< Back to results

Information Security Leadership for Government

Defence Industry  /   Public Sector  /   Technology  /   Digital  /   Strategy  /   Governance  /   AI
This course teaches you how to implement the ASD Information Security Manual (ISM), understand its requirements, and align it with international cybersecurity frameworks, while building skills to lead ISM strategy in government and Defence contexts.
Next Dates
3 Aug
View more dates
Duration
5 days
Delivery mode
In-person
Location
UNSW Canberra City
Price (AUD inc. GST)
$4,900
Spots remaining
AVAILABLE
Adobe stock engineering 3

Course summary

Commanding the ISM landscape

This course introduces major global cyber security and privacy frameworks and shows how they align with the Australian Signals Directorate’s Information Security Manual (ISM). You’ll examine the ISM’s four-stage process, key control areas and how to plan for and respond to breaches. The course also covers essential ethical and regulatory requirements and prepares you to work effectively with cyber security teams in government and Defence environments.

Who will benefit

  • Experienced leaders new to cyber security leadership.
  • New and experienced leaders within the Australian government.
  • IT professionals seeking an introduction to cyber security strategic leadership.
  • Defence or government personnel, or people who work closely with Defence or government.

Course is suitable for

  • The course is designed for beginners and has no prerequisites

Delivered by experts

2023-03-Matt-OKane
Matt O'Kane
Facilitator
  • Matt O'Kane is Director of Notion Digital Forensics in Sydney. Notion provides digital forensics and cyber-security services to legal professionals, businesses and individuals throughout the world. 
  • Matt draws on his experience in detailed investigation of cyber incidents to show you common pitfalls to avoid. 
  • Using his experience, Matt has trained cyber forces and cyber professionals throughout South East Asia using the latest material from real cases.

About the course

Rule the cyber frameworks

Implementing the Australian Signals Directorate (ASD) Information Security Manual (ISM) is a vital part of cyber security responsibility for all people working with the federal government. Understanding the regulatory requirements and best practice implementation of the ISM can be challenging for leaders. This course equips you to confidently lead the strategic direction and implementation of the ISM within your department or organisation.

In this course, you will explore the key international cyber security and privacy frameworks and how they align with the ASD’s Information Security Manual (ISM). You’ll learn practical strategies for implementing ISM processes and controls, and develop the skills to effectively work with cyber security teams across Australian Government and Defence environments.

Why enrol in this course

Lead with confidence in cyber security strategy

Develop the skills and strategic understanding needed to lead information security management in government and Defence settings.

Understand critical frameworks

Gain clarity on how major international cyber and privacy frameworks (ISO, NIST) relate to Australia’s Information Security Manual (ISM).

Expert guidance from industry professionals

Learn from experienced facilitators with real-world cyber security leadership backgrounds.

Practical leadership knowledge

Develop actionable approaches to implement ISM controls, managing cyber security teams, and respond to breaches across organisational environments.

Key features

Shield lock icon
Government and Defence relevance

Focus content on information security leadership tailored to Australian government and Defence organisations, including regulatory and ethical considerations.

Laptop shield icon
Strategic and practical frameworks

Explore major cyber security and privacy frameworks and learn how to apply the Australian Signals Directorate’s ISM process across four key stages of implementation.

Presentation audience icon
Leadership skills development

Build high-level leadership capabilities in managing teams, interacting with cyber specialists, and planning for cyber breaches in complex organisational contexts.

Learning outcomes

Strategic cyber deference essentials

By the end of this course, you’ll understand how major cyber security and privacy frameworks align with the ASD ISM and how to implement the ISM across its full lifecycle — from defining systems to selecting, applying, and assessing controls.

You’ll develop strategic insight into ISM’s core principles, its role in risk management and how it reduces breach exposure while shaping ethical and regulatory responsibilities.

You’ll also learn how ISM interacts with the NIST Privacy Framework and gain awareness of effective team structures and approaches to building and retaining high-performing cyber teams.

What you'll learn

On completion of this course, you will gain the skills to implement the ASD ISM across its full lifecycle align it with major cyber security and privacy frameworks and apply strategic principles to reduce risk and breach impact.

You will also develop the knowledge to lead cyber teams effectively, understand ethical and regulatory responsibilities and integrate ISM practices with organisational risk management.

Topics covered

On completion of this course, you will: 

  • Understand the major cyber security and privacy frameworks, when they are used, and how they relate to the ASD ISM. 
  • Understand the implementation process of the ASD ISM including: defining the system, selecting controls, implementing controls, assessing controls, authorising the system. 
  • Understand how implementation of ISM applies to the risk management framework approach.
  • Identify and describe the four principals of ISM (govern, protect, detect, respond) from a strategic level.
  • Recognise, at a strategic level, how ISM reduces breach opportunities and the damage caused by breaches.
  • Know the ethical and regulatory responsibilities ISM places on places and participants. 
  • Understand the interaction between the ASD’s ISM and the NIST PRIVACY frameworks and how each apply. 
  • Understand different team structures and the various approaches to building teams and retaining people.

Course delivery

Format

Commitment

Delivery

5 days

9am - 4pm

In-person

Next steps

To enrol in Information Security Leadership for Government, please select your preferred date and register below.