You are here

Cyber in Australia

Australia

Share

Cyber-attacks are increasing in frequency, variety and severity. The consequences for the unprepared can be dire.  It is essential that you start planning your cyber-response well before the first strike occurs. 

Governments worldwide, including Australia, are swiftly enacting new laws targeting cyber resiliency expectations, ransomware attacks, encryption rules and critical infrastructure. This is coupled with incoming privacy law changes and an increasing regulatory scrutiny over data use and protection. The scope of these regulatory changes affect companies across various sectors.  

We can help you navigate the complexities of cyber incidents with our leading expertise. From pre-emptive planning to crisis management, our dedicated team stands by you, offering technical insights, legal knowledge, and holistic guidance for a rapid and resilient response.

 PODCAST VIDEO ARTICLES BLOG

 

Featured content

 


 

Podcasts 

Class Actions Fireside EP21: Tips and trends – cyber class actions in Australia

In this episode, Christine Tran, Christine Wong and Brendan Donohue discuss the growing area of cyber class actions in Australia and the associated regulatory investigation risks, including current activity, challenges, areas of reform and practical tips.

 

Talking Shop: A Consumer Sector Podcast EP3: Confronting cybersecurity complexity

Cam Whittfield and Phillip Magness join Aoife Xuereb to discuss the risks and protections every board and management team needs to know in tackling cybersecurity complexity in the consumer sector.

Cam and Phillip share real-world observations on current cyber threats, the role of lawyers in incident response, engaging with threat actors and understanding cyber insurance. They underline practical and transparent approaches to people, process and technology for resilient supply chains.

For more on cybersecurity, check out our TechQuake series and how to survive the era of cyber insecurity.

 

The Future of Consumer – Asia-Pacific Predictions: Confronting complexity in cybersecurity trends for the consumer sector

Cameron Whittfield and Peggy Chow discuss the latest cybersecurity trends for consumer-facing companies including external threats which may include working with third parties and complex supply chains through to the malicious targeting of companies with ransomware, current affairs and social engineering, the cryptocurrency marketplace and geopolitical factors. They emphasise the importance of internal stakeholders speaking the same language when it comes to the intersection of technology and legal risks – and the oversight now expected of board members. The complexity of cybersecurity breach notifications and assessment is also covered in the context of differing requirements of regulators and across jurisdictions.

 


 

Videos

Class Actions Fireside EP21: Tips and trends – cyber class actions in Australia

In this episode, Christine TranChristine Wong and Brendan Donohue discuss the growing area of cyber class actions in Australia and the associated regulatory investigation risks, including current activity, challenges, areas of reform and practical tips.

Future Of Consumer APAC: Confronting complexity in cybersecurity trends for the consumer sector

Cameron Whittfield and Peggy Chow discuss the latest cybersecurity trends for consumer-facing companies including external threats which may include working with third parties and complex supply chains through to the malicious targeting of companies with ransomware, current affairs and social engineering, the cryptocurrency marketplace and geopolitical factors. They emphasise the importance of internal stakeholders speaking the same language when it comes to the intersection of technology and legal risks – and the oversight now expected of board members. The complexity of cybersecurity breach notifications and assessment is also covered in the context of differing requirements of regulators and across jurisdictions.

 


 

Articles

 


 

Blogs

Find out the latest developments on our blogs.

Cyber and Data Security Notes

Data Notes

Key Contacts