Main
Log in

Compliance

  • Conclusion: The updated NIST cybersecurity framework (CSF) is a pragmatic tool to enable an organisation to gain clarity on its current level of capability for cyber risk management. Remembering that visibility, as a principle, is both an objective of the framework, but also a guide when working through the framework

    ...
  • Conclusion: The forthcoming General Data Protection Regulation (GDPR) legislation is being introduced by the European Union (EU), which has ramifications to organisations worldwide.

    Key aspects of GDPR relate specifically to what data exactly an organisation should be able to legally keep and for how long. The underlying principle is that less is best in terms of data

    ...
    Related Articles:

    "Understanding GDPR requirements Part 4: Data portability" IBRS, 2018-06-01 04:21:44

    "Understanding GDPR requirements: Part 2" IBRS, 2018-03-31 07:03:46

    "Understanding General Data Protection Regulation requirements Part 1" IBRS, 2018-03-06 06:57:37

  • Conclusion: There are three levers being applied to the cyber security maturity of specific parts of the Australian economy. These three levers are the Notifiable Data Breaches Scheme, the Security of Critical Infrastructure Bill, and Prudential Standard CPS 234 “Information Security”. These levers each address an area of importance for the national economic wellbeing, and

    ...
  • Conclusion: On 3rd April 2018, Microsoft announced the availability of its Azure Cloud running within Canberra Data Centres (CDC) facilities, and officially rated for protected workloads.

    Superficially, this appears to boost Microsoft’s ability to “check off” security concerns for government and other clients that have specific compliance demands.

    While

    ...
  • Conclusion: The General Data Protection Regulation (GDPR) legislation being introduced by the European Union (EU) in May has ramifications to organisations worldwide.

    Australian organisations that have already invested in ensuring that they comply with the Australian Privacy Act 1988, and have a robust privacy management framework in place, may find that they already

    ...
    Related Articles:

    "Understanding GDPR requirements Part 4: Data portability" IBRS, 2018-06-01 04:21:44

    "Understanding GDPR requirements – Part 3" IBRS, 2018-05-04 18:57:12

    "Understanding General Data Protection Regulation requirements Part 1" IBRS, 2018-03-06 06:57:37

  • Conclusion: The forthcoming General Data Protection Regulation (GDPR) is new legislation being introduced by the European Union, which does have ramifications for organisations worldwide.

    Being new, there is still a lot to be learned about what exactly some of the specific requirements will mean in practice and how they will impact organisations in being able to show

    ...
    Related Articles:

    "Understanding GDPR requirements Part 4: Data portability" IBRS, 2018-06-01 04:21:44

    "Understanding GDPR requirements – Part 3" IBRS, 2018-05-04 18:57:12

    "Understanding GDPR requirements: Part 2" IBRS, 2018-03-31 07:03:46

  • Conclusion:Achieving the ability to comply with the new European General Data Protection Regulation is seen as a costly and burdensome overhead adding a new layer of complexity to how organisations will need to manage and secure Personally Identifiable Information (PII) records kept by them.

    However, organisations should view the potential benefits of being able to

    ...
  • Conclusion:The current wave of digital transformation will see the retirement of large numbers of legacy systems. Although the cost of operations, including storage of data, in newer Cloud-based solutions is often cheaper, the cost of migration of historical data to new platforms can be significant. IBRS has observed increasing numbers of digital transformation projects

    ...
  • Is a return to the high period of IT investment likely? The same conditions of the long IT investment boom are not present today. This infographic reveals the trends over the next 3 years.

  • Organisations can select a model for a particular need however, it is fundamental that the assumptions and the factors that construct the model are realistic and clearly understood. Furthermore, the models should be comprehended by other departments within an organisation, such as finance. A model that is only applied within, and solely has merit for IT, is generally not an altogether useful

    ...
  • Conclusion: This note seeks to analyse two questions: Is a return to the high period of IT investment likely? And what were the conditions surrounding the last one?

    The answer to the first question is, currently at least, of a very low probability. The conditions or background that produced the long IT investment boom are not seen today and are not

    ...
  • Conclusion: Return on investment is the touchstone of business investment success. Within marketing and in practice its use and definition is imprecise. The lack of precision is a challenge for marketing to the degree that it is difficult to assess its value in various dimensions.

    Marketing and IT business case managers need to establish the baseline

    ...
  • Conclusion: The proliferation of mobile devices and increasingly mobile staff in the enterprise is driving demand for file sharing and synchronisation services. In the absence of a usable offering from the organisation, users are turning to the ad-hoc use of consumer grade services. This is often referred to as ‘The Dropbox

    ...

In the News

The pros and cons of shadow IT In today’s business world - WHICH-50 - 23 July 2019

Shadow IT sounds like a covert — quite possibly dark — force. And to some people it may well be. But the truth is both far simpler and more complex. According to Cisco, Shadow IT is the use of...
Read More...

Busting The Three Big Cloud Myths - WHICH-50 - 11 June 2019

Organisations that are resisting the shift to cloud computing are often basing their decisions on common misconceptions around security, price and integration. That’s a key finding in a recent...
Read More...

ANZ business users calling the shots in ICT decisions

Conducted by Australia’s Intelligent Business Research Services (IBRS) and commissioned by TechnologyOne, the survey of 261 business leaders in ANZ has shown that business functions are having more...
Read More...

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles