Cyber-bullying, image-based abuse, illegal and restricted online content are just some of the behaviours the eSafety Commissioner’s office deals with. I had…
Majority of cyber attacks linked to compromised user names and passwords.
News recently broke of an extraordinary breach of national security following the discovery of highly sensitive cabinet documents in two old filing cabinets bought at a second-hand shop in Canberra.
In February 2018, new legislation for mandatory data breach notifications will be introduced as an amendment to the Australian Privacy Act. This amendment will apply to all organisations required to comply with the Australian Privacy Act 1988 and could result in penalties for non-compliance of up to $1.7M for organisations and $300,000 for Directors.
Does your organisation have up to date well documented ICT security policies?
Does your organisation have up to date well documented procedures for ICT security (like patching, which is the vulnerability exploited in the WannaCry hack)?
Although the term “lessons learned” is commonly heard now, many organisations, certainly in Australia, do not actually utilise this valuable opportunity for risk management.
Opinion piece published by CSO online concerning updates to documentation.
ICT leaders can demonstrate the value of ICT by informing other executives within their organisations of the risks and success stories associated with projects and, by promoting learning for the governance function.
Clearly identified project benefits and a benefits review are key to achieving the best return on investment for your organisation.
The Project Manager plays a central role in achieving delivery of a successful project. So, it’s worth considering how to get the best possible outcomes from whomever you’ve appointed to that role.