IT Security Governance – a CIOs Guide TISN 2006

Whatever your business, IT security and privacy are key matters that affect your enterprise and those dependent upon you. There is a realisation, domestically and abroad, that an organisation cannot effectively achieve its corporate and IT governance objectives without high-level executive support. These issues are now reaching boardroom agendas via an increasing awareness that a […]

2007 Information Security for Enterprise Architecture – TISN DCITA

Report :   2007 Information Security for Enterprise Architecture – TISN DCITA Rapid development in information and communication technologies and the changing business environment present a range of challenges for organisations that rely on such technologies for day-to-day operations. Critical infrastructure sectors are at particular risk from interruption to information technology operations as this can lead […]

2006 IT Security Governance – A CIO’s Guide TISN DCITA

2006 IT Security Governance – A CIO’s Guide TISN DCITA Whatever your business, security and privacy are key matters that affect your enterprise and those dependent upon you. There is a realisation, domestically and abroad, that an organisation cannot effectively achieve its corporate and IT governance objectives without high-level executive support. These issues are now […]

2006 Leading Practices For Enterprise Security Governance TISN DCITA

2006 Leading Practices For Enterprise Security Governance TISN DCITA Corporate Governance is top of mind in boardrooms across Australia. It is now widely understood that effective corporate governance is required to protect the interest of an organisation’s stakeholders, which in turn protects Australia’s economic and social interests. Information Technology (IT) governance is a relatively new […]

2006 Managing Denial of Service Attacks TISN DCITA

2006 Managing Denial of Service Attacks TISN DCITA With the advance of information and communication technologies, our societies are evolving into global information societies with a ubiquitous computing environment that has made cyber attacks significantly more sophisticated and threatening. One type of cyber attack that is becoming more prevalent today is that known as a […]