About this Event
Area of Interest: Cyber Security, Government and Leadership
Course Summary
Implementing the Australian Signals Directorate (ASD) Information Security Manual (ISM) is a vital part of cyber security responsibility for all people working with the federal government. Understanding the regulatory requirements and best practice implementation of the ISM can be challenging for leaders. Through this course you will gain the knowledge and skills needed to effectively lead the strategic direction and implementation of the ISM in your government department or organisation.
In the course you will delve into the intricacies of major international cyber security and privacy frameworks, exploring how they intersect with ASD’s Information Security Manual. You will discover strategies for implementing the ISM process and controls and learn how to effectively manage and interact with cyber security teams implementing the ISM in Australian Government and Defence settings.
Course Content
- In this course you will cover the topics of:
- Global cyber security standards including the major cyber security frameworks (ISO 2700x, NIST CSG) and privacy frameworks (ISO 2770x, NIST PRIVACY).
- How the Australian Signals Directorate’s Information Security Manual fits in with the global standards.
- Understanding the four stages of ASD’s ISM process.
- Understanding the scope and nature of the ASD's ISM cyber security controls.
- Planning for, and responding to breaches according to the ASD's ISM process.
- Ethical and regulatory requirements.
- Managing and interacting with cyber security teams
Learning Outcomes
On completion of this course, you will:
- Understand the major cyber security and privacy frameworks, when they are used, and how they relate to the ASD ISM.
- Understand the implementation process of the ISM including: defining the system, selecting controls, implementing controls, assessing controls, authorising the system.
- Understand how implementation of ISM applies to the risk management framework approach.
- Identify and describe the four principals of ISM (govern, protect, detect, respond) from a strategic level.
- Recognise, at a strategic level, how ISM reduces breach opportunities and the damage caused by breaches.
- Know the ethical and regulatory responsibilities ISM places on places and participants.
- Understand the interaction between the ASD’s ISM and the NIST PRIVACY frameworks and how each apply.
- Understand different team structures and the various approaches to building teams and retaining people.
Who should attend
This course is ideal for:
- Experienced leaders new to cyber security leadership.
- New and experienced leaders within the Australian government.
- IT professionals seeking an introduction to cyber security strategic leadership.
- Defence or government personnel, or people who work closely with Defence or government.
Prerequisite: None
Facilitator
Matt O’Kane
Matt O'Kane is Director of Notion Digital Forensics in Sydney. Notion provides digital forensics and cyber-security services to legal professionals, businesses and individuals throughout the world. Matt draws on his experience in detailed investigation of cyber incidents to show you common pitfalls to avoid. Using his experience, Matt has trained cyber forces and cyber professionals throughout South East Asia using the latest material from real cases.
Event Venue & Nearby Stays
UNSW Canberra City Campus, 37 Constitution Avenue, Reid, Australia
AUD 4440.00