/units/itec854/" rel="external">http://www.comp.mq.edu.au/units/itec854/</a><br /><br /><strong>ITEC856 - Operating Systems Programming</strong>.  This unit covers the tools and techniques required to program the internals of an operating system.  Topics covered in detail include operating systems' internal operations and structures, accessing and manipulating system structures and device drivers.  Students complete a practical component, this year it is the creation of a device driver to control one of a selection of three student-built devices.  Course details may be found at <a href="http://www.comp.mq.edu.au/units/itec856" rel="external">http://www.comp.mq.edu.au/units/itec856</a><br /><br />Additionally, Milton will be lecturing within the Centre for Policing, Intelligence and Counter Terrorism and will deliver the following course:<br /><br /><strong>PICT808 - Cybercrime and Cyberterrorism</strong>.  This unit will present a high-level overview of how cyberterrorist threats might be conceived in different horizontal applications, network and protocol layers. The unit explores how different vertical industries (e.g. the finance industry) face specific treats from their use of specific protocols and platforms. The "human factor" in dealing with cyberterrorist threats will be emphasised. Course details may be found at <a href="http://www.pict.mq.edu.au/academic.html#PICT808" rel="external">http://www.pict.mq.edu.au/academic.html#PICT808</a><br /><br />Milton is also assisting in the creation of other units leading to a new degree in Computer Forensics, including <strong>PICT819</strong>, <strong>PICT820</strong>, <strong>PICT821</strong> and <strong>PICT825</strong>.  For more information, check the press releases from time to time.]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2007-01-01T12:00:00+11:00</dc:date><link>http://www.swoose.com.au/news/files/a62badf0d07c2156b62fd491c16aae0c-7.html#unique-entry-id-7</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/a62badf0d07c2156b62fd491c16aae0c-7.html#unique-entry-id-7</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, is teaching at Macquarie University as an Honorary Associate for 2007.  In this capacity, Milton will be lecturing the following courses for the Department of Computing:<br /><br /><strong>ITEC851 - Vulnerabilities in Commercial Operating Systems</strong>.  This course teaches post-graduate students the basis for vulnerabilities found in commercial operating systems and explores the various exposures and management options.  Operating Systems covered in detail are OS390, OS400, Solaris 10, HP/UX11i, OpenVMS, various Linux, Microsoft Windows 2000 Advanced Server, Microsoft Windows 2003 Server and Cisco IOS.  The course includes practical, hands-on lab time with most of the operating systems. Course details may be found at <a href="http://www.ppdp.mq.edu.au/course_units/short_descriptions/index.html" rel="external">http://www.ppdp.mq.edu.au/course_units/short_descriptions/index.html</a><br /><br /><strong>ITEC854 - Information Security Management</strong>.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.  The 13 week course as a practical exercise, introducing students to ISO17799, ISO27001 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://www.comp.mq.edu.au/units/itec854/" rel="external">http://www.comp.mq.edu.au/units/itec854/</a><br /><br /><strong>ITEC855 - Information Security Technologies</strong>.  This unit covers the fundamental technologies from which secure systems are constructed. It is intended both for post-graduate students who will progress to further study in security and for those wishing to understand the necessary basics of computer security.  Course details may be found at <a href="http://www.comp.mq.edu.au/units/itec855/" rel="external">http://www.comp.mq.edu.au/units/itec855/</a><br /><br /><strong>ITEC856 - Operating Systems Programming</strong>.  This unit covers the tools and techniques required to program the internals of an operating system.  Topics covered in detail include operating systems' internal operations and structures, accessing and manipulating system structures and device drivers.  Students complete a practical component, this year it is the creation of a device driver to control one of a selection of three student-built devices.  Course details may be found at <a href="http://www.comp.mq.edu.au/units/itec856/" rel="external">http://www.comp.mq.edu.au/units/itec856/</a><br /><br />Additionally, Milton will be lecturing within the Centre for Policing, Intelligence and Counter Terrorism and will deliver the following course:<br /><br /><strong>PICT808 - Cybercrime and Cyberterrorism</strong>.  