SlideShare a Scribd company logo
1 of 24
acs.org.au
acs.org.au
The OHS Professional and Cyber Security
A webinar for the Safety Institute of Australia
Ajoy Ghosh
Alcheme Pty Ltd
ajoy@alcheme.com.au
acs.org.au
Why I’ve been asked to present
• Until recently, the interim CISO at Insurance & Care NSW or “icare”
• Lecture in cyberlaw, electronic evidence and computer forensics at Australian and international law schools
• Australian and international standards:
• On Standards Australia committee that oversees IT security, previously also on committee overseeing IT Governance standards
• Author of Australian handbook on Management of IT Evidence (now part of ISO 27037) and co-author of Australian standard on Information Security Risk
Management (now ISO 27005)
• Contributor to and reviewer of ISO 38500 Corporate Governance of Information Technology
• Expert witness:
• Complex technical crimes: hacking, cyber stalking, cyber bullying, child pornography, fraud and forgery, circumvention, white collar and corporate crimes
• Politically sensitive and high profile e.g. Sef Gonzales, James Hardie, Sydney terrorism trials, Simon Gittany
• Advisor to Government and industry:
• IRAP Assessor
• ACS Cyber Security technical committee
HB171: Guidelines for the Managementof IT Evidence (above)
HB231: Guidelines for Information SecurityRisk Management (below)
acs.org.au
World Economic Forum – Global Risks Report
• Cybersecurity risks are also growing, both in
their prevalence and in their disruptive
potential. Attacks against businesses have
almost doubled in five years, and incidents
that would once have been considered
extraordinary are becoming more and more
commonplace.
• Another growing trend is the use of
cyberattacks to target critical infrastructure
and strategic industrial sectors, raising fears
that, in a worst-case scenario, attackers could
trigger a breakdown in the systems that keep
societies functioning.
http://reports.weforum.org/global-risks-2018/
acs.org.au
WEF Global Risks (cont)
• In this year’s report, cyber risks
are prominent:
• Cyber attacks are likely with higher
than average impact
• Data fraud/theft is likely and less
than average impact
• Critical infrastructure breakdown
(caused by accident or cyber
attack) are less likely with average
impact
acs.org.au
In Australia
Australian Institute of Company Directors
Director’s Sentiment Index
• Survey of Directors on Australian Boards
• Conducted each half year
Cybercrime and data is a growing concern
Compliance and reputation continue to
concern
First half 2017
First half 2018
https://aicd.companydirectors.com.au/advocacy/research
acs.org.au
ACS Cyber security paper
https://www.acs.org.au/insightsandpublications/publications.html
acs.org.au
Harm
Cyber security incidents can cause harm in a number of ways,
such as:
• A software “glitch” causing an accident of an automated or
autonomous system, such as a car or heavy machinery
• Hacking into a control system and causing a machine to have
an accident or do something dangerous, such as overheating
and catching on fire
• Disclosure of personal and health data, which is then used
causing financial, emotional and even physical harm
• Cyber bullying and harassment in the workplace or of
workers
Some Australian examples:
• In 2000, Vitek Boden “hacked” into his former employer’s
network causing raw sewage to spill and contaminate a large
area, including the grounds of the Marriott hotel
• in 2003, accidental changes to the software of a food
manufacturer caused excessive iron to be added to a
breakfast cereal. Line closed for one month
• In 2014, a former IT worker hacked into a mine site network
to copy some code. In the process stopping a telemetry
system which caused a drilling rig to suddenly turn, just
missing a worker
• In 2016, a computer virus caused the building management
system of a shopping centre to shut down trapping an elderly
person in a lift where they suffered a heart attack
acs.org.au
OAIC Mandatory Breaches
9
• 63 breaches reported in Q1 2018
• Only 6 weeks since scheme started
on 22 February
https://www.oaic.gov.au/resources/privacy-law/privacy-act/notifiable-data-breaches-scheme/quarterly-
statistics/Notifiable_Data_Breaches_Quarterly_Statistics_Report_January_2018__March_.pdf
acs.org.au
Rules & Obligations
10
acs.org.au
Obligations
11
COMPANY
andWORKPLACE
CRITICALINFRASTRUCTRE
GOOD PRACTICE
INTERNATIONAL STANDARDS
• ISO 38500
• ISO 31000
• ISO 27001/2
NIST
• Cyber security framework
• Others
PAYMENTS
SUPPLY CHAIN
CRITICAL INFRASTRUCTRE & INDUSTRY
• Security of Critical Infra (Home
Affairs)
• Sectorial specific e.g.
Telecommunication, Mines, Health
etc
FUNDING and GRANTS
• Contractual obligations
INDUSTRY PRACTICE
• IEC 61508, etc
• Sectorial specific
PRIVACY
• EU General Directive on Privacy
Regulation
SECURITY LAW
• Allow access to data and
communications
• Allow step-in to provide service
