Digital Journeys
A new education model based on experience rather than content intake. We focus on the journey, not just the destination.
Group-based learning experiences with a minimum of 5 participants. Professional facilitators guide you through structured programs designed for real-world application.
Sponsored by: Good Things Foundation Australia
Theme: Operationalising Resilience: From Horizon 1 to Horizon 2
Course Overview
This course moves beyond basic hygiene to address the specific threats identified in the State of the Digital Nation 2026 report: the weaponisation of identity, the vulnerability of Operational Technology (OT) in manufacturing, and the "compliance shock" facing SMEs. You will learn to think like a defender in a threat-dense environment.
The Sovereign Capability Landscape
Focus:
Horizon 2 (Scaling Maturity) and the "Six Shields" applied to regional Australia.
- The 2026 Shift: Moving from "Strengthening Foundations" to mandatory operational governance.
- Regional Vulnerability: Why local manufacturing hubs are targeted as supply chain entry points.
- The SME Mandate: Understanding that the "security through obscurity" defence is dead.
- Sovereign Capability: The national push to build a domestic cyber workforce to plug the 370k shortfall.
Activity:
"Supply Chain Audit" - Map your personal or business digital dependencies to identify "soft" entry points.
Identity & The Death of Standing Privileges
Focus:
Just-in-Time (JIT) access and the transition to Post-Quantum Cryptography (PQC).
- Zero Trust Identity: Why "standing privileges" for admins are now a critical vulnerability.
- Phishing-Resistant MFA: Implementing FIDO2 hardware keys (YubiKeys) as the new standard.
- Post-Quantum Readiness: Understanding the "Harvest Now, Decrypt Later" threat.
Activity:
"The Cryptographic Inventory" - Identify where you use public-key encryption and plan a migration.
AI-Driven Threats & Social Engineering
Focus:
Deepfakes, Voice Cloning, and the "Golden Hour" of response.
- Hyper-Realistic Phishing: Countering AI-generated pretexting targeting finance and HR teams.
- Deepfake Voice Scams: Protocols for verifying identity when the CEO's voice is cloned.
- Ransomware 3.0: Dealing with "double extortion" tactics where data is leaked regardless of payment.
- ReportCyber: Navigating the ACSC reporting portal during a live incident.
Activity:
"The Golden Hour Simulation" - A tabletop exercise simulating the first 60 minutes of a ransomware breach.
Network Hygiene & Operational Technology (OT)
Focus:
Protecting the "Factory Floor" and IoT Infrastructure.
- IT vs. OT Security: Why you can't just "patch" a SCADA system in a manufacturing plant.
- Passive Monitoring: Using tools to listen to industrial networks without disrupting production.
- The Essential Eight (2026 Update): Implementing strict application control and patching in legacy environments.
Activity:
"Guest Network Isolation" - Configuring a segmented network architecture to protect critical assets.
The Human Firewall & Crisis Culture
Focus:
Building a "Security Culture" that survives the removal of the small business exemption.
- Compliance as Culture: Moving from tick-box exercises to genuine "security by default."
- Digital Mentorship: How to upskill non-technical staff (Cyber Wardens) without overwhelming them.
- Legal Fallout: Understanding liability under the new Privacy Act reforms (the Statutory Tort).
Capstone Project:
Develop a SME Cyber Resilience Plan for a local business, addressing Privacy Act reforms.
Theme: The Walled Garden: Critical AI Literacy in Action
Course Overview
The "Walled Garden" Infrastructure
Focus:
Privacy-compliant AI and the *National Framework*.
- Tenant Security: How Victorian schools provide access to tools (e.g., Copilot) without training public models.
- Data Sovereignty: Protecting student IP within the "Walled Garden."
- Equity of Access: Mitigating the digital divide between elite and state schools.
Activity:
"Garden Design" - Draft a policy for a school's secure AI tenant, defining data retention and access levels.
Critical AI Literacy & Pedagogy
Focus:
Moving beyond "How to use" to "When to critique."
- Algorithmic Bias: Teaching students to spot the "ghost in the machine."
- Hallucination Management: AI as a fallible node, not an oracle.
- Connectivism 2.0: Integrating AI agents into the Personal Learning Network (PLN).
Activity:
"The Bias Hunt" - Analyze AI-generated lesson materials for cultural or socioeconomic bias.
Assessment in the Age of AI
Focus:
Process over Product - The return of the "Viva."
- Death of the Essay: Why take-home written tasks are obsolete.
- Oral Validation: Implementing "Vivas" to verify student understanding.
- Process Tracking: Assessing the *prompt engineering* and drafting journey.
Activity:
"Viva Voce Design" - Create an assessment rubric that relies 100% on oral defence.
Immersive Learning & Simulation
Focus:
VR, AR, and the "Road to Zero" approach.
- Simulation Pedagogy: Using VR for high-risk scenarios (safety, biology, physics).
- Micro-credentials: The "Stackable Degree" model used by Deakin and RMIT.
- Industry Alignment: Co-designing curriculum with local industry (e.g., Ford, Viva Energy).
Activity:
"Simulation Storyboard" - Design a VR learning module for a dangerous or expensive real-world task.
