Cybersecurity Preparedness and Response for Local Government
Tuesday, 26 – Wednesday, 27 September 2023 | 10:00 AM – 2:30 PM AEST | Online
Training Overview
Defending Local Government’s security frontline for cyber battle readiness
Cyber security and the protection of data are a priority across all levels of government. As Australian organisations’ proactively try to remain ahead of network breaches and threats from bad actors, employing the latest methods of device and data protection has become essential. Implementing the latest technology and protecting endpoint devices is paramount to the protection of public data entrusted to government organisations.
As cyber threats evolve, so do the methods employed to respond and react to them. Implementing tools to counter threats, while informing a reticent workforce, has become one of the biggest challenges to date. Constant system monitoring and consistent communication with personnel to inform them of upgrades, ensures everyone works together to keep information secure.
Through an innovative mix of lecture-style presentations, interactive group exercises and expert feedback, participants will learn how to develop the most suitable cyber security approach for their local government area.
Who Should Attend
This course is designed for leaders in charge of transforming local government including:
IT Managers & Administrators
and Information Security Officers
Cybersecurity Managers, Analysts or Engineers
Risk Management or Specialists and Network Administrators
Learning Outcomes
Understand the issues/challenges faced by Local Government
Develop your cyber security approach using the PPTT (Policy, Process, Technology and Training) approach
How to use the FASS (Feasible, Achievable, Suitable, Sustainable) formula to assess
Put theory into action to translate technical impacts to business impacts
Meet Your Facilitator
PHILIP WAGNER
Principal Cyber Security Specialist and Educator
G.P.Wagner Pty.Ltd
Philip Wagner is a cyber security, leadership educator, trainer, executive coach and project/program manager, with extensive leadership and project management expertise in both civilian and military environments. He has advised and trained in a wide range of industries from banking and finance, education and training, technology and government at federal and state levels.
His most recent roles were as the Director Cyber Security and Deputy Chief Information Security Officer with the National Disability Insurance Agency and as a Senior Project Manager for a major Australian Health provider in developing their Cyber program.
Key Sessions
- Introduction and Challenges for Local Government
- How did we get here
- What do you believe are the biggest cyber and IT challenges to your Local Government Area
- What is the state of your current cyber measures
- What the State Auditor Generals are saying (Reference: Audit Reports)
- Discussion / Activity: Your top 3 cyber issues / challenges
- Setting up the Foundations
- Translating how a cyber-attack can affect business and workflow – real case example
- Achieving the balance – The FASS Approach to Cyber Security
- The 6 required areas of cyber security
- The PPTT approach: Policy, Process, Technology, Training
- Compliance requirements
- Setting up the Foundations
- ACTIVITY: Practical activity (including discussion) This session focuses on participants developing their Cyber Security policy approach
- Developing your Local Government Policy Approach
- Developing your processes
- Assessing your Technology
- Develop your Cyber security approaches
- Assess through FASS
- Review of Module 2
- ACTIVITY / DISCUSSION: This session reviews and discusses learnings from Module 2
- What have we learned?
- What are the key 3-5 actions that need to be taken?
- Next steps: What is the priority of effort
- The People Element in Cyber for Local Government
- Communicating cyber risk in a meaningful way within Local Government
- Identifying Key Stakeholders
- Creating and building the connections and partnerships required to implement your cyber security approach
- Communicating the People Element in Cyber for Local Government
- Who are our key stakeholders? (From Module 3)
- Councillors, Executive, Staff, Community
- What are their information requirements
- Consideration of communication approaches
- What works in your Local Government Area
- Who are our key stakeholders? (From Module 3)
- Compliance and Regulation
- Unlock the power of data storytelling to engage stakeholders and drive better decisions
- Leverage comprehensive analysis to inform and optimize team performance
- Boost your confidence and impact in presenting data-driven reports
- Putting together and Implementing the Cyber Security Jigsaw Puzzle
- ACTIVITY / DISCUSSION: This interactive session goes through the steps required to put together your cyber security plan and approach including:
- Review of your Plan from Module 2
- Governance and Oversight
- Resourcing
- To outsource or not to outsource
- Risks, mitigations and treatments
- Communication with stakeholders
- Training of staff
- ACTIVITY / DISCUSSION: This interactive session goes through the steps required to put together your cyber security plan and approach including: