Cybersecurity Preparedness and Response for Local Government

Tuesday, 26 – Wednesday, 27 September 2023 | 10:00 AM – 2:30 PM AEST | Online

Training Overview

Defending Local Government’s security frontline for cyber battle readiness

Cyber security and the protection of data are a priority across all levels of government. As Australian organisations’ proactively try to remain ahead of network breaches and threats from bad actors, employing the latest methods of device and data protection has become essential. Implementing the latest technology and protecting endpoint devices is paramount to the protection of public data entrusted to government organisations.

As cyber threats evolve, so do the methods employed to respond and react to them. Implementing tools to counter threats, while informing a reticent workforce, has become one of the biggest challenges to date. Constant system monitoring and consistent communication with personnel to inform them of upgrades, ensures everyone works together to keep information secure.

Through an innovative mix of lecture-style presentations, interactive group exercises and expert feedback, participants will learn how to develop the most suitable cyber security approach for their local government area.

Who Should Attend

This course is designed for leaders in charge of transforming local government including:

IT Managers & Administrators
and Information Security Officers

Cybersecurity Managers, Analysts or Engineers

Risk Management or Specialists and Network Administrators

Learning Outcomes

Understand the issues/challenges faced by Local Government

Develop your cyber security approach using the PPTT (Policy, Process, Technology and Training) approach

How to use the FASS (Feasible, Achievable, Suitable, Sustainable) formula to assess

Put theory into action to translate technical impacts to business impacts

Meet Your Facilitator


PHILIP WAGNER
Principal Cyber Security Specialist and Educator
G.P.Wagner Pty.Ltd

Philip Wagner is a cyber security, leadership educator, trainer, executive coach and project/program manager, with extensive leadership and project management expertise in both civilian and military environments. He has advised and trained in a wide range of industries from banking and finance, education and training, technology and government at federal and state levels.

His most recent roles were as the Director Cyber Security and Deputy Chief Information Security Officer with the National Disability Insurance Agency and as a Senior Project Manager for a major Australian Health provider in developing their Cyber program.

Key Sessions

Day 1: Module 1Day 1: Module 2Day 1: Module 3Day 1: Module 4Day 2: Module 5Day 2: Module 6
  • Introduction and Challenges for Local Government
    • How did we get here
    • What do you believe are the biggest cyber and IT challenges to your Local Government Area
    • What is the state of your current cyber measures
    • What the State Auditor Generals are saying (Reference: Audit Reports)
    • Discussion / Activity: Your top 3 cyber issues / challenges
  • Setting up the Foundations
    • Translating how a cyber-attack can affect business and workflow – real case example
    • Achieving the balance – The FASS Approach to Cyber Security
    • The 6 required areas of cyber security
    • The PPTT approach: Policy, Process, Technology, Training
    • Compliance requirements
  • Setting up the Foundations
    • ACTIVITY: Practical activity (including discussion) This session focuses on participants developing their Cyber Security policy approach
    • Developing your Local Government Policy Approach
    • Developing your processes
    • Assessing your Technology
    • Develop your Cyber security approaches
    • Assess through FASS

  • Review of Module 2
    • ACTIVITY / DISCUSSION: This session reviews and discusses learnings from Module 2
    • What have we learned?
    • What are the key 3-5 actions that need to be taken?
    • Next steps: What is the priority of effort
  • The People Element in Cyber for Local Government
    • Communicating cyber risk in a meaningful way within Local Government
    • Identifying Key Stakeholders
    • Creating and building the connections and partnerships required to implement your cyber security approach
  • Communicating the People Element in Cyber for Local Government
    • Who are our key stakeholders? (From Module 3)
      • Councillors, Executive, Staff, Community
    • What are their information requirements
    • Consideration of communication approaches
      • What works in your Local Government Area
  • Compliance and Regulation
    • Unlock the power of data storytelling to engage stakeholders and drive better decisions
    • Leverage comprehensive analysis to inform and optimize team performance
    • Boost your confidence and impact in presenting data-driven reports
  • Putting together and Implementing the Cyber Security Jigsaw Puzzle
    • ACTIVITY / DISCUSSION: This interactive session goes through the steps required to put together your cyber security plan and approach including:
      • Review of your Plan from Module 2
      • Governance and Oversight
      • Resourcing
      • To outsource or not to outsource
      • Risks, mitigations and treatments
      • Communication with stakeholders
      • Training of staff

Registration

Final Price

$1195

per person + GST

Customised in-house options available for teams

Interested in any of our online trainings?

You can also choose to have them delivered in house. We will work closely with our inspiring session facilitators to tailor the content around the key development areas your team are prioritising, shape the learning outcomes around your core departmental challenges and make the most of your L&D and upskilling budget.

Interested In Learning More?

The Cyber Security & Risk Management Community provides a hub for public sector professionals from around the globe to learn, network, collaborate, benchmark, and share best practices with their peers. Become a member today for free and gain access to:

  • Live chats and digital forums
  • Global content library
  • Priority event registration
  • Networking opportunities with peers
  • Complimentary access to exclusive events and insights