Government Guidelines
Learn how AI is powering scams to another level – enabling scammers to create convincing and highly targeted attacks at unprecedented scale and speed.
All Government Guidelines 37 Results
The Victorian Protective Data Security Standards (VPDSS), provide a comprehensive framework for Victorian Public Sector (VPS) organisations to safeguard their data and information assets.
The Privacy and Data Protection Act 2014 (PDP Act) is the primary legislation governing privacy and data protection in Victoria. The Act establishes 10 Information Privacy Principles that outline how Victorian Public Sector (VPS) organisations must handle personal information.
Learn how to identify and explain the 10 Personal Information Protection Principles and demonstrate how to comply with the Personal Information Protection Act (PIP Act)
The Queensland Information Privacy Act (IP Act) is the primary legislation that regulates how personal information is handled by Queensland public sector agencies.
By understanding how to respond to security incidents, staff will be protecting the organisation, computer network, systems, people, information, assets and themselves from any malicious attempts.
As systems advance, it becomes increasingly difficult to add effective security layers. Secure by Design embeds security from the start to minimise risk and vulnerabilities. Staff will gain an understanding of the Secure by Design process and be empowered to incorporate cyber resilience into new and existing systems.
Drawing from ASIO guidelines and government resources, this course aims to equip researchers with knowledge and practical skills to identify, mitigate, and report foreign interference risks.
Ensure your staff understand and are aware of their responsibility of having access to removable media devices, ultimately protecting the organisation and themselves.
Ensure staff with PAM understand their security obligations.
Hackers want credit card data to be able to use the card, impersonate the cardholder, or even steal the cardholder's identity to commit other crimes in their name. This course highlights the importance of PCI DSS and provide guidelines on how to protect cardholder information.
Hackers want credit card data to be able to use the card, impersonate the cardholder, or even steal the cardholder's identity to commit other crimes in their name. This course highlights the importance of PCI DSS and provide guidelines on how to protect cardholder information.
The NSW Privacy and Personal Information Protection Act 1998 (PPIP Act) outlines how NSW public sector agencies manage personal information. Demonstrate compliance with the PPIP Act and identify the risks of non-compliance.
Sort by