Australia Cybersecurity

  • 4 topics | 19m 59s
  • Up to 30 languages
  • Transcripts
Cybersecurity isn't just the concern of IT departments. Instead, the security of business data and networks depends on the habits and actions of every person in an organisation. In this course, you'll learn about IT security risks and the common forms they take, and about requirements for protecting data security under Australian law. You'll also learn about best practices for using your organisation's IT resources and services. This course was developed with subject matter support provided by the law firm of Jackson McDonald. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as legal advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Jackson McDonald accepts no responsibility for their contents and the reliance on the contents is prohibited and at the user’s risk. Transmission of the information is not intended to create, and receipt does not constitute, a solicitor-client or attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.

WHAT YOU WILL LEARN

  • identify common cybersecurity risks and the forms they take
  • identify the areas that Australian cybersecurity regulations cover
  • identify best practices to protect yourself and your organisation from cybersecurity risks
  • recognise cybersecurity risks, regulations, and best practices

IN THIS COURSE

  • Common Cybersecurity Risks
    5m
  • Cybersecurity Regulations
    3m
  • Cybersecurity Best Practices
    5m
  • Exercise: Implementing Cybersecurity
    4m