Search within results
Categories
[Clear]
16
1
More
Less
Publication month
[Clear]
4
3
3
3
1
1
1
1
More
Less
Publication year
[Clear]
17
More
Less
Tags
[Clear]
17
More
Less
Sort by
  • Whether you have started your journey or you are an experienced risk and compliance practitioner, this checklist is designed to help you navigate international compliance standards and assist in mitigating your compliance risk.
  • Location data is so rich and revealing of patterns of movement and behaviour that it can oftentimes at least individuate, if not also lead to the identification of, individuals.
  • Following recent changes to the Anti Money Laundering and Counter Terrorism Financing Act, AUSTRAC has released proposed updates to its AML/CTF Rules.
  • Cyber security continues to be a national challenge for Australia. One in three Australians are now impacted by Cyber security breaches, with a new crime reported every 10 minutes. The traditional scams, ransoms and other threats are becoming increasingly sophisticated, and the difficulty in defending against them is compounded by the emergence of a host of new and diversified attack types.
  • Adopting new technology has risks. Not adopting new technology has risks. How are you balancing them? This is a question that Governance professionals in Australia and around the world are grappling with, and one we provide new perspectives on in our new whitepaper, ‘How technology is rewriting the risk management landscape, and how to govern the new opportunities and risks presented’.
  • This special report focuses on the worldwide shockwaves that Australia is causing as it charts an experimental course in policing Big Tech. Its landmark 2019 Digital Platforms Inquiry is filtering through to government policy, lawsuits and a new can-do attitude to regulating the likes of Google and Facebook.
  • In April 2021, Dudley Kneller, Partner at Gadens and Legal Expert for LexisNexis Regulatory Compliance, presented a webinar on ransomware. During this webinar, he defined ransomware, presented real-life examples of ransomware attacks to businesses and explained how organisations are managing this cybersecurity threat. We are pleased to present to the companion whitepaper on the same topic. This paper explores the themes covered in the webinar, provides you with various options on how to respond to a ransomware request for payment and more.