Session 3.7e Tutorial continued
Tracks
Thursday, November 14, 2024 |
4:00 PM - 5:00 PM |
Sutherland Theatre |
Details
In the Defence sector, the integrity, security, and governance of data are critical for safeguarding sensitive information and ensuring market competitiveness. This is particularly crucial for major programs such as AUKUS and GWEO, where the ability of Defence suppliers to securely manage sensitive data is becoming a key selection criterion. Proper data management is also a significant compliance requirement under various Defence-related regulations and standards, such as CMMC, DISP, DSPF, and ITAR. Despite the emphasis by governments and prime contractors on the need for cyber improvements, the actual adoption of data security and governance practices in the Defence industrial base remains poor.
Our course, "Developing Defence Relevant - Data Governance and Classification Scheme for Your Organisation," is specifically designed to address these critical needs. This instructor-led training equips participants with the essential skills to create and implement robust data governance frameworks and classification schemes tailored to Defence organizations.
This course has already been successfully delivered as part of the Defence-backed Defence Ready Seminar Series, helping nearly 100 aspiring Defence companies uplift their data governance practices.
Course Outline:
- What is Information Security and Why is it Important?
- What is the Data Classification Process?
- What is Security Governance?
- Types of Data in Defence
- Data Classification from a Defence Supplier’s Perspective
- Defence-Relevant Classifications
- Exercise 1 – Map Sensitive Data to Its Classification
- Exercise 2 – Develop a Data Classification Scheme for Your Organisation
- Exercise 3 – Develop a Data Asset Register for Your Organisation
Speaker
Mr Rizwan Mahmood
Cto & Founder
GuardWare
ㅤ
Biography
Rizwan has a passion for solving data governance challenges and mitigating human risk to data security. He has spent the last 15 years consulting on data governance and addressing factors that lead to data loss and privacy breaches, including in the Defence sector. Due to his extensive experience in data management and Defence, he was selected as the cyber and data security trainer for the Australian Defence-backed Defence Ready training courses. These courses aim to help aspiring companies enter the Defence market and cover over 100 SMEs in Australia.
With his expertise in user and data monitoring security tools, Rizwan has experience in detecting and responding to hundreds of insider threat cases involving corruption, insider trading, reputational damage, theft for personal gain, and accidental loss. Many of these cases were detected within the Australian Defence Supply Chain and have become part of the OAIC’s statistics.