- Slides: 15
Managing IT Risk in Papua New Guinea Brendan Merry Manager, Pacific Islands
Agenda (don’t worry it isn’t long) • Opportunities • Challenges and Managing IT Risk • The Way Forward - Start The Conversations
Opportunities Arising From Coral Sea Cable System • Access to technology solutions and service providers • Affordable access to reliable, high-speed broadband • Opportunity to advance and lead • Growth potential, domestic and international • Macro and Micro Improvements BUT! Proceed with caution. Each has unique risks to manage
Challenges: Managing IT Risk
The Macro: National Foundational Security Elements • National Information & Communications Technology Authority (2010) • Cybercrime Policy (2014) • Cybercrime Code Act (2016) • PNGCERT (2018) • National Cyber Security Centre (2018)
The Micro: Business As Unusual • Compliance with National and International laws such as GDPR • Corporate Responsibility to securely manage data • Individual Responsibility to “own” their data • Cyber Awareness, Education, and Assessments • Address Confidentiality, Integrity, and Availability
Challenges: Managing IT Risk • Improved connectivity = Increased exposure • Privacy is a concern. Your data becomes more valuable • Progress must be approached securely • Apply Controls without undue hindrance Avoid Complexity Too Many Layers Lack Of Integration Inadequate Visibility Human Error
The Way Forward: Secure Solutions To Manage IT Risk
The Way Forward • Risk = Business Responsibility; not just an IT responsibility • Engage in Strategic Security Partnerships from the beginning • Establish an Information Security Management System (ISMS) • Privacy is Mandatory, not Optional: Make It Policy at all levels. • Build a globally competitive cyber-enabled workforce • Avoid Complexity: Simplicity is the ultimate sophistication!
Security 2. 0 - Data#3 Security Framework Cybersecurity Consulting Services Security Solutions Business Continuity Managed Services Testing and Assessments Remediations Services Asset Management Governance, Risk and Compliance Vulnerability & Risk Assessment Penetration Testing Threat Mitigation Strategies Security Strategy & Policy Infrastructure and Endpoint Security Response Planning Identity & Access Management Forensic Services Security Awareness Incident Response User Entity and Behavioral Analytics Security Intelligence Event Correlation and Anomaly Detection Data Security & Privacy Cloud Security
Let’s Connect and Continue The Conversation…. .
Thank You For Your Time! www. data 3. com. au 1300 23 28 23 Linkedin. com/company/data 3 Twitter. com/data 3 limited Facebook. com/data 3 limited You. Tube. com/data 3 limited