AUSTRALIAN LAW
• Privacy (OAIC)
• Crime and evidence (AGD)
• Company (ASIC)
• Consumer Law (ACCC)
• Human rights/Discrimination/Vilification
(AHRC)
NSW LAW
• Privacy & Health records
• Fair trading
• Work health and safety
• Workplace surveillance
• Crime and evidence
PRACTICE
• ASX Cyber health check
EXTRA-
TERRITORIAL
acs.org.au
Security of Critical Infrastructure
1. Register of Critical Infrastructure Assets
• owners and operators of relevant critical
infrastructure assets will have six months from
11 July 2018 to register ownership and
operational information on the register
2. Information gathering power
• power to obtain more detailed information
from owners and operators of assets
3. Ministerial directions
• direct an owner or operator of critical
infrastructure to do, or not do, a specified
thing to mitigate against a national security
risk
• Risk assessments in consultation with State
governments
• company’s security policies, i.e. data security
and physical security
• security audits undertaken by a company
• emergency management plans
• redundancies
• offshoring and outsourcing of operations
• existing regulatory regimes and controls
• Risk assessments support foreign investment
assessments by The Treasury and the Foreign
Investment Review Board (FIRB)
acs.org.au
PRIVACY
Why has privacy become so important?
• Unlike most wrongdoing, Australian companies are now obligated to tell
whenever they become compromised
• Notifiable Data Breach 22 February 2018
• Turnover >$3m annually
• Community has become hyper aware due to pervasiveness, familiarity and
the media frenzy over (alleged) data breaches
• Recent examples include Equifax, Uber, Facebook, Grindr, etc
• Overseas regimes have large fines and even jail
• Australian Privacy Commissioner $10k and compel action (usually the more expensive)
• EU up to €20m or 4% of annual turnover
• China Cybersecurity Law for “important data” to/from China
13
acs.org.au
State Laws are similar but different
e.g. NSW Privacy Laws
• 2 laws:
• Privacy and Personal Information Protection Act
• Health Records and Information Privacy Act
• Similar to Australian Privacy Act, with some differences. Key ones are:
• NSW Public Sector Agencies required to comply and exempted from Australian Act
• Covers government schools and Department of Education
• Other entities also required to comply (e.g. health service providers), but not
exempted from Australian Act
• Allows sharing with other NSW agencies, as long as certain things are met
• NSW Privacy Commissioner responsible
• Reporting of “incidents” to NSW Privacy Commissioner
• Requirement to keep health records in NSW, with limited exemptions
14
acs.org.au
Personal information
• Information or an opinion about an identified individual, or an individual who is reasonably identifiable:
• whether the information or opinion is true or not; and
• whether the information or opinion is recorded in a material form or not.
• Personal Information: such as a person’s name, address, financial information, marital status or billing details.
• Sensitive Information: includes information with respect to an individual’s racial or ethnic origin; political opinions; membership of
a political association; religious beliefs or affiliations; philosophical beliefs; membership of a professional or trade association;
membership of a trade union; sexual preferences or practices; criminal record as well as health and genetic information.
• Health Information: any information collected about an individual’s health or disability and any information collected in relation to
a health service that is provided. It includes such things as notes of symptoms , diagnosis or treatments, doctor’s reports,
appointment times and prescriptions.
• According to the OAIC: A person’s name, signature, home address, email address, telephone number, date of birth, medical
records, bank account details and employment details will generally constitute personal information (OAIC Guide – What is
personal information)
15
acs.org.au
Australian Privacy Principles
1. Open and transparent management of personal information
2. Anonymity and pseudonymity
3. Collection of solicited personal information
4. Dealing with unsolicited personal information
5. Notification of the collection of personal information
6. Use or disclosure of personal information
7. Direct marketing
8. Cross-border disclosure of personal information
9. Adoption, use or disclosure of government related identifiers
10. Quality of personal information
11. Security of personal information
12. Access to personal information
13. Correction of personal information
16
acs.org.au
Consider safe disclosure and use data for analytics
17
Safe people
Safe project
Safe setting
Safe data
(input)
Safe output
• UK 5 safes model has been adopted by
Australia’s National Statistical Service
• Also to be used for risk management of shared
Commonwealth Data
• Means that it is a reasonable choice as a
benchmark model
• ACS Data Sharing Framework
• Non-Personal Data
• Services Based on Highly Aggregated Data
• Lightly Aggregated Data
• Personally Identifiable Data
https://www.acs.org.au/insightsandpublications/publications.html
acs.org.au
APP 11 - Security
18
• Reasonable steps:
1. governance, culture and training
2. internal practices, procedures
and systems
3. ICT security
4. access security
5. third party providers (including
cloud computing)
6. data breaches
7. physical security
8. destruction and de-identification
9. standards
https://www.oaic.gov.au/agencies-and-organisations/guides/guide-to-securing-personal-information
acs.org.au
OAIC Guide to Securing Personal Information
19
• The guide says:
• This guide is not legally binding. However, the Office of
the Australian Information Commissioner (OAIC) will
refer to this guide when undertaking its Privacy Act
functions, including when investigating whether an
entity has complied with its personal information
security obligations or when undertaking an
assessment
• In essence, it is the measure used by the OAIC when
assessing if “reasonable measures” have been put in
place (or not)
• About checklist style 70 questions, including a
checklist for cloud. Some key ones:
• Policies and staff awareness
• Human error
• Certification against international security standards,
such as ISO 27000 group i.e. ISO 27001 and 27002
• Latest versions of software and applications. Patch and
security updates
• Effective encryption, including backups
• Whitelist/blacklist harmful material
• Testing – security, recovery and breach response
• Authentication, access and audit logs
• Supply chain (third party suppliers)
• Destruction and de-identification
• Securing email
• Physical access
acs.org.au
Australian Government clouds
20
• Australian Signals Directorate Certified Cloud
Services List
• The government's experts have reviewed and
approved
• Reasonable for you to also use
• Most commercial/consumer services are at the
Unclassified level DLM level
• Allows for storage of personal and health data
• ~930 security items:
• Some process and some technical configuration
• Some things for provider
• Some things for customer
www.asd.gov.au/infosec/cloudsecurity.htm
acs.org.au
Notifiable Data Breach
21
• Eligible Data Breach
• there is unauthorised access to or disclosure of or a loss of,
personal information
• this is likely to result in serious harm to one or more
individuals
• has not been able to prevent the likely risk of serious harm
with remedial action
• Serious harm may include serious physical, psychological,
emotional, financial, or reputational harm
• Some types of information increase the risk of serious
harm:
• sensitive information
• documents commonly used for identity fraud, including
Medicare card, driver licence, and passport details
• financial information
• a combination of types of personal information
• Promptly notify:
• Individuals at likely risk of harm
• All individuals
• Only those individuals at risk of serious harm
• Publish notification
• Privacy Commissioner
• Use OAIC website or specific form
• Must include:
• the identity and contact details of the organisation
• a description of the data breach
• the kinds of information concerned; and
• recommendations about the steps individuals should take in
response to the data breach
acs.org.au
Data breach preparation and response
22
• Data Breach Response Plan
• A clear explanation of what constitutes a data breach
• A strategy for containing, assessing and managing data breaches
• The roles and responsibilities of staff
• Documentation
• Review
• Breach response team
• Team leader: leading the response team and reporting to senior
management
• Project manager: coordinate the team and provide support
• Senior member with overall accountability for privacy: bring privacy
expertise to the team
• Legal: to identify obligations and provide advice
• Risk management: assess the risks from the breach
• ICT support/forensics: help establish the cause and impact of a data
breach that involved ICT systems
• Records management: reviewing security and monitoring controls
(e.g. access, authentication, encryption, audit logs) and provide advice
on recording the response
• HR: if the breach was due to the actions of a staff member
• Media/communications expertise: communicating with affected
individuals and dealing with the media and external stakeholders
https://www.oaic.gov.au/agencies-and-organisations/guides/data-breach-preparation-and-response#part-2-preparing-a-data-breach-response-plan
acs.org.au
Be aware of special cases in your industry
e.g. records retention, incl in the cloud
• Child safety = 45years Other examples
• Dust e.g. asbestos, coal, silica =
patient aged 100yrs, or 25yrs
• Radiation = patient aged 75yrs
or 15yrs since last radiated
23
acs.org.au

