December 4th, 2016

Cyber Security for SME's

Cyber Security for SMEs - Identifying Threats and Preventing Attacks Discover what common cyber threats and attacks face small and medium enterprises, and what you can do to prevent them. Free online course starting on December 5, 2016. https://www.futurelearn.com/courses/cyber-security-...

October 18th, 2016

Regular Password Changes: No Longer Good Security Practice

October 5th, 2016

Criminalising the re-identification of Government data-sets: Is this a Good idea?

September 30th, 2016

The new EU General Data Protection Regulation: Implications for Australia

This whitepaper highlights some of the new provisions in the GDPR which are most relevant for Australian organisations. You might be covered: Perhaps the most important change for Australian organisations is the extension of the scope of the new GDPR to include businesses with no physical...

September 16th, 2016

TREsPASS Summer School: Diversity in Information Security

Dr Jodie Siganto presented on the benefits of diversity in information security practice a the Royal Holloway University of London TREsPASS Summer School in June 2016.  Thanks to Miriam, a very clever illustrator, sketch notes from that presentation are available.  

August 29th, 2016

10 reasons why an Australian data breach notification law won’t make any difference

Having been on the drawing board since 2008, It is entirely possible that at some stage in the next two years, Australia may get its own version of a data breach notification law.  But, assuming a law similar to the draft legislation issued for consultation in December 2015 is passed, will it...

Pages

Blog

Privacy Act Amendments: What’s the Impact for Information Security?

October 3rd, 2013

Privacy Act Amendments:  What’s the Impact for Information Security?In May 2012, as part of Privacy Awareness Week, the Attorney General announced amendments to the Privacy Act 1988 (Cth), with the Amendment Bill (all 266 pages of it) introduced to Parliament in late May.[1]  It is...

Beware the end of long- term outsourcing arrangements!

October 3rd, 2013

 Beware the end of long- term outsourcing arrangements! Cuscal Ltd v First Data Resources Australia [2011] For those looking at transitioning to the cloud, or entering long-term outsourcing arrangements, the recent decision in  Cuscal Ltd v First Data Resources Australia [2011] NSW...

OAIC – DRAFT Guidance on Information Security Reasonable Steps

October 3rd, 2013

OAIC – DRAFT Guidance on Information Security Reasonable StepsIn December 2012, the Office of the Australian Information Commissioner (OAIC) released a draft ‘Guide to Information Security Reasonable Steps to Protect Personal Information”[1] for public consultation, with...

Pages

News

Meta Data Retention Proposals - Background & Overview of Issues

October 10th, 2014

9.00 am – 10.30 am Friday 24 October, 2014 Proposals for a new law requiring the mandatory retention of metadata raise a number of issues including:  •    Is mandatory retention of metadata a good idea?  •    If it is – how should...

Australia’s privacy laws are changing - Are you prepared?

February 9th, 2014

Details  Live Panel Discussion on the New Era of PrivacyWed, 12 February, 12:00 GMT+11 Hangouts Australia’s privacy laws are changing - Are you prepared? Moderated by renowned business technology journalist, Stilgherrian, our expert panel will take a closer look at the Australian...

Pages

Resources

There are currently no new articles. Check back here soon!

White Paper

There are currently no new articles. Check back here soon!
Subscribe to ITSTA News