Author

David Bingham

David Bingham is Security Sales Manager for The Missing Link’s Southern Region, where he leads with energy, empathy and a love of complex problem-solving. Known for blending strategic thinking with a passion for people, David creates space for his team—and clients—to thrive. He’s all about building trust, tackling cyber security challenges head-on, and keeping the conversation real (and fun). Whether he’s in a high-rise talking strategy or behind the decks as Melbourne techno DJ Obsessive Behaviour, David brings the same sharp focus, infectious energy and creative spark to everything he does.

Cyber Security How Secure Is Your Supply Chain, Really?

You’ve secured your internal environment. Your defences are strong, and your teams are trained. But what about the vendors and partners who handle... Read more

Cyber Security Horizon 2 of Australia’s cyber security strategy: What to do before 2026

If you lead risk, technology, or security, Horizon 2 is your signal to scale. The Australian Cyber Security Strategy 2023–2030 moves into its second... Read more

Cyber Security The modern IAM stack – Tools that power resilient Identity Security

Part 1 and Part 2 of this series covered how Identity and Access Management (IAM) supports cyber resilience and enables Zero Trust by enforcing least... Read more

Cyber Security Zero Trust starts with identity: How to align IAM with your ZTNA Strategy

In Part 1 of this series, we explored how Identity and Access Management (IAM) is central to cyber resilience, limiting attacker movement, enabling... Read more

Cyber Security CPS 234 explained: What you need to do before the APRA deadline

In June 2025, APRA issued a clear warning to the superannuation industry: too many funds are falling short of their obligations under CPS 234. In a... Read more

Cyber Security Is your IAM strategy holding you back? Why Identity is the key to cyber resilience

Identity is no longer a back-office function or a compliance checkbox. It is your first line of defence. In today’s threat landscape, where attackers... Read more

Cyber Security Assessing your workforce: Why your team might be your biggest risk

It’s widely recognised that human error is one of the most significant risks facing enterprise security today. Security leaders are well aware of the... Read more

Cyber Security The 5-step workforce security assessment: How to strengthen your cyber resilience

The biggest vulnerability in your cybersecurity strategy isn’t hidden in your infrastructure, it’s sitting at a desk (or working from home).... Read more

Cyber Security Behind the screens: What is SOC Service Delivery?

So, you’ve just signed off on a new Managed Service. Now what? Read more

Cyber Security Understanding incident metrics: MTTD and MTTR

Attackers are getting faster, stealthier and harder to stop. In this high-stakes environment, speed isn’t just a technical metric—it’s a survival... Read more

Cyber Security Penetration testing vs. vulnerability scanning for the public sector

Are vulnerability assessments giving your organisation a false sense of security? Ian Otieno, Cyber Security Account Director at The Missing Link... Read more

Cyber Security A practical approach to modern Data Security

This article was originally published on TechDay Read more