Information Security Leadership for Government
- Duration
- 5 days
- Delivery mode
- In-person
- Location
- UNSW Canberra City
- Price (AUD inc. GST)
- $4,900
- Spots remaining
- AVAILABLE
- Course summary
- About
- Outcomes
- Schedule
- Next steps
Course summary
Commanding the ISM landscape
This course introduces major global cyber security and privacy frameworks and shows how they align with the Australian Signals Directorate’s Information Security Manual (ISM). You’ll examine the ISM’s four-stage process, key control areas and how to plan for and respond to breaches. The course also covers essential ethical and regulatory requirements and prepares you to work effectively with cyber security teams in government and Defence environments.
Who will benefit
- Experienced leaders new to cyber security leadership.
- New and experienced leaders within the Australian government.
- IT professionals seeking an introduction to cyber security strategic leadership.
- Defence or government personnel, or people who work closely with Defence or government.
Course is suitable for
- The course is designed for beginners and has no prerequisites
Delivered by experts
About the course
Rule the cyber frameworks
Implementing the Australian Signals Directorate (ASD) Information Security Manual (ISM) is a vital part of cyber security responsibility for all people working with the federal government. Understanding the regulatory requirements and best practice implementation of the ISM can be challenging for leaders. This course equips you to confidently lead the strategic direction and implementation of the ISM within your department or organisation.
In this course, you will explore the key international cyber security and privacy frameworks and how they align with the ASD’s Information Security Manual (ISM). You’ll learn practical strategies for implementing ISM processes and controls, and develop the skills to effectively work with cyber security teams across Australian Government and Defence environments.
Why enrol in this course
Lead with confidence in cyber security strategy
Develop the skills and strategic understanding needed to lead information security management in government and Defence settings.
Understand critical frameworks
Gain clarity on how major international cyber and privacy frameworks (ISO, NIST) relate to Australia’s Information Security Manual (ISM).
Expert guidance from industry professionals
Learn from experienced facilitators with real-world cyber security leadership backgrounds.
Practical leadership knowledge
Develop actionable approaches to implement ISM controls, managing cyber security teams, and respond to breaches across organisational environments.
Key features
Focus content on information security leadership tailored to Australian government and Defence organisations, including regulatory and ethical considerations.
Explore major cyber security and privacy frameworks and learn how to apply the Australian Signals Directorate’s ISM process across four key stages of implementation.
Build high-level leadership capabilities in managing teams, interacting with cyber specialists, and planning for cyber breaches in complex organisational contexts.
Learning outcomes
Strategic cyber deference essentials
By the end of this course, you’ll understand how major cyber security and privacy frameworks align with the ASD ISM and how to implement the ISM across its full lifecycle — from defining systems to selecting, applying, and assessing controls.
You’ll develop strategic insight into ISM’s core principles, its role in risk management and how it reduces breach exposure while shaping ethical and regulatory responsibilities.
You’ll also learn how ISM interacts with the NIST Privacy Framework and gain awareness of effective team structures and approaches to building and retaining high-performing cyber teams.
What you'll learn
On completion of this course, you will gain the skills to implement the ASD ISM across its full lifecycle align it with major cyber security and privacy frameworks and apply strategic principles to reduce risk and breach impact.
You will also develop the knowledge to lead cyber teams effectively, understand ethical and regulatory responsibilities and integrate ISM practices with organisational risk management.
Topics covered
On completion of this course, you will:
- Understand the major cyber security and privacy frameworks, when they are used, and how they relate to the ASD ISM.
- Understand the implementation process of the ASD ISM including: defining the system, selecting controls, implementing controls, assessing controls, authorising the system.
- Understand how implementation of ISM applies to the risk management framework approach.
- Identify and describe the four principals of ISM (govern, protect, detect, respond) from a strategic level.
- Recognise, at a strategic level, how ISM reduces breach opportunities and the damage caused by breaches.
- Know the ethical and regulatory responsibilities ISM places on places and participants.
- Understand the interaction between the ASD’s ISM and the NIST PRIVACY frameworks and how each apply.
- Understand different team structures and the various approaches to building teams and retaining people.
Course delivery
| Format | Commitment | Delivery |
|---|---|---|
5 days | 9am - 4pm | In-person |
Skills and career
Skills
Career roles
Course is suitable for