This unit will present a high-level overview of how cyberterrorist threats might be conceived in different horizontal applications, network and protocol layers. The unit explores how different vertical industries (e.g. the finance industry) face specific treats from their use of specific protocols and platforms. The "human factor" in dealing with cyberterrorist threats will be emphasised. Course details may be found at http://www.pict.mq.edu.au/academic.html#PICT808<br /><br />Milton is also assisting in the creation of other units leading to a new degree in Computer Forensics, including <strong>PICT819</strong>, <strong>PICT820</strong>, <strong>PICT821</strong> and <strong>PICT825</strong>.  For more information, check the press releases from time to time.]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University&#xa;</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2006-01-01T12:00:00+11:00</dc:date><link>http://www.swoose.com.au/news/files/2ca7a33d5bb7559c45ec65abed3fbc1f-6.html#unique-entry-id-6</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/2ca7a33d5bb7559c45ec65abed3fbc1f-6.html#unique-entry-id-6</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, is teaching at Macquarie University as an Honorary Associate for 2006.  In this capacity, Milton will be lecturing the following courses for the Postgraduate Professional Development Program:<br /><br /><strong>ITEC813 - Vulnerabilities in Commercial Operating Systems</strong>.  This course teaches post-graduate students the basis for vulnerabilities found in commercial operating systems and explores the various exposures and management options.  Operating Systems covered in detail are OS390, OS400, Solaris 10, HP/UX11i, OpenVMS, various Linux, Microsoft Windows 2000 Advanced Server, Microsoft Windows 2003 Server and Cisco IOS.  The course includes practical, hands-on lab time with most of the operating systems. Course details may be found at <a href="http://www.ppdp.mq.edu.au/course_units/short_descriptions/index.htm" rel="external">http://www.ppdp.mq.edu.au/course_units/short_descriptions/index.htm</a><br /><br /><strong>ITEC854 - Information Security Management</strong>.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.  The 13 week course as a practical exercise, introducing students to ISO17799, ISO27001 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://www.comp.mq.edu.au/units/itec854/" rel="external">http://www.comp.mq.edu.au/units/itec854/</a><br /><br />I<strong>TEC855 - Information Security Technologies</strong>.  This unit covers the fundamental technologies from which secure systems are constructed. It is intended both for post-graduate students who will progress to further study in security and for those wishing to understand the necessary basics of computer security.  Course details may be found at <a href="http://www.comp.mq.edu.au/units/itec855/" rel="external">http://www.comp.mq.edu.au/units/itec855/</a><br /><br />Additionally, Milton will be lecturing within the School of Policing, Intelligence and Counter Terrorism and will deliver the following course:<br /><br /><strong>PICT808 - Cybercrime & Cyberterrorism</strong>.  This unit will present a high-level overview of how cyberterrorist threats might be conceived in different horizontal applications, network and protocol layers. The unit explores how different vertical industries (e.g. the finance industry) face specific treats from their use of specific protocols and platforms. The "human factor" in dealing with cyberterrorist threats will be emphasised. Course details may be found at <a href="http://www.pict.mq.edu.au/academic.html#PICT808" rel="external">http://www.pict.mq.edu.au/academic.html#PICT808</a>]]></content:encoded></item><item><title>Swoose lecturing at Macquarie University</title><dc:creator>user@domain.com</dc:creator><category>Education</category><dc:date>2005-07-01T12:00:00+10:00</dc:date><link>http://www.swoose.com.au/news/files/7ab3f0385cdf1bb7e4d24d03c9dfefa8-5.html#unique-entry-id-5</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/7ab3f0385cdf1bb7e4d24d03c9dfefa8-5.html#unique-entry-id-5</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, is teaching at Macquarie University as the Adjunct Lecturer for ITEC854.  This course teaches post-graduate students the practical aspects of Information Security Management and is a core subject in the post-graduate course.<br /><br />Milton has structured the 13 week course as a practical exercise, introducing students to ISO17799, AS/NZS7799 and other frameworks including COBIT, PCIDSS, Sarbanes Oxley and ISM3.  