1-10 of 13 results
Guide to AI Procurement
As generative artificial intelligence moves from pilot to production, organisations are grappling with the push to rapidly procure AI tools while appropriately managing the risks. ...
Strategic liquidity
This webinar delves into secondary sales for startups and investors, with a focus on: the purpose and structure of, and key considerations when facilitating, company or shareholder-led secondary sale transactions; and GP-led secondaries, with an explanation of the role of continuation funds in providing liquidity to investors in existing funds, and allowing sponsors, existing investors and new investors to gain from continued upside. ...
Why organisations must embed mental health and wellbeing support into cyber incident response planning
Mental health and wellbeing support for cyber professionals, incident response teams and staff targeted in cyber incidents, is now essential to cyber risk management and incident response planning. ...
Why everyone is talking about AI safety and cybersecurity
The Australian Signals Directorate, together with 19 other global partners, published Guidelines for secure AI system development. We've distilled the themes emerging from these latest developments and the top 9 steps organisations should take to address AI security risks. ...
Balancing act: establishing and preserving legal professional privilege in a cyber incident
This guide has been designed to assist companies incorporate legal professional privilege preservation measures into their cyber readiness activities. ...
Are data breaches a money laundering and terrorism financing risk?
The Australian Transaction Reports and Analysis Centre has published new guidance recommending that reporting entities assess the potential impact of data breaches on the money laundering and terrorism financing risks they face. In this Insight, we explain the new guidance and what it means. ...
Federal Government signals broad support for significant Privacy Act reforms
The Federal Government has agreed or agreed in-principle with the majority of the proposals outlined in the Privacy Act Review Report. ...
A step-by-step guide to assessing compromised data after a cyber incident
This guide is designed to help you address compromised data after a cyber incident, and includes 11 key steps that cover what to do before, and after, an incident. ...
Generative AI in practice: a guide for in-house legal teams
In-house legal teams are uniquely placed to be early adopters and champions of AI. We've designed a guide to help you and your team assess and deploy generative AI across the legal function. ...
Why every company should have a structured cyber simulation program
The single most determinative factor in how an organisation emerges from a cyberattack is how it conducts itself during the crisis. And the biggest determinant of how an organisation conducts itself during a crisis is how prepared it is. Here are five tips to keep in mind. ...