Public Sector Information Security

Venue: Rydges World Square

Location: Sydney, NSW, Australia

Event Date/Time: Jul 23, 2009 End Date/Time: Jul 24, 2009
Registration Date: Jul 24, 2009
Early Registration Date: Jun 26, 2009
Report as Spam

Description

Hear from our expert panel of speakers:

Coca Cola Amatil
The Spamhaus Project (UK)
NSW Department of Commerce
Department of Justice (VIC)
Kingston City Council
Queensland Audit Office
(ISC)²
Department of Education and Training (QLD)
PricewaterhouseCoopers
Telstra
Information is a vital public sector asset, and as a result, the protection of information is crucial in the managing and handling of large amounts of private and sensitive information by government organisations.
The security of information is constantly subject to threats and risks such as unauthorised access, loss, disclosure, misuse and modification. Organisations are constantly facing new security challenges with the introduction and adoption of emerging mobile, wireless and virtual information and communication technologies.
This one-day conference will provide you with opportunities to hear timely and practical information security case studies from the public sector. You’ll be armed with techniques to:
 Comply with government information security standards and legislation
 Introduce policies, procedures and an information security framework
 Engage and educate all levels in the organisation on information security
 Ensure the security of emerging virtualisation, mobile and wireless communication technologies
 Choose the right technology to protect your information
 Respond adequately when incidents occur
Who should attend?
Managers, Directors and other professionals responsible for:
 Information and Data Security Management
 Email Security Management
 IT Security Management
 IT Management
 Information Architecture and Management
 Information Systems Management
 Network Management
 Security Audits
 Risk Management
 Compliance and Fraud
 Information and Data Protection
 Information and Data Governance
 Identity, Privacy and Access Management
 Incident Recovery Management
 Information Assets and Intellectual Property Protection
 Enterprise Architecture and Technology

Venue

Types