Course details may be found at <a href="http://www.comp.mq.edu.au/units/itec854/" rel="external">http://www.comp.mq.edu.au/units/itec854/</a>]]></content:encoded></item><item><title>Swoose writes for Connected Home magazine</title><dc:creator>user@domain.com</dc:creator><category>Publications</category><dc:date>2004-08-01T12:00:00+10:00</dc:date><link>http://www.swoose.com.au/news/files/a9176a07af4f77b24b52497f807a6e8d-4.html#unique-entry-id-4</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/a9176a07af4f77b24b52497f807a6e8d-4.html#unique-entry-id-4</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, authored an article for Connected Home Magazine.  The article is a beginners guide to wireless technology and how and why it can be used (or not!!)  Recommended reading for all beginners and to those who need to be made aware of the pitfalls of wireless technology.  Also, an interesting diversion into the sometimes strange crossover between technology and entertainment.......]]></content:encoded></item><item><title>Swoose provides technical advice for ABC-TV Show &#x22;Loot&#x22;</title><dc:creator>user@domain.com</dc:creator><category>TV</category><dc:date>2003-06-30T12:00:00+10:00</dc:date><link>http://www.swoose.com.au/news/files/6e616b842f0a79caf68f55ef9595c15a-3.html#unique-entry-id-3</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/6e616b842f0a79caf68f55ef9595c15a-3.html#unique-entry-id-3</guid><content:encoded><![CDATA[ABC-TV recently showed a tremendous local Australian production, Loot.<br /><br />A man is dead, millions of dollars have been lost and a mafia boss is missing. Someone's laughing all the way to the bank, but one man is on the hunt to find those who believe they are above accountability. Jason Donovan and Anita Hegh star in Loot, a fast-paced mystery that premieres Friday 25 June at 8.30pm on ABC TV.<br /><br />Jon Peregrine (Jason Donovan) is an investigator with a difference - the trail he follows is a paper one, chasing money as it is hidden, laundered and fast-tracked around the world.<br /><br />When his brother-in-law commits suicide after losing thousands of dollars when a share float goes belly up, Peregrine must face his sister's (Tara Morice) grief at losing her husband and vows to hunt down those responsible. Although mum and dad investors have lost millions, none of the corporate heavyweights have got burnt and no one from the top end of town is talking.<br /><br />His ex-wife Cynthia (Anita Hegh) might hold a piece of the puzzle, but she's not giving anything away... at least, not officially... and certainly not until Jon looks at the divorce papers she's been trying to get him to sign for the past few months.<br /><br />Together with his eccentric silent partner Charles (Barry Otto), and genius offsider Bruno (Russell Dykstra), Peregrine works to track down those involved in the deal and bring them to account. Jon smells blood money and he's not about to give up the chase. Perhaps white-collar crime doesn't pay like it used to?<br /><br />Milton Baar, Director Technology Innovation, worked with the writer, John O'Brien over a two-year period.  The technology and security themes throughout the show are a result of their cooperation.]]></content:encoded></item><item><title>Swoose speaks at DECUS 2002 Symposium</title><dc:creator>user@domain.com</dc:creator><category>Public speaking</category><dc:date>2002-09-01T12:00:00+10:00</dc:date><link>http://www.swoose.com.au/news/files/6d62f695db2dfce66281e6c467d71b66-2.html#unique-entry-id-2</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/6d62f695db2dfce66281e6c467d71b66-2.html#unique-entry-id-2</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation, spoke at the DECUS 2002 Symposium in Sydney.  The topic was "Information Security - A Practical Approach".  Milton provided an overview of how organisations can leverage the introduction of AS/NZS7799 to enhance their organisation's information security environment.<br /><br />An audience covering both private and public sector groups gained some practical advice along with several case studies of how to, and how not to approach the contentious issues relating to information security.<br /><br />For more information regarding the conference, go to <a href="http://www.decus.org.au/symposium2002/22072002_00.html" rel="external">www.decus.org.au/symposium2002/22072002_00.html</a>]]></content:encoded></item><item><title>Swoose in on#sun.com&#x2c; December/January 2002 issue</title><dc:creator>user@domain.com</dc:creator><category>Publications</category><dc:date>2002-01-01T12:00:00+11:00</dc:date><link>http://www.swoose.com.au/news/files/671b054ec6bea06bf118f283e58ae02e-1.html#unique-entry-id-1</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/671b054ec6bea06bf118f283e58ae02e-1.html#unique-entry-id-1</guid><content:encoded><![CDATA[The work undertaken by Swoose at the State Rail Authority of NSW was recently published in on#sun.com magazine.  Following is the article as published:<br /><br />The State Rail Authority (SRA) of NSW faced the biggest test of its 150 year history last September, when the world came to Sydney to watch the Olympics.