• Home
  • About
    • Strategic Areas of Focus
    • IIM Logo Utilisation
    • IIM Privacy Policy
    • Board Members
  • Events
  • Newsletters & Blogs
  • Knowledge
    • Information Leadership
    • Training
    • Standards >
      • Australia & New Zealand Standards and Guidelines
      • International Standards and Guidelines
      • General Data Protection Regulation
      • Notifiable Data Breaches
      • Cloud Guidelines, Standards and Best Practices
  • Webinars & Videos
  • Membership
    • Fees and Terms & Conditions
  • Contact us
  • Resources
INSTITUTE FOR INFORMATION MANAGEMENT
  • Home
  • About
    • Strategic Areas of Focus
    • IIM Logo Utilisation
    • IIM Privacy Policy
    • Board Members
  • Events
  • Newsletters & Blogs
  • Knowledge
    • Information Leadership
    • Training
    • Standards >
      • Australia & New Zealand Standards and Guidelines
      • International Standards and Guidelines
      • General Data Protection Regulation
      • Notifiable Data Breaches
      • Cloud Guidelines, Standards and Best Practices
  • Webinars & Videos
  • Membership
    • Fees and Terms & Conditions
  • Contact us
  • Resources

IIM Newsletters and Blog

Filling a Cyber Security Gap to Protect Australia's National Identity - A presentation by  Anne Lyons

9/4/2020

0 Comments

 
Picture
Anne Lyons GAICD
Picture
Event Sponsor
As organisations, governments and individuals scramble to protect important data and critical information systems from cyber threats, we commonly overlook datasets that are perhaps even more valuable.

In a global environment of cyber-attacks, information manipulation and grey-zone cyber conflict aimed at disrupting nations and democracies, the threat to our national identity assets is real.

These assets are the evidence of who we are as a nation - from our electronic land titles and biometric immigration data, to the outcomes of our courts and electoral processes and the digital images, stories and national conversations we are having right now.

By far the greatest part of Australia's discourse on cybersecurity is focused on the protection of systems: the software, the hardware and the communication networks.  Thorough analysis of security threats also requires the assessment of intent and more often than not, the intent is access to data.

It's the data that needs to be protected from exfiltration, manipulation or destruction, because it's the data that underpins information critical to Australia's government and success as a sovereign nation.  To date, however, there has been very little serious analysis of Australia's critical data assets or the national policy settings required for the proper recognition and management of this important national resource.

Anne Lyons discussed the security gap around our national identity digital assets and what can be done to address that gap.

Anne Lyons joined the Australian Strategic Policy Institute in February 2018 following 12 months as a Visiting Fellow with ASPI's International Cyber Policy Centre and more than 20 years as a senior executive in both the public and private sector.  Her ground-breaking ASPI report Identify of a nation: protecting the digital evidence of who we are identified the importance of digital heritage and identity to Australia's national security.

Download Powerpoint Presentation
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Archives

    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018

    Categories

    All
    AI
    Analytics
    API
    Artificial Intelligence
    Bitcoin
    Blockchain
    Cybersecurity
    Deloitte Insights
    DL
    EBook
    Future
    IBM
    Marsh & McLennan Companies
    Microservices
    ML
    National Institute Of Standards And Technology
    NIST
    Programming
    Python
    Transformation
    UTS
    Video

    RSS Feed

Proudly powered by Weebly
  • Home
  • About
    • Strategic Areas of Focus
    • IIM Logo Utilisation
    • IIM Privacy Policy
    • Board Members
  • Events
  • Newsletters & Blogs
  • Knowledge
    • Information Leadership
    • Training
    • Standards >
      • Australia & New Zealand Standards and Guidelines
      • International Standards and Guidelines
      • General Data Protection Regulation
      • Notifiable Data Breaches
      • Cloud Guidelines, Standards and Best Practices
  • Webinars & Videos
  • Membership
    • Fees and Terms & Conditions
  • Contact us
  • Resources