Cyber Security Practitioner

Volume: 3 Issue: 10
(October 2017)


The Attorney-General’s Department of the Australian Government published its draft Security of Critical Infrastructure Bill for consultation on 10 October 2017, which, if implemented in its current state, would increase Government oversight of ‘critical infrastructure assets,’ introduce obligations for entities responsible for critical infrastructure assets to give information and report on ‘notifiable events’ relating to such assets, and implement a ‘last resort’ ministerial directions power that would give the relevant Minister the authority to direct specific risk mitigation actions, where significant risks are present and where all other risk management avenues have been exhausted. / read more


The long awaited trial for supermarket company Morrisons is now underway, which will resolve whether and to what extent an employer should be held vicariously liable for a personal data breach committed by an employee. / read more

As the dust starts to settle on the Equifax data breach, in which nearly half of the US population’s personal data was potentially compromised, Margaret Reetz and Gregory Mantych, of Mendes & Mount LLP, provide their analysis of the breach and the wide-ranging impact. / read more

The UK Government’s public consultation on the European Directive on the Security of Network and Information Systems (the ‘NIS Directive’), which sought responses on its proposal to appoint multiple sector-specific competent authorities to regulate and audit essential services, closed on 30 September 2017. Meanwhile the coming into force of the General Data Protection Regulation (the ‘GDPR’) looms ever closer. William Richmond-Coggan, Partner at Pitmans LLP, assesses the potential crossover between these two pieces of legislation, and the problems businesses could face as a result. / read more

During London International Shipping Week 2017, the UK Government launched the ‘Cyber Security Code of Practice for Ships’ (the ‘2017 Code’). The 2017 Code presents a framework and a series of steps which it recommends those operating in the maritime industry take to make the industry more resistant to cyber attacks and more attuned to cyber security threats. Nick Shaw and Christian Ayerst, of Reed Smith, provide a breakdown of the 2017 Code and shed some light on the cyber security vulnerabilities unique to the shipping industry. / read more

On 22 August 2017, the hacking group Fancy Bears published information claiming to reveal the details of more than 150 football players who had failed doping tests in 2015 (a number it claims rose to 200 in 2016) together with confirmation that 25 players were given exemptions to take banned medicines during the 2010 World Cup. Fancy Bears also published information about ongoing investigations into several players, documentation from the World Anti-Doping Agency (‘WADA’) and emails between the Football Association (‘FA’), the Fédération Internationale de Football Association (‘FIFA’) and doping officials. Looking ahead to the approaching 2018 World Cup in Russia, Paul Glass and Michael Yates of Taylor Wessing detail the wide-ranging cyber risks facing major international sporting events. / read more

Stuart Poole-Robb, CEO of KCS Group Europe, a leading provider of security and intelligence services, shares his views on the development of quantum cryptography in China and explains that despite the theoretically ‘unhackable’ nature of the new communications network being developed, which is based on the principles of quantum cryptography, human fallibility will always be a threat to cyber security however advanced the march of technology. / read more

On 7 August 2017, Illinois Governor Bruce Rauner signed into law House Bill 2371, which requires that all executive State of Illinois employees responsible to the Governor undergo annual cyber security training to understand the risks, threats, and best practices to defend against cyber threats. By enacting this legislation, Illinois became the 15th state to adopt mandatory cyber security training for state employees. Cynthia Motley and Carol Gerner, of Sedgwick LLP, provide insight into House Bill 2371 and Illinois’ approach to cyber security legislation compared with other states, as Illinois seeks to establish itself as a ‘Smart State.’ / read more

About Cyber Security Practitioner:

Cyber Security Practitioner, the most recently launched monthly publication from Cecile Park Media, provides a multi-disciplinary view on the cyber security challenges facing global businesses and delivers insight into operational change. It covers cyber security regulation, data breach, data security, cyber risk, cyber crime, ethical hacking, privacy and data protection, cyber infrastructure, technical solutions, risk management, information assurance, security standards, liability, consumer protection, ransomware and other cyber threats, cyber insurance... /read more

Search Publication Archives

Our publication archives contain all of our articles.
Can’t find what you are looking for?
Try an Advanced Search

Log in to cyber security practitioner
Subscribe to cyber security practitioner
Register for a Free Trial to cyber security practitioner
cyber security practitioner Pricing

Social Media

Follow cyber security practitioner on TwitterView cyber security practitioner LinkedIn Profilecyber security practitioner RSS Feed