<br /><br />The fact that it passed with flying colours is well known to Sydney passengers who experienced the smooth services during the historic sporting event. What train travellers may be less cognisant of - even though they are enjoying the benefits every time they board a train - is that SRA has been building upon its commitment to improve services to customers since the Olympics, and will continue to do so well into the future.<br /><br />The past 12 months have seen sweeping changes to SRA's information architecture, with the end-goal of improving the services delivered by Sydney's trains.<br /><br />The new design required the consolidation of SRA's monolithic server environment to a three-tier Sun server environment, comprising a Sun Fire 3800 server, seven each of Sun Fire 280R and Netra X1, a Sun Enterprise 5500 and a Sun Enterprise 450.<br /><br />The three-tier model enables SRA to move application servers and databases across multiple tiers, which will improve management of the workload and improve availability of the solution. Ultimately, it facilitates better information liaison between the central servers and the remote machines at each train station.<br /><br />Whereas previously a manual system was used to implement timetabling changes and alert travellers, it is now operating from the central server environment. The Sun servers are communicating timetabling and maintenance information in real time to multiple peripherals.<br /><br />In addition to the server consolidation, the numerous versions of Solaris that were running have been migrated to Solaris 8 Operating Environment. It also required the migration of Novell eDirectory, SRA's principle software, to Solaris 8 Operating Environment, which was achieved through collaboration between Sun Professional Services and Novell.<br /><br />The innovative architecture is setting a precedent for large-scale organisations, particularly the way storage is connected to the Sun systems via distributed locations.<br /><br />Milton Baar, consultant to SRA on the project, visited the United States to research the architecture and investigate future potentialities of the hardware. Caltrans, the Californian Transport Authority, was using Sun equipment and Novell eDirectory, similar what they were doing in the to the SRA. We have taken what they were doing in the States to a new level here - it really is a new way of thinking in terms of information architecture.<br /><br />The new design delivers improved reliability, scalability and availability for all applications, in a mission-critical environment.<br /><br />SRA used Sun Rentals to purchase the new equipment with no impact on its ongoing costs or existing budget. The tailored financial solution has enabled SRA to confidently scale their IT requirements while reducing total cost of ownership, and, at the same time, safeguarding their technology investment.]]></content:encoded></item><item><title>Public Sector IT Security keynote address&#xa;</title><dc:creator>user@domain.com</dc:creator><category>Public speaking</category><dc:date>1988-05-01T12:00:00+10:00</dc:date><link>http://www.swoose.com.au/news/files/3bfc086e44db78091642551a49ad1e6e-0.html#unique-entry-id-0</link><guid isPermaLink="true">http://www.swoose.com.au/news/files/3bfc086e44db78091642551a49ad1e6e-0.html#unique-entry-id-0</guid><content:encoded><![CDATA[Milton Baar, Director Technology Innovation with The Swoose Partnership, will speak at the Public Sector IT Conference to be held from 25-27 May at the Sydney Hilton. <br /><br />Milton will give a keynote address on Tuesday 26 May at 9:00am, covering IT Security and Risk Management Procedures in a Public Sector Environment.  Highlights of the address will include:<br />Developing an effective IT security strategy<br />Audit strategies for the public sector<br />Risk management concerns<br />Public sector priorities for audit and risk management<br />"I believe that financial and budgetary constraints are having an adverse effect on the implementation of suitable IT security risk management strategies" noted Milton during a recent interview.  "The recent Budget changes to the tax effectiveness of software purchases will increase an organisation's temptation to adopt more risky approaches to security management and implementation" he said. <br /><br />Also speaking at the conference will be John Frisken, Director Quality and Risk Services and Susan Butler, Director Privacy and Policy, both with the Information Systems Group, an associated company of The Swoose Partnership. <br /><br />For further information relating to the conference, please contact: <br />AIC Conferences<br />Tel: +61 2 9210 5777<br />Fax: +61 2 9221 5700]]></content:encoded></item></channel>
</rss>