2008 The Street AFP National Security Interoperability Review Street Mar 2008

The Street AFP National Security Interoperability Review – Street March 2008

We present the Committee’s Review of the AFP’s national security operations and the effect of the interaction between the AFP and Its national security agency partners in carrying out such operations. The Committee would like to thank all the Australian and international agencies that participated in this review and acknowledge the spirit of cooperation and […]

2008 US Intelligence Sharing Strategy ODNI Feb 2008

US Intelligence Sharing Strategy – ODNI February 2008

The need to share information became an imperative to protect our Nation in the aftermath of the 9/11 attacks on our homeland. The Intelligence Community’s “need-to-know” culture, a necessity during the Cold War, is now a handicap that threatens our ability to uncover, respond, and protect against terrorism and other asymmetric threats. Each intelligence agency […]

2008 Setting up an Australian company Austrade Feb 2008

Setting up Australian company – Austrade Feburary 2008

Although Australia is a federation of eight different States and Territories, the Corporations Act of 1989 established the concept on an ‘Australian company’. This Act is administered by the Australian Securities and Investment Commission (ASIC), with one computer system containing records for all companies operating throughout Australia. To establish a company in Australia, investors may […]

2006 IT Security Governance - a CIOs Guide TISN

IT Security Governance – a CIOs Guide TISN 2006

Whatever your business, IT security and privacy are key matters that affect your enterprise and those dependent upon you. There is a realisation, domestically and abroad, that an organisation cannot effectively achieve its corporate and IT governance objectives without high-level executive support. These issues are now reaching boardroom agendas via an increasing awareness that a […]

2007 Information Security for Enterprise Architecture – TISN DCITA

Report :   2007 Information Security for Enterprise Architecture – TISN DCITA Rapid development in information and communication technologies and the changing business environment present a range of challenges for organisations that rely on such technologies for day-to-day operations. Critical infrastructure sectors are at particular risk from interruption to information technology operations as this can lead […]

Australian National Security Industry Directory – January 2007

Australian national security management and protection cannot be underestimated due to the role of Australian Government. All levels of government are involved in planning and the response to any threat within our borders. Protection ranges from intelligence gathering both in Australia and overseas through to management of critical infrastructure. The Attorney General’s Department defines critical […]

Australia's Intelligence Agencies

Overview of Australia’s Intelligence Agencies ONA 2006

Australia’s intelligence agencies play a crucial role in informing the government about developments overseas and in Australia that affect Australia’s national security and international interests. They are the front line in the fight against terrorism. In order to be effective, our intelligence agencies need to protect what they know, how they operate and their sources […]

2006 Protecting Australia Against Terrorism 2006

Protecting Australia Against Terrorism 2006

The first responsibility of the Australian Government is to protect Australia, its people and interests. Five years on from the attacks of 11 S eptember 2001 on the United States, terrorism remains a serious threat to Australia. This publication updates the 2004 edition of Protecting Australia Against Terrorism and describes the Australian Government’s counter-terrorism strategy. […]

2006-eSecurity-Market-in-Victoria-Sept-MMV-2006

eSecurity Market in Victoria MMV September 2006

In recent years, eSecurity has become one of the fastest growing sub-sectors in the ICT industry, both in Victoria and around the world. For the smallest and the largest companies, eSecurity is a top priority just to stay in business. And with ever-increasing reliance on networking, convergent technologies and mobile communications, demand for eSecurity products, […]

2006 IT Security Governance – A CIO’s Guide TISN DCITA

2006 IT Security Governance – A CIO’s Guide TISN DCITA Whatever your business, security and privacy are key matters that affect your enterprise and those dependent upon you. There is a realisation, domestically and abroad, that an organisation cannot effectively achieve its corporate and IT governance objectives without high-level executive support. These issues are now […]