IT audit perspectives on today's top technology risks
Login/register to view on demand
ABOUT THE EVENT
Cybersecurity, privacy, data, and regulatory compliance dominate the top technology challenges for organisations, according to the global ISACA-Protiviti survey of more than 7,500 IT audit leaders and professionals.
Join us for a presentation of the key findings from the survey, which will cover:
Managing cybersecurity breaches and related risk issues to protect your organisation
The need to address data governance and integrity to reduce regulatory scrutiny
How to mitigate regulatory compliance burdens and risk, and comply with new data privacy and security rules
Director Customer Services and Technology (CST), Group Audit
Senior Audit Manager
Risk and Compliance Manager
GM Technology Controls Office
It has been more than two years since the Attorney-General’s Department announced it would be undertaking a review of the Privacy Act 1988. The review will likely result in the most substantial amendment to the Act since what we now know as the Australian Privacy Principles (APPs) were introduced in 2000. The objective of the review “will consider whether the scope of the Privacy Act 1988 and its enforcement mechanisms remain fit for purpose”.
An uncertain global economy, volatile geopolitical developments, a persistent pandemic and an evolving catalog of technology risks have created mounting challenges for IT audit leaders and their functions.
The results of the latest IT Audit Technology Risks Survey from ISACA and Protiviti, in which more than 7,500 IT audit leaders and professionals from around the world participated, show a dynamic threat landscape, one that has notably increased in severity since our last survey. Specifically, cybersecurity, privacy, data and regulatory compliance are top-of-mind concerns.
The existing Security of Critical Infrastructure Act 2018 (SOCI Act), which requires owners and operators to take steps to safeguard defined critical infrastructure assets, has recently been amended to broaden the scope of industry sectors. Taken together, these two legislative reforms form the Commonwealth framework for critical infrastructure protection, as well as legislated last resort powers in the event of a catastrophic cyber security incident.