Leadership & The Human Element
Focus:
Leading the "Peopleware" transition.
- Change Management: Overcoming teacher burnout and resistance.
- Trust & Safety: Managing the psychological impact of digital transformation.
- Learning Analytics: Using data to identify "at-risk" students early.
Capstone Project:
Create a Digital Transformation Strategy for a regional school, integrating "Walled Garden" AI.
Theme: The Age of the Statutory Tort: Ethics as Compliance
Course Overview
The New Compliance Profession
Focus:
The rise of the AI Governance Specialist and the AIGP certification.
- Ethics vs. Compliance: The shift from "should we?" to "we must."
- Glass Box Standard: Why explainability now trumps raw accuracy in government AI.
- Indigenous Data Sovereignty: Operationalising the CARE principles.
Activity:
"Roleplay: The Ethics Officer" - Draft a job description and KPI set for an AI Governance lead.
Algorithmic Impact Assessments (AIA)
Focus:
Mandatory governance for Automated Decision Making (ADM).
- The AIA Workflow: Threshold assessment, deep dive, and public transparency.
- Human-in-the-Loop: Designing contestability mechanisms for AI decisions.
- Transparency Reports: How to write a system card that citizens can understand.
Activity:
"Conduct an AIA" - Perform a mock Algorithmic Impact Assessment for a proposed government chatbot.
The Privacy Act Reform Shock
Focus:
The removal of the Small Business Exemption and the Statutory Tort.
- The Statutory Tort (June 2025): Liability for "serious invasions of privacy."
- No More Exemptions: What the reforms mean for the local real estate agent or café.
- Doxxing Criminalisation: Legal protections against malicious data exposure.
Activity:
"Liability Stress Test" - Review a small business's data practices against the new Statutory Tort.
Bias, Fairness & The "Right to Know"
Focus:
Preventing discrimination and ensuring transparency.
- Proxy Discrimination: How postcodes become proxies for race in algorithms.
- The Right to Know: Mandatory disclosure of AI use in consumer interactions.
- Group Privacy: Harms that occur without individual identification.
Activity:
"Algorithmic Bias Audit" - Test a public dataset for proxy variables that lead to discriminatory outcomes.
Global Governance & Treaties
Focus:
Adapting to the EU AI Act and the Bletchley Declaration.
- Brussels Effect: Why Australian firms must comply with Europe's strict AI tiers.
- Bletchley Accord: Understanding the "Frontier AI" safety protocols.
- Corporate Digital Responsibility (CDR): Setting an ethical baseline above the law.
Capstone Project:
Perform a comprehensive Ethical Risk Audit for a corporate AI implementation, proposing a Governance Framework.
Theme: Interoperability & The Data-Driven Clinic
Course Overview
Interoperability & FHIR Standards
Focus:
The technical and clinical foundation of modern health data.
- The FHIR Shift: Moving from siloed records to real-time data exchange (Fast Healthcare Interoperability Resources).
- My Health Record (2026): Navigating the mandatory 'opt-out' governance model.
- Identity in Health: Secure patient identifier management in a decentralized system.
Activity:
"Data Flow Mapping" - Trace a patient journey through three different health services to identify data blockages.
Clinical AI & Decision Support
Focus:
Using AI as a 'co-pilot' in diagnosis and triage.
- Decision Support Systems (DSS): Integrating AI alerts into the clinical workflow.
- Precision Medicine: Customising treatments using genomic data pipelines.
- Automation Bias: Mitigating the risk of over-reliance on AI triage tools.
Activity:
"AI Workflow Design" - Create a safety protocol for integrating an AI diagnostic tool into a general practice.
Cyber-Resilience in Healthcare
Focus:
Protecting the Most Sensitive Data: Life and Death Security.
- Ransomware in Health: Protocols for when the hospital network goes dark.
- IoT/Medical Device Security: Protecting pacemakers and insulin pumps from network intrusion.
- Insider Threat: Managing access in high-pressure clinical environments.
Activity:
"Incident Response Tabletop" - Simulate a cyber-attack on a regional health network, focusing on patient safety.
Remote Care & The 'Hospital at Home'
Focus:
Telehealth 3.0 and RPM (Remote Patient Monitoring).
- Hospital at Home: Managing acute patients remotely using wearable sensors.
- Regional Equity: Using Starlink and low-latency links for rural telemedicine.
- The Virtual Ward: Clinical governance for patients you never see in person.
Activity:
"Remote Clinic Blueprint" - Design a technical setup for a virtual clinic serving a remote Indigenous community.
The Future of Health Informatics
Focus:
Leadership in a digital-first health system.
- Digital Health Leadership: Upskilling the clinical workforce (Nurse Informaticists).
- Public Health Analytics: Using population data to predict disease outbreaks.
- Patient Sovereignty: Implementing 'Patient-Owned' data models (Solid/Web3).
Capstone Project:
Design a Virtual Ward implementation strategy for a regional hospital, addressing interoperability and cyber-safety.
Ready to Start Your Journey?
Our Digital Journeys are group-based learning experiences with a minimum of 5 participants.
Contact us to discuss your team's learning needs and receive a customised quote.