what's new?
cloud risk analysis
The third eBook in the ‘Essentials for Australian Businesses’ guidelines series is now available.
As a busy professional you need to make the right choice, by ensuring your cloud service providers meet stringent Privacy, Security and Safety demands.
Fillable checklists and risk analysis spreadsheets are supplied PLUS key questions and case study examples to ensure you are fully equipped in determining: WHAT you need to know + HOW to achieve successful cloud adoption?
click for a PDF copy....
privacy risk analysis
The second eBook in the ‘Essentials for Australian Businesses’ guidelines series, informs you on how to undertake a Privacy Impact Assessment (PIA).
Follow the step-by-step process for generating strategies to mitigate security risks and privacy impacts of your IT projects. Use the supplied fillable checklists, risk analysis spreadsheets and example case study, to determine: WHO this applies to + WHAT information you need + HOW to achieve a legally compliant PIA report?
click for a PDF copy....
privacy policy essentials
The original eBook in the ‘Essentials for Australian Businesses’ guidelines series, providing everything you need to create or update your Privacy Policy.
Use the supplied questionnaires, fillable templates and checklists PLUS a range of example Privacy Policies, to
determine: WHO this applies to + WHAT information you need + HOW to create a legally compliant Privacy Policy?
click for a PDF copy....
professional services providing reports and analysis that are tailor-made to ensure you are offering the safest, trustworthy ICT solutions to meet your customer needs
risk analysis
cloud adoption
policy writing
a risk analysis report will ensure your ICT solution will minimise risks of potential harm to your business, your customers and the wider community
a tailored report informing you of the best solution when selecting your cloud service provider
company policies generated to meet your specific business needs for privacy, cyber-security and risk minimisation
audits
research proposals
academia
audits of cyber-security and privacy providing peace of mind and assurance of best working practice
our extensive track record of research funding and publication will ensure your industry-lead research projects succeed
professorships in IT, head of department and directorships of research provides assurance for all your curriculum development, assessment and appraisal
FIND OUT MORE ->
track record
a range of workshops and bespoke presentations with supportive pragmatic materials
deriving information privacy protection and policies - introductory level workshop based on the Australian Privacy Principles
undertaking a Privacy Impact Assessment (PIA) - intermediate level workshop - outlining the step-by-step approach to privacy risk analysis
establishing dependable privacy and security in the cloud - intermediate level workshop - the detailed steps for determining suitable cloud service providers
Bespoke
protecting health information - privacy, security and safety - intermediate to advanced workshop
determining robust cyber-security measures - intermediate to advanced workshop - risk based approach
tailored workshops to suit your specific business needs from introductory to advanced on topical ICT concerns
Providing the right balance – a holistic approach
to developing safe health ICT solutions
Privacy Assessment of Health Information – a guide
to analysis and documentation for legal compliance