More Related Content

What's hot

ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayDan Michaluk
 
Any Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsAny Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsPECB
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit iArthyR3
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentationPriyanka Aash
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...IT Governance Ltd
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...James Mulhern
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...centralohioissa
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...IT Governance Ltd
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for developmentTomppa Järvinen
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)Napier University
 

What's hot (20)

ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
 
Any Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsAny Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO Standards
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit i
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentation
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Mbs r35 b
Mbs r35 bMbs r35 b
Mbs r35 b
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)
 

Similar to SIA Webinar: The OHS Professional and Cyber Security

Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data EthicsErik Kokkonen
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesLouise Corti
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
Cyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillanCyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillanTWCA
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Richik Sarkar
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyFLUZO
 
ICT4018_ICTICT418-Learning-Material.pdf
ICT4018_ICTICT418-Learning-Material.pdfICT4018_ICTICT418-Learning-Material.pdf
ICT4018_ICTICT418-Learning-Material.pdfHasseyWijetunge
 
Managing Global Mobility - Legal issues for work safety and security
Managing Global Mobility - Legal issues for work safety and securityManaging Global Mobility - Legal issues for work safety and security
Managing Global Mobility - Legal issues for work safety and securityFiona Austin
 
Global Mobility - legal issues for work safety and security
Global Mobility - legal issues for work safety and securityGlobal Mobility - legal issues for work safety and security
Global Mobility - legal issues for work safety and securityFiona Austin
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxSlides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxCapitolTechU
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 

Similar to SIA Webinar: The OHS Professional and Cyber Security (20)

Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issues
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Cyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillanCyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillan
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
ICT4018_ICTICT418-Learning-Material.pdf
ICT4018_ICTICT418-Learning-Material.pdfICT4018_ICTICT418-Learning-Material.pdf
ICT4018_ICTICT418-Learning-Material.pdf
 
Managing Global Mobility - Legal issues for work safety and security
Managing Global Mobility - Legal issues for work safety and securityManaging Global Mobility - Legal issues for work safety and security
Managing Global Mobility - Legal issues for work safety and security
 
Global Mobility - legal issues for work safety and security
Global Mobility - legal issues for work safety and securityGlobal Mobility - legal issues for work safety and security
Global Mobility - legal issues for work safety and security
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxSlides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 

More from Australian Institute of Health & Safety

SafeWork’s SA priorities and the Merritt review/ Working with the new Adviso...
SafeWork’s SA priorities and the Merritt review/ Working with the new  Adviso...SafeWork’s SA priorities and the Merritt review/ Working with the new  Adviso...
SafeWork’s SA priorities and the Merritt review/ Working with the new Adviso...Australian Institute of Health & Safety
 
Keynote, SafeWork’s SA priorities and the Merritt review/ Working with the ne...
Keynote, SafeWork’s SA priorities and the Merritt review/ Working with the ne...Keynote, SafeWork’s SA priorities and the Merritt review/ Working with the ne...
Keynote, SafeWork’s SA priorities and the Merritt review/ Working with the ne...Australian Institute of Health & Safety
 
Workshop 1: Safety Leadership in action: The role of safety leadership in cre...
Workshop 1: Safety Leadership in action: The role of safety leadership in cre...Workshop 1: Safety Leadership in action: The role of safety leadership in cre...
Workshop 1: Safety Leadership in action: The role of safety leadership in cre...Australian Institute of Health & Safety
 
Developing practical evidence-based solutions to prevent harm in the workplace
Developing practical evidence-based solutions to prevent harm in the workplace Developing practical evidence-based solutions to prevent harm in the workplace
Developing practical evidence-based solutions to prevent harm in the workplace Australian Institute of Health & Safety
 
From Complexity to Clarity: Am Electricians guide on how to innovate and simp...
From Complexity to Clarity: Am Electricians guide on how to innovate and simp...From Complexity to Clarity: Am Electricians guide on how to innovate and simp...
From Complexity to Clarity: Am Electricians guide on how to innovate and simp...Australian Institute of Health & Safety
 
Understanding heightened work health and safety legislation for managing the ...
Understanding heightened work health and safety legislation for managing the ...Understanding heightened work health and safety legislation for managing the ...
Understanding heightened work health and safety legislation for managing the ...Australian Institute of Health & Safety
 

More from Australian Institute of Health & Safety (20)

Construction
Construction Construction
Construction
 
Safety in Design
Safety in DesignSafety in Design
Safety in Design
 
Psychosocial risk
Psychosocial riskPsychosocial risk
Psychosocial risk
 
Research highlights on Health & Wellbeing at work
Research highlights on Health & Wellbeing at workResearch highlights on Health & Wellbeing at work
Research highlights on Health & Wellbeing at work
 
WHS legal update
WHS legal updateWHS legal update
WHS legal update
 
WHS Emergency Service lessons from flood events
WHS Emergency Service lessons from flood eventsWHS Emergency Service lessons from flood events
WHS Emergency Service lessons from flood events
 
Understanding the significance of exposure science in WHS issues
Understanding the significance of exposure science in WHS issuesUnderstanding the significance of exposure science in WHS issues
Understanding the significance of exposure science in WHS issues
 
SafeWork’s SA priorities and the Merritt review/ Working with the new Adviso...
SafeWork’s SA priorities and the Merritt review/ Working with the new  Adviso...SafeWork’s SA priorities and the Merritt review/ Working with the new  Adviso...
SafeWork’s SA priorities and the Merritt review/ Working with the new Adviso...
 
WHS lessons from Major Transport & Infrastructure projects
WHS lessons from Major Transport & Infrastructure projectsWHS lessons from Major Transport & Infrastructure projects
WHS lessons from Major Transport & Infrastructure projects
 
Keynote, SafeWork’s SA priorities and the Merritt review/ Working with the ne...
Keynote, SafeWork’s SA priorities and the Merritt review/ Working with the ne...Keynote, SafeWork’s SA priorities and the Merritt review/ Working with the ne...
Keynote, SafeWork’s SA priorities and the Merritt review/ Working with the ne...
 
Workshop 1: Safety Leadership in action: The role of safety leadership in cre...
Workshop 1: Safety Leadership in action: The role of safety leadership in cre...Workshop 1: Safety Leadership in action: The role of safety leadership in cre...
Workshop 1: Safety Leadership in action: The role of safety leadership in cre...
 
Developing practical evidence-based solutions to prevent harm in the workplace
Developing practical evidence-based solutions to prevent harm in the workplace Developing practical evidence-based solutions to prevent harm in the workplace
Developing practical evidence-based solutions to prevent harm in the workplace
 
From Complexity to Clarity: Am Electricians guide on how to innovate and simp...
From Complexity to Clarity: Am Electricians guide on how to innovate and simp...From Complexity to Clarity: Am Electricians guide on how to innovate and simp...
From Complexity to Clarity: Am Electricians guide on how to innovate and simp...
 
Understanding heightened work health and safety legislation for managing the ...
Understanding heightened work health and safety legislation for managing the ...Understanding heightened work health and safety legislation for managing the ...
Understanding heightened work health and safety legislation for managing the ...
 
How organisations Sabotage Safety
How organisations Sabotage Safety How organisations Sabotage Safety
How organisations Sabotage Safety
 
Coaching & Mentoring: What is the difference?
Coaching & Mentoring: What is the difference?Coaching & Mentoring: What is the difference?
Coaching & Mentoring: What is the difference?
 
