Critical Infrastructure
July 31, 2023
November 18, 2024

Information Protection and Privacy: Doing Just Enough is No Longer Good Enough

As universities face growing legislative changes and increasing cyber threats, the challenge is clear: how can they better protect their information and reduce their vulnerability to breaches?

Information Protection and Privacy: Doing Just Enough is No Longer Good Enough

Interview multiple candidates

Lorem ipsum dolor sit amet, consectetur adipiscing elit proin mi pellentesque  lorem turpis feugiat non sed sed sed aliquam lectus sodales gravida turpis maassa odio faucibus accumsan turpis nulla tellus purus ut   cursus lorem  in pellentesque risus turpis eget quam eu nunc sed diam.

Search for the right experience

Lorem ipsum dolor sit amet, consectetur adipiscing elit proin mi pellentesque  lorem turpis feugiat non sed sed sed aliquam lectus sodales gravida turpis maassa odio.

  1. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
  2. Porttitor nibh est vulputate vitae sem vitae.
  3. Netus vestibulum dignissim scelerisque vitae.
  4. Amet tellus nisl risus lorem vulputate velit eget.

Ask for past work examples & results

Lorem ipsum dolor sit amet, consectetur adipiscing elit consectetur in proin mattis enim posuere maecenas non magna mauris, feugiat montes, porttitor eget nulla id id.

  • Lorem ipsum dolor sit amet, consectetur adipiscing elit.
  • Netus vestibulum dignissim scelerisque vitae.
  • Porttitor nibh est vulputate vitae sem vitae.
  • Amet tellus nisl risus lorem vulputate velit eget.
Vet candidates & ask for past references before hiring

Lorem ipsum dolor sit amet, consectetur adipiscing elit ut suspendisse convallis enim tincidunt nunc condimentum facilisi accumsan tempor donec dolor malesuada vestibulum in sed sed morbi accumsan tristique turpis vivamus non velit euismod.

“Lorem ipsum dolor sit amet, consectetur adipiscing elit nunc gravida purus urna, ipsum eu morbi in enim”
Once you hire them, give them access for all tools & resources for success

Lorem ipsum dolor sit amet, consectetur adipiscing elit ut suspendisse convallis enim tincidunt nunc condimentum facilisi accumsan tempor donec dolor malesuada vestibulum in sed sed morbi accumsan tristique turpis vivamus non velit euismod.

Australian universities and vocational education and training (VET) institutions – and their counterparts around the world – have always been hubs of information sharing and collaboration. Free flow of information is essential for knowledge generation and research, making these organisations trusted custodians. But the Higher Education sector has become a prime target for data breaches and cyberattacks because of an abundance of personal, sensitive and intellectual property information combined with budgetary pressures and stretched resources.  At the same time, legislation around privacy and information protection is changing and growing exponentially, while the window of leniency around data breaches is closing.

Universities not only have to keep pace with the changes in legislation and manage change fatigue, but also reduce their threat surface in the event of a breach.  They need to do more to protect their information than they have ever done before. The question is, how?

In our webinar with CAUDIT, Gabrielle Ingram, Head of Information Management and Solutions at Griffith University and Rachael Greaves, CEO of Castlepoint Systems explored how changing legislation will impact universities and some of the ways Higher Education institutions can remain compliant and safe without grappling with what regulations apply to what information. The webinar contains valuable insights on leveraging AI to discover information, including dark data, across all systems and take a proactive approach to retention, disposition and security management to mitigate the impact of any breaches.

You can view the recording here