Issue 10

Page 102

KAREN STEPHENS Karen is CEO and co-founder of BCyber, an agile, innovative group that works with SMEs to protect and grow their businesses by demystifying the technical and helping them to identify and address cybersecurity and governance risks. In 2021 Karen graduated from the Tech Ready Woman Academy’s Accelerator and the Cyber Leadership Institute’s CLP programs.

C O L U M N

Improving security together Another month and another gentle (or maybe not

register serving as a single source of truth accessible

so gentle) push from the government to get our

through a single secure portal.

cybersecurity house in order. Since 8 July we have Critical Infrastructure Act 2018 (SOCI) Act.

DOES YOUR BUSINESS KNOW AND UNDERSTAND THE REPORTING TRIGGERS AND REQUIREMENTS?

This is a great opportunity to move our cybersecurity

There will be some slight variations depending upon

discussions from the “it’s a technology problem” silo

‘criticality’ and ‘sector’, but, under the SOCI Act’s

into the “let’s embed cybersecurity into the broader

requirements for cybersecurity incident reporting:

been working under the newly amended Security of

business risk program” to imagine working as one team to improve our cybersecurity.

• “If you become aware that a critical cybersecurity incident has occurred, or is occurring, AND the

Here are a few points to get the conversation started.

incident has had, or is having, ‘a significant impact’ on the availability of your asset, you must

DO YOU KNOW IF YOUR BUSINESS HAS NOW BEEN ‘CAPTURED’ BY THE SOCI ACT?

notify the Australian Cyber Security Centre (ACSC)

The definition of what constitutes critical

incident. If you make the report verbally, you must

infrastructure has been expanded. The SOCI

make a written record through the ACSC’s website

Act now places obligations on specific entities in the electricity, communications, data storage

within 12 hours after you become aware of the

within 84 hours of verbally notifying the ACSC.” • “If you become aware that a cybersecurity

or processing, financial services and markets,

incident has occurred, or is occurring, AND the

water, healthcare and medical, higher education

incident has had, is having, or is likely to have, a

and research, food and grocery, transport, space

‘relevant impact’ on your asset you must notify

technology, and defence sectors.

the ACSC within 72 hours after you become aware of the incident. If you make the report

HAVE YOUR BUSINESS PROCESSES AND PROCEDURES ACROSS ALL DEPARTMENTS BEEN UPDATED TO ENSURE REPORTING OBLIGATIONS CAN BE MET? Your reforms need to be addressed holistically rather than with the traditional siloed approach. Cybersecurity cuts across all departments: finance,

the ACSC’s website within 48 hours of verbally notifying the ACSC.”

www.linkedin.com/in/karen-stephens-bcyber

people and culture, sales, marketing, etc.

www.bcyber.com.au

DOES YOUR BUSINESS KNOW WHERE TO START?

karen@bcyber.com.au

As businesses look to incorporating changes to their

twitter.com/bcyber2

risk management programs, a logical place to start may be IT asset management with the key asset

102

verbally, you must make a written record through

W O M E N I N S E C U R I T Y M A G A Z I N E

youtube.bcyber.com.au/2mux

S E P T E M B E R • O C T O B E R 2022


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Lessons from the AWSN Leader Forums

3min
pages 116-117

your compass

2min
pages 114-115

The evolution of CREST

3min
pages 112-113

A camel is a horse designed by committee: achieving genuine collaboration in cybersecurity

6min
pages 104-107

Bayanihan for International Women’s Day

4min
pages 96-97

Improving security together

2min
pages 102-103

Talking privacy

6min
pages 92-95

Entering the cyber world at a more mature age

14min
pages 80-87

Transposing consumer partnerships from the bedside to the client meeting

4min
pages 78-79

Every voice deserves to be heard

15min
pages 72-77

Relationships: essential for career success

6min
pages 68-71

How do we attract women into cybersecurity, and retain them?

7min
pages 64-67

Should you take your teen’s device as punishment?

22min
pages 60-63

working parents

7min
pages 56-59

The education question

3min
pages 54-55

Cybersecurity: it’s a hybrid team sport

4min
pages 52-53

We are all just bricks

2min
pages 46-47

Aicha Bouichou

3min
pages 44-45

Parul Mittal

11min
pages 38-43

Sarah Box

5min
pages 36-37

Angela Hall

3min
pages 20-21

Monica Zhu

7min
pages 30-33

Aastha Sahni

4min
pages 22-23

Sarah Gilbert

5min
pages 34-35

Pooja Shimpi

7min
pages 26-29

to fighting cybercrime

1min
pages 14-15

Gabe Marzano

3min
pages 24-25

Aparna Sundararajan

7min
pages 16-19
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.