Indirectly influencing change to increase Psychological Safety
Indirectly influencing change to increase Psychological Safety Indirectly influencing change to increase Psychological Safety
Indirectly influencing change to increase Psychological Safety
 
Young brains in an ageing head
Young brains in an ageing headYoung brains in an ageing head
Young brains in an ageing head
 
Innovation within learning and development
Innovation within learning and development Innovation within learning and development
Innovation within learning and development
 
Combing agile Work Methods and New Views of Safety
Combing agile Work Methods and New Views of Safety Combing agile Work Methods and New Views of Safety
Combing agile Work Methods and New Views of Safety
 

Recently uploaded

VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 

Recently uploaded (20)

VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 

SIA Webinar: The OHS Professional and Cyber Security

  • 2. acs.org.au The OHS Professional and Cyber Security A webinar for the Safety Institute of Australia Ajoy Ghosh Alcheme Pty Ltd ajoy@alcheme.com.au
  • 3. acs.org.au Why I’ve been asked to present • Until recently, the interim CISO at Insurance & Care NSW or “icare” • Lecture in cyberlaw, electronic evidence and computer forensics at Australian and international law schools • Australian and international standards: • On Standards Australia committee that oversees IT security, previously also on committee overseeing IT Governance standards • Author of Australian handbook on Management of IT Evidence (now part of ISO 27037) and co-author of Australian standard on Information Security Risk Management (now ISO 27005) • Contributor to and reviewer of ISO 38500 Corporate Governance of Information Technology • Expert witness: • Complex technical crimes: hacking, cyber stalking, cyber bullying, child pornography, fraud and forgery, circumvention, white collar and corporate crimes • Politically sensitive and high profile e.g. Sef Gonzales, James Hardie, Sydney terrorism trials, Simon Gittany • Advisor to Government and industry: • IRAP Assessor • ACS Cyber Security technical committee HB171: Guidelines for the Managementof IT Evidence (above) HB231: Guidelines for Information SecurityRisk Management (below)
  • 4. acs.org.au World Economic Forum – Global Risks Report • Cybersecurity risks are also growing, both in their prevalence and in their disruptive potential. Attacks against businesses have almost doubled in five years, and incidents that would once have been considered extraordinary are becoming more and more commonplace. • Another growing trend is the use of cyberattacks to target critical infrastructure and strategic industrial sectors, raising fears that, in a worst-case scenario, attackers could trigger a breakdown in the systems that keep societies functioning. http://reports.weforum.org/global-risks-2018/
  • 5. acs.org.au WEF Global Risks (cont) • In this year’s report, cyber risks are prominent: • Cyber attacks are likely with higher than average impact • Data fraud/theft is likely and less than average impact • Critical infrastructure breakdown (caused by accident or cyber attack) are less likely with average impact
  • 6. acs.org.au In Australia Australian Institute of Company Directors Director’s Sentiment Index • Survey of Directors on Australian Boards • Conducted each half year Cybercrime and data is a growing concern Compliance and reputation continue to concern First half 2017 First half 2018 https://aicd.companydirectors.com.au/advocacy/research
  • 7. acs.org.au ACS Cyber security paper https://www.acs.org.au/insightsandpublications/publications.html
  • 8. acs.org.au Harm Cyber security incidents can cause harm in a number of ways, such as: • A software “glitch” causing an accident of an automated or autonomous system, such as a car or heavy machinery • Hacking into a control system and causing a machine to have an accident or do something dangerous, such as overheating and catching on fire • Disclosure of personal and health data, which is then used causing financial, emotional and even physical harm • Cyber bullying and harassment in the workplace or of workers Some Australian examples: • In 2000, Vitek Boden “hacked” into his former employer’s network causing raw sewage to spill and contaminate a large area, including the grounds of the Marriott hotel • in 2003, accidental changes to the software of a food manufacturer caused excessive iron to be added to a breakfast cereal. Line closed for one month • In 2014, a former IT worker hacked into a mine site network to copy some code. In the process stopping a telemetry system which caused a drilling rig to suddenly turn, just missing a worker • In 2016, a computer virus caused the building management system of a shopping centre to shut down trapping an elderly person in a lift where they suffered a heart attack
  • 9. acs.org.au OAIC Mandatory Breaches 9 • 63 breaches reported in Q1 2018 • Only 6 weeks since scheme started on 22 February https://www.oaic.gov.au/resources/privacy-law/privacy-act/notifiable-data-breaches-scheme/quarterly- statistics/Notifiable_Data_Breaches_Quarterly_Statistics_Report_January_2018__March_.pdf
  • 11. acs.org.au Obligations 11 COMPANY andWORKPLACE CRITICALINFRASTRUCTRE GOOD PRACTICE INTERNATIONAL STANDARDS • ISO 38500 • ISO 31000 • ISO 27001/2 NIST • Cyber security framework • Others PAYMENTS SUPPLY CHAIN CRITICAL INFRASTRUCTRE & INDUSTRY • Security of Critical Infra (Home Affairs) • Sectorial specific e.g. Telecommunication, Mines, Health etc FUNDING and GRANTS • Contractual obligations INDUSTRY PRACTICE • IEC 61508, etc • Sectorial specific PRIVACY • EU General Directive on Privacy Regulation SECURITY LAW • Allow access to data and communications • Allow step-in to provide service AUSTRALIAN LAW • Privacy (OAIC) • Crime and evidence (AGD) • Company (ASIC) • Consumer Law (ACCC) • Human rights/Discrimination/Vilification (AHRC) NSW LAW • Privacy & Health records • Fair trading • Work health and safety • Workplace surveillance • Crime and evidence PRACTICE • ASX Cyber health check EXTRA- TERRITORIAL
  • 12. acs.org.au Security of Critical Infrastructure 1. Register of Critical Infrastructure Assets • owners and operators of relevant critical infrastructure assets will have six months from 11 July 2018 to register ownership and operational information on the register 2. Information gathering power • power to obtain more detailed information from owners and operators of assets 3. Ministerial directions • direct an owner or operator of critical infrastructure to do, or not do, a specified thing to mitigate against a national security risk • Risk assessments in consultation with State governments • company’s security policies, i.e. data security and physical security • security audits undertaken by a company • emergency management plans • redundancies • offshoring and outsourcing of operations • existing regulatory regimes and controls • Risk assessments support foreign investment assessments by The Treasury and the Foreign Investment Review Board (FIRB)
  • 13. acs.org.au PRIVACY Why has privacy become so important? • Unlike most wrongdoing, Australian companies are now obligated to tell whenever they become compromised • Notifiable Data Breach 22 February 2018 • Turnover >$3m annually • Community has become hyper aware due to pervasiveness, familiarity and the media frenzy over (alleged) data breaches • Recent examples include Equifax, Uber, Facebook, Grindr, etc • Overseas regimes have large fines and even jail • Australian Privacy Commissioner $10k and compel action (usually the more expensive) • EU up to €20m or 4% of annual turnover • China Cybersecurity Law for “important data” to/from China 13
  • 14. acs.org.au State Laws are similar but different e.g. NSW Privacy Laws • 2 laws: • Privacy and Personal Information Protection Act • Health Records and Information Privacy Act • Similar to Australian Privacy Act, with some differences. Key ones are: • NSW Public Sector Agencies required to comply and exempted from Australian Act • Covers government schools and Department of Education • Other entities also required to comply (e.g. health service providers), but not exempted from Australian Act • Allows sharing with other NSW agencies, as long as certain things are met • NSW Privacy Commissioner responsible • Reporting of “incidents” to NSW Privacy Commissioner • Requirement to keep health records in NSW, with limited exemptions 14
  • 15. acs.org.au Personal information • Information or an opinion about an identified individual, or an individual who is reasonably identifiable: • whether the information or opinion is true or not; and • whether the information or opinion is recorded in a material form or not. • Personal Information: such as a person’s name, address, financial information, marital status or billing details. • Sensitive Information: includes information with respect to an individual’s racial or ethnic origin; political opinions; membership of a political association; religious beliefs or affiliations; philosophical beliefs; membership of a professional or trade association; membership of a trade union; sexual preferences or practices; criminal record as well as health and genetic information. • Health Information: any information collected about an individual’s health or disability and any information collected in relation to a health service that is provided. It includes such things as notes of symptoms , diagnosis or treatments, doctor’s reports, appointment times and prescriptions. • According to the OAIC: A person’s name, signature, home address, email address, telephone number, date of birth, medical records, bank account details and employment details will generally constitute personal information (OAIC Guide – What is personal information) 15
  • 16. acs.org.au Australian Privacy Principles 1. Open and transparent management of personal information 2. Anonymity and pseudonymity 3. Collection of solicited personal information 4. Dealing with unsolicited personal information 5. Notification of the collection of personal information 6. Use or disclosure of personal information 7. Direct marketing 8. Cross-border disclosure of personal information 9. Adoption, use or disclosure of government related identifiers 10. Quality of personal information 11. Security of personal information 12. Access to personal information 13. Correction of personal information 16
