- Managing cybersecurity breaches and related risk issues to protect your organisation
- The need to address data governance and integrity to reduce regulatory scrutiny
- How to mitigate regulatory compliance burdens and risk, and comply with new data privacy and security rules
IT audit perspectives on today's top technology risks
ABOUT THE EVENT
Cybersecurity, privacy, data, and regulatory compliance dominate the top technology challenges for organisations, according to the global ISACA-Protiviti survey of more than 7,500 IT audit leaders and professionals.
Join us for a presentation of the key findings from the survey, which will cover:
|
|
|
Resources
It has been more than two years since the Attorney-General’s Department announced it would be undertaking a review of the Privacy Act 1988. The review will likely result in the most substantial amendment to the Act since what we now know as the Australian Privacy Principles (APPs) were introduced in 2000. The objective of the review “will consider whether the scope of the Privacy Act 1988 and its enforcement mechanisms remain fit for purpose”.
An uncertain global economy, volatile geopolitical developments, a persistent pandemic and an evolving catalog of technology risks have created mounting challenges for IT audit leaders and their functions.
The results of the latest IT Audit Technology Risks Survey from ISACA and Protiviti, in which more than 7,500 IT audit leaders and professionals from around the world participated, show a dynamic threat landscape, one that has notably increased in severity since our last survey. Specifically, cybersecurity, privacy, data and regulatory compliance are top-of-mind concerns.
The existing Security of Critical Infrastructure Act 2018 (SOCI Act), which requires owners and operators to take steps to safeguard defined critical infrastructure assets, has recently been amended to broaden the scope of industry sectors. Taken together, these two legislative reforms form the Commonwealth framework for critical infrastructure protection, as well as legislated last resort powers in the event of a catastrophic cyber security incident.