Skip to main content

ACS Qld webinar - Australian Government Data Breach Notification Laws 2018 - Effective 23 February 2018 – Be Prepared!

C-Level Executives & SME business owners should prepare NOW to protect their organisation’s Business Continuity and Cyber Security Strategy.

Registration End Date: Tue, 26 Sep, 11:00 AM

This event is only available for members, please click here to

Login

If not a member already, click here to Join Now

  • where

  • Presenting via Zoom from Sunshine Coast
    Sunshine Coast QLD
  • when

  • Event Start: Tue, 26 Sep, 12:00 PM
    Event Finish: Tue, 26 Sep, 01:00 PM
  • event price

  • -

<span style="font-family: arial,sans-serif;"><span style="font-size: 10.0pt;">C-Level Executives should prepare NOW to protect their organisation’s Business Continuity and Cyber Security Strategy.  This is in advance of their legal obligations under Federal Data Breach Notification Laws in Australia for 2018.  “What constitutes a Data Breach/Loss in the legislation” is explored and expanded, to understand far reaching implications under the Privacy Act amendment supporting the new legislation. <br><br>Additionally, this law influences Australia’s SME sector due to the nature of personal private data collected in their ICT applications, databases, payroll, accounts and CRM systems. </span></span><br><br><span style="font-family: arial,sans-serif;"><span style="font-size: 10.0pt;">Substantial penalties apply for individuals (up to $360K) and (up to $1.8M) for organisations failing to act notifying the OAIC</span></span> <span style="font-family: arial,sans-serif;"><span style="font-size: 10.0pt;">within a month of each data breach.  Financial losses to entities failing to notify a Data Breach/Loss is immeasurable.  <br><br>The effects and imperative processes managing Data Breaches and/or Losses are revealed to ensure the organisation limits harm to its reputation and their business continuance.  Implementing <span><span style="color: black;">quantitative risk assessments, developing a “Risk Register” and acquiring Cyber Insurance are just some </span></span>of the important strategies deemed indispensable in minimising exposure, manage Data Breach/Loss Notification and improving recovery times when each event occurs.</span></span><br><br><b><span><span style="color: black;"><span style="font-family: calibri,sans-serif;"><span style="font-size: 10.0pt;">The Current Threats for All Business in Australia</span></span></span></span></b><b><i><span style="font-weight: normal;"><span style="color: black;"><span style="font-family: calibri,sans-serif;"><span style="font-size: 10.0pt;">I</span></span></span></span></i></b><b><i><span style="font-size: 10.0pt;">n January 2017, Forbes Magazine stated for Australia:</span></i></b> <ul><li><i><span><span style="color: black;"><span style="font-family: georgia,serif;"><span style="font-size: 10.0pt;">”Cyber-attack techniques will continue to emerge and evolve in 2017”</span></span></span></span></i></li><li><i><span><span style="color: black;"><span style="font-family: georgia,serif;"><span style="font-size: 10.0pt;">“We foresee further ransomware variants of this kind being developed by threat actors in <b>Asia Pacific</b>, and used for cyber activist and cybercriminal activities in the region.”</span></span></span></span></i></li><li><b><i><span style="font-weight: normal;"><span style="color: black;"><span style="font-family: georgia,serif;"><span style="font-size: 10.0pt;">“Start-ups and e-commerce sites involving financial transactions will be highly targeted”</span></span></span></span></i></b></li><li><b><i><span style="font-weight: normal;"><span style="color: black;"><span style="font-family: georgia,serif;"><span style="font-size: 10.0pt;">”Advanced persistent threats will become advanced phishing threats”</span></span></span></span></i></b></li></ul>  <b><span style="color: black;">The Key Take Homes:</span></b> <ol><li>Learn how to avoid substantial fines when mandatory Data Breach/Loss Notification Laws commence next year.</li><li>Comprehend the legal position and how the law applies to your organisation.</li><li>Recovering strategies and the restoration of business service when a Data Breach/Loss occurs</li><li>Planning to minimise business risk and publically managing a Data Breach/Loss.</li></ol> <b>This webinar is open to ACS members only.</b> If you&#39;d like to participate we welcome you to become a member. <a href="https://www.acs.org.au/empowering.html?pppId=0019000001q4o97AAA&amp;progId=a4j9000000006QSAAY" target="_blank">You can sign up here.</a> Not only will you have access to a wide range of webinars for free you also have access to many more member benefits. Feel free to call us on 3316 5700 if you need to discuss.

Contact Details

Terms & Conditions

Registrations close at 11am the morning of the webinar.

Please note: Full attendance is required to receive CPD points. 

 

Share this event:

CPD HOURS

1

SFIA Category

Business risk management (BURM) - 4

Speaker

John Hughes

John Hughes

The accomplished IT professional developing appropriate technology solutions, enabling efficient and invaluable business resilience. Specialising in Disaster Recovery, Business Continuity and Risk Management.

Show More
,Sunshine Coast,QLD,Australia

This event is only available for members, please click here to

If not a member already, click here to Join Now

Recommended Events