  • 17. acs.org.au Consider safe disclosure and use data for analytics 17 Safe people Safe project Safe setting Safe data (input) Safe output • UK 5 safes model has been adopted by Australia’s National Statistical Service • Also to be used for risk management of shared Commonwealth Data • Means that it is a reasonable choice as a benchmark model • ACS Data Sharing Framework • Non-Personal Data • Services Based on Highly Aggregated Data • Lightly Aggregated Data • Personally Identifiable Data https://www.acs.org.au/insightsandpublications/publications.html
  • 18. acs.org.au APP 11 - Security 18 • Reasonable steps: 1. governance, culture and training 2. internal practices, procedures and systems 3. ICT security 4. access security 5. third party providers (including cloud computing) 6. data breaches 7. physical security 8. destruction and de-identification 9. standards https://www.oaic.gov.au/agencies-and-organisations/guides/guide-to-securing-personal-information
  • 19. acs.org.au OAIC Guide to Securing Personal Information 19 • The guide says: • This guide is not legally binding. However, the Office of the Australian Information Commissioner (OAIC) will refer to this guide when undertaking its Privacy Act functions, including when investigating whether an entity has complied with its personal information security obligations or when undertaking an assessment • In essence, it is the measure used by the OAIC when assessing if “reasonable measures” have been put in place (or not) • About checklist style 70 questions, including a checklist for cloud. Some key ones: • Policies and staff awareness • Human error • Certification against international security standards, such as ISO 27000 group i.e. ISO 27001 and 27002 • Latest versions of software and applications. Patch and security updates • Effective encryption, including backups • Whitelist/blacklist harmful material • Testing – security, recovery and breach response • Authentication, access and audit logs • Supply chain (third party suppliers) • Destruction and de-identification • Securing email • Physical access
  • 20. acs.org.au Australian Government clouds 20 • Australian Signals Directorate Certified Cloud Services List • The government's experts have reviewed and approved • Reasonable for you to also use • Most commercial/consumer services are at the Unclassified level DLM level • Allows for storage of personal and health data • ~930 security items: • Some process and some technical configuration • Some things for provider • Some things for customer www.asd.gov.au/infosec/cloudsecurity.htm
  • 21. acs.org.au Notifiable Data Breach 21 • Eligible Data Breach • there is unauthorised access to or disclosure of or a loss of, personal information • this is likely to result in serious harm to one or more individuals • has not been able to prevent the likely risk of serious harm with remedial action • Serious harm may include serious physical, psychological, emotional, financial, or reputational harm • Some types of information increase the risk of serious harm: • sensitive information • documents commonly used for identity fraud, including Medicare card, driver licence, and passport details • financial information • a combination of types of personal information • Promptly notify: • Individuals at likely risk of harm • All individuals • Only those individuals at risk of serious harm • Publish notification • Privacy Commissioner • Use OAIC website or specific form • Must include: • the identity and contact details of the organisation • a description of the data breach • the kinds of information concerned; and • recommendations about the steps individuals should take in response to the data breach
  • 22. acs.org.au Data breach preparation and response 22 • Data Breach Response Plan • A clear explanation of what constitutes a data breach • A strategy for containing, assessing and managing data breaches • The roles and responsibilities of staff • Documentation • Review • Breach response team • Team leader: leading the response team and reporting to senior management • Project manager: coordinate the team and provide support • Senior member with overall accountability for privacy: bring privacy expertise to the team • Legal: to identify obligations and provide advice • Risk management: assess the risks from the breach • ICT support/forensics: help establish the cause and impact of a data breach that involved ICT systems • Records management: reviewing security and monitoring controls (e.g. access, authentication, encryption, audit logs) and provide advice on recording the response • HR: if the breach was due to the actions of a staff member • Media/communications expertise: communicating with affected individuals and dealing with the media and external stakeholders https://www.oaic.gov.au/agencies-and-organisations/guides/data-breach-preparation-and-response#part-2-preparing-a-data-breach-response-plan
  • 23. acs.org.au Be aware of special cases in your industry e.g. records retention, incl in the cloud • Child safety = 45years Other examples • Dust e.g. asbestos, coal, silica = patient aged 100yrs, or 25yrs • Radiation = patient aged 75yrs or 15yrs since last radiated 23