Main
Log in

Search
 
Results
Total: 254 results found.
Order by
  
Display
Conclusion: Security leaders should approach security frameworks as a challenge to how the organisation secures its information assets. So, security leaders should be able to defend adherence, or variation, from any point on a chosen framework. Variance may be critical for business function, but the security leader needs to know this and be able to ...
Section: Content | Category: Security Leadership | Date: Wednesday, 01 October 2014 | Hits: 496
Conclusion: Despite increasing focus on information and data in an as-a-Service age, thought leadership in the data management discipline has waned. Today, few of the frameworks, methods and bodies of knowledge that emerged either from the data modelling fraternity or the records management community in the last decade remain active. This leaves organisations ...
Section: Content | Category: Governance & Planning | Date: Wednesday, 02 August 2017 | Hits: 365
Conclusion: As cyber security gains awareness among business leaders, many organisations are undertaking new cyber risk management initiatives. However, these initiatives can be misdirected if business leaders are not clear on why they are doing them. On the journey to improving an organisation’s cyber security maturity, the question “why?” is a powerful ...
Section: Content | Category: Sourcing & Staffing | Date: Friday, 01 April 2016 | Hits: 435
Conclusion: To be effective a cyber security program that controls access to hardware, software and data needs to be comprehensive and include all stakeholders. The challenge for IT and line management is to shape the message to the audience in terms they understand so they take their responsibilities seriously. Observations: Today’s print and online ...
Section: Content | Category: Security Leadership | Date: Tuesday, 04 October 2016 | Hits: 1628
Conclusion: Bugcrowd, Hivint, Kasada, and Secure Code Warrior each has a proven capability to address an important aspect of the cyber defences of Australian organisations. The Australian Cyber Security Strategy, launched in April 2016, advocates the promotion of local capabilities where Australia can build globally competitive solutions. These four ...
Section: Content | Category: Security Leadership | Date: Sunday, 01 January 2017 | Hits: 675
Conclusion: Staff remember how leaders behave and react during a crisis, rather than when the business is operating successfully. Astute leaders do not just deal with restoration and getting the business back on deck; they also support their staff during and after the crisis and can even create the potential for the organisation to be in a better state ...
Section: Content | Category: Governance & Planning | Date: Sunday, 01 January 2017 | Hits: 993
Conclusion: CTOs need to balance natural technical strengths with traditional leadership skills such as strategic thinking and empathy with others to be initially recruited and then remain as successful CTOs. Observations: Successful CTOs are dedicated and naturally enjoy being in the weeds of technology. But they are required to raise their heads ...
Section: Content | Category: Sourcing & Staffing | Date: Monday, 03 July 2017 | Hits: 441
Conclusion: On 3rd April 2018, Microsoft announced the availability of its Azure Cloud running within Canberra Data Centres (CDC) facilities, and officially rated for protected workloads. Superficially, this appears to boost Microsoft’s ability to “check off” security concerns for government and other clients that have specific compliance demands. While ...
Section: Content | Category: Operations & Service Delivery | Date: Saturday, 14 April 2018 | Hits: 204
Commonwealth Bank of Australia has admitted it is culling the number of technology partners it works with as part of a cost cutting drive that has some industry observers concerned it is stepping back from its previous leadership position on cyber security. CBA has been the subject of ongoing rumours in IT circles that it is taking the knife to its ...
Section: Content | Category: In The News | Date: Wednesday, 27 September 2017 | Hits: 436
Conclusion: The ability to inspire as a leader is becoming more recognised as a core management and leadership skill. What does not change overnight are the most innermost core values of how an inspirational leader behaves. Through their leadership they inspire others to perform and succeed, making a positive difference not just internally within the ...
Section: Content | Category: Sourcing & Staffing | Date: Thursday, 02 November 2017 | Hits: 321

In the News

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...
Read More...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles