Cyber Security

Cyber Security

Cyber Security

In today’s world, all organisations are at risk of a cyber-attack or a data security breach.

While the threats are serious and constant, it’s how your organisation prepares for an incident and responds after a breach that is critical.

Numerous recent incidents have proven that businesses who have engaged with legal professionals before an incident has occurred are able to coordinate a more effective response, significantly limit financial and reputational damage, and recover faster. 

Corrs Cyber

Corrs Cyber is a rapid-response cyber security team, created to help organisations prepare for and recover from a cyber-attack or data security breach.

Our multidisciplinary team provides access to data breach management specialists, including legal advisors, IT forensic investigation specialists, cyber risk, incident response consultants, and crisis and reputation management services. Learn more about our Corrs Cyber offering here.

With the ability to respond to any type of cyber incident, the team offers a complete, solution based round-the-clock cyber incident service. A 24/7 hotline is on hand to both initiate preparation for and respond to cyber incidents as effectively as possible.

Corrs Cyber’s flexible offering can be tailored to address the individual circumstances of a particular crisis as well as the specific requirements of any business.

You can get started on your road to cyber-resilience with our Cyber Security Checklist (PDF).

Our Thinking

The new Consumer Data Right – issues and opportunities

Businesses who hold data about consumers need to be aware of a number of significant changes arising from the proposed new Consumer Data Right.

More

The proposed Consumer Data Right scheme: What are the key features?

The proposed ‘Consumer Data Right’ (CDR) is a scheme where individuals and businesses are able to access ‘their data’, or direct that their data is shared with other entities.

More

Is cyber security the greatest threat for autonomous vehicles?

Cyber security is going to be a key consideration as autonomous vehicle technology develops. It’s not just an issue for the vehicles themselves but for the whole environment that will be developed to support them.

More

Unmanned & unregulated: where are the privacy protections from drones?

Look up because our skies are changing. While the use of drones for personal, commercial or government pursuits has grown rapidly, the Australian legal framework is struggling to reach similar heights. In this article, originally published in the Law

More Download

Maximising customer loyalty: getting data protection right in running loyalty schemes

Loyalty programs harvest a vast trove of valuable data and it needs to be protected. A cyber security incident could lose the trust and loyalty of your customers.

More

Three cyber security priorities for Defence contracting

Australia’s Department of Defence is increasingly focusing its energies on cyber capabilities and preparedness. Here are the top cyber priorities for existing and aspiring Defence contractors.

More

Does robotics and artificial intelligence have a future in the healthcare space?

Must human care be performed by humans? We should question the opportunities and challenges accompanying increased robotic presence and dependence in our hospitals.

More

Five important lessons from media reaction to data breach notifications

A poor response to a data breach can impact upon customer confidence, corporate image and share price.

More

How to use multi-factor authentication to combat cyber-crime

The Australian Signals Directorate lists multi-factor authentication as one of 8 essential security protection mechanisms for combatting cyber-crime. Here’s why activating it on personal accounts may help protect your organisation.

More

Europe’s General Data Protection Regulation: what Australian businesses need to know

The EU’s privacy and data protection laws will apply beyond its borders and may catch Australian businesses. How will it affect your organisation?

More

How to prepare your organisation for Australia’s new Notifiable Data Breach Regime

On 22 February 2018, Australia’s new Notifiable Data Breach Regime will come into effect, introducing mandatory data breach notification obligations for all organisations subject to Australia’s Privacy Act 1988 (Cth).

More

Decrypting Cyber Insurance: A Practical Framework for Organisations

Given the potential to trigger millions of dollars in losses, it’s prudent for businesses to consider cyber insurance as a means of mitigating the risk of attack

More

Corrs Cyber Video Playbook - Episode 1: How do you handle the hacker?

Our Corrs Cyber Playbook Video Series considers the changing nature of the cyber threat and the strategies organisations need to keep top of mind before, during and after a breach occurs.

More

Could cyber security class actions be on their way to Australia?

While Australian courts have not yet been faced with a cyber security class action, the increase in high-profile data breaches and cyber attacks globally indicates it will only be a matter of time.

More

‘Heroic’ or just plain risky? Twitter’s approach to proceedings backfires

A recent Supreme Court of New South Wales case involving Twitter is a timely reminder for any online platforms that may publish confidential information.

More

Why legal technologists are becoming the ‘new normal’

Lawyers’ increasing use of e-discovery and electronic data analysis for evidence gathering has resulted in a ‘new normal’ that law firms are only just beginning to come to grips with.

More

Health Hacking: Dealing with the cyber threat in digital health

As digital health continues to expand, developers are being pressed to demonstrate that cyber security measures have been properly built into the design of the device.

More

Forget Terminator: Cyborgs have rights too (Part Two)

In the second of our two-part look at cyborg technology, we consider how Australia might navigate the potential social and legal tensions arising from human and machine integration.

More

Forget Terminator: Cyborgs have rights too (Part One)

Cyborgs are no longer a sci-fi curiosity. In the first of our two-part look at this technology, we consider how Australia might navigate surveillance and privacy issues that will inevitably arise.

More

Cyber Resilience: The Role of the General Counsel

General Counsel have a key role to play in ensuring their organisations are cyber resilient.

More

Brand new cybersecurity regulations are now in effect in New York: How might they affect your organisation?

They’ve been hailed as a world first. How will New York’s new cybersecurity regulations shape legislation in Australia?

More

Preparing for life with robots: How will they be regulated in Australia?

As robots become more complex, capable and autonomous, there are serious liability, safety and privacy issues to address. How should Australia regulate these issues?

More

The future of correction centres – does virtual reality have a place?

Augmented and virtual reality technology is fast becoming more pervasive and affordable. But what does it offer for correctional services?

More

Mandatory data breach notification: how will the new laws in Australia impact your business?

The new mandatory data breach notification laws in Australia are likely to take effect in the next 12 months. So, it’s time for organisations to start preparing.

More

Watching the Watchman – Full Federal Court rejects Australian Privacy Commissioner’s stance on metadata

In a decision that has important ramifications for the regulation of metadata in Australia, the Full Federal Court has dismissed Telstra’s appeal of the Administrative Appeals Tribunal’s decision in the Ben Grubb metadata case.

More

Privacy New Year’s Resolution: Updating your privacy policy

Time to review your Privacy Policy? Here’s what you need to consider in an ever-changing technological environment.

More

Review of Queensland Privacy and Right to Information Legislation

Do Queensland’s Privacy and Right to Information laws need to change? Government agencies and service providers can have their say – but they’ll need to move quickly.

More

Bold Cyber Security Regulations for the Financial Services Industry – Will we see them in Australia?

Cyber Security Mandate: Will proposed cyber security regulations for New York banks and financial institutions pave the way for prescriptive cyber security requirements in Australia?

More

Compulsory data breach notification will also highlight contractual obligations

Changes to privacy law requiring notification of serious breaches of personal information will also have consequences for contractual relationships and corporate data security.

More

What are ‘reasonable steps’ to protect personal information’? 5 key lessons from the Privacy Commissioner’s determinations

Under Australian privacy laws, organisations need to implement ‘reasonable steps’ to protect any personal information they hold.

More

Breaking Brexit Down: Privacy (VIDEO)

In part three of our video series, Corrs Partner Phil Catania takes a closer look at the implications of the UK’s decision to leave the EU and considers how it will impact on privacy.

More

Cyber risk finally getting the attention it deserves

In the last few months, the Australian Government released the mandatory data breach notification bill and a Cyber Security Strategy. The dual release indicates that cyber security opportunities and threats must be considered together.

More

Big Brother is watching! Covert government and corporate regulator hacking in Australia

This article focuses on recent legislative developments regarding covert hacking in Australia that your organisation needs to be aware of, and also touches on some new legislative approaches being adopted in the USA.

More

Government gives cyber security the attention it requires and $230m boost

The Federal Government today launched its new Cyber Security Strategy, giving cyber security a $230m boost and the national attention it deserves. The strategy contains a five point action plan designed to build national cyber resilience and unlock

More

5 key actions your business can take to manage data breach risk

There are a variety of reasons why you should take data breach risk management seriously, not the least of which is the Federal Government’s recent draft bill to introduce mandatory data breach notification requirements.

More

Ideas boom full steam ahead - The Australian Government commits over $1 billion to science and innovation

The key measures that are front and centre of the Government’s National Innovation and Science Agenda.

More

General Counsels’ top priority for 2016: Managing cyber security

Data security is top of the “worry” list for general counsel and directors.

More

You’ve been hacked! How will your data breach response plan perform and what does the OAIC suggest?

The key is to have a clear line of command and accountability and established procedures for responding to data breaches.

More Download

Eight steps to managing security breaches when storing data in the cloud

Storing data in the cloud presents serious challenges for companies in the event of a data security breach.

More

No love lost: Five lessons to be learned from Cupid Media’s privacy breach

The Privacy Commissioner found Cupid Media failed to take reasonable steps to secure its users’ personal information. What are those reasonable steps?

More

Our Experts

Andrew Korbel.jpg

Andrew Korbel

Partner Location Sydney Profile
Daniel Marquet.jpg

Daniel Marquet

Partner Location Melbourne Profile
YATES Davids website grey SIZED TH

David Yates

Partner Location Perth Profile
Eugenia Kolivos.jpg

Eugenia Kolivos

Partner Location Sydney Profile
WHEELAHAN Frances website grey SIZED TH

Frances Wheelahan

Partner Location Melbourne Profile
THOMAS Georg website grey SIZED TH

Georg Thomas

National Security & Risk Manager Location Melbourne Profile
Helen Carke.jpg

Helen Clarke

Partner Location Brisbane Profile
James North.jpg

James North

Partner Location Sydney Profile
James Whittaker.jpg

James Whittaker

Partner Location Sydney Profile
DO ROZARIO Michael website grey SIZED TH

Michael do Rozario

Partner Location Sydney Profile
CATANIAPhilipwebsiteTH.jpg

Philip Catania

Partner Location Melbourne Profile
Magness Phillip Website SIZED TH

Phillip Magness

National Forensic Technology Manager Location Melbourne Profile
Richard Leder.jpg

Richard Leder

Partner Location Melbourne Profile
JOHNSON Simon2 website TH

Simon Johnson

Partner Location Sydney Profile

Our Thinking

The new Consumer Data Right – issues and opportunities

Businesses who hold data about consumers need to be aware of a number of significant changes arising from the proposed new Consumer Data Right.

The proposed Consumer Data Right scheme: What are the key features?

The proposed ‘Consumer Data Right’ (CDR) is a scheme where individuals and businesses are able to access ‘their data’, or direct that their data is shared with other entities.

Is cyber security the greatest threat for autonomous vehicles?

Cyber security is going to be a key consideration as autonomous vehicle technology develops. It’s not just an issue for the vehicles themselves but for the whole environment that will be developed to support them.

Unmanned & unregulated: where are the privacy protections from drones?

Look up because our skies are changing. While the use of drones for personal, commercial or government pursuits has grown rapidly, the Australian legal framework is struggling to reach similar heights. In this article, originally published in the Law

Maximising customer loyalty: getting data protection right in running loyalty schemes

Loyalty programs harvest a vast trove of valuable data and it needs to be protected. A cyber security incident could lose the trust and loyalty of your customers.

Three cyber security priorities for Defence contracting

Australia’s Department of Defence is increasingly focusing its energies on cyber capabilities and preparedness. Here are the top cyber priorities for existing and aspiring Defence contractors.

Does robotics and artificial intelligence have a future in the healthcare space?

Must human care be performed by humans? We should question the opportunities and challenges accompanying increased robotic presence and dependence in our hospitals.

Five important lessons from media reaction to data breach notifications

A poor response to a data breach can impact upon customer confidence, corporate image and share price.

How to use multi-factor authentication to combat cyber-crime

The Australian Signals Directorate lists multi-factor authentication as one of 8 essential security protection mechanisms for combatting cyber-crime. Here’s why activating it on personal accounts may help protect your organisation.

Europe’s General Data Protection Regulation: what Australian businesses need to know

The EU’s privacy and data protection laws will apply beyond its borders and may catch Australian businesses. How will it affect your organisation?

How to prepare your organisation for Australia’s new Notifiable Data Breach Regime

On 22 February 2018, Australia’s new Notifiable Data Breach Regime will come into effect, introducing mandatory data breach notification obligations for all organisations subject to Australia’s Privacy Act 1988 (Cth).

Decrypting Cyber Insurance: A Practical Framework for Organisations

Given the potential to trigger millions of dollars in losses, it’s prudent for businesses to consider cyber insurance as a means of mitigating the risk of attack

Corrs Cyber Video Playbook - Episode 1: How do you handle the hacker?

Our Corrs Cyber Playbook Video Series considers the changing nature of the cyber threat and the strategies organisations need to keep top of mind before, during and after a breach occurs.

Could cyber security class actions be on their way to Australia?

While Australian courts have not yet been faced with a cyber security class action, the increase in high-profile data breaches and cyber attacks globally indicates it will only be a matter of time.

‘Heroic’ or just plain risky? Twitter’s approach to proceedings backfires

A recent Supreme Court of New South Wales case involving Twitter is a timely reminder for any online platforms that may publish confidential information.

Why legal technologists are becoming the ‘new normal’

Lawyers’ increasing use of e-discovery and electronic data analysis for evidence gathering has resulted in a ‘new normal’ that law firms are only just beginning to come to grips with.

Health Hacking: Dealing with the cyber threat in digital health

As digital health continues to expand, developers are being pressed to demonstrate that cyber security measures have been properly built into the design of the device.

Forget Terminator: Cyborgs have rights too (Part Two)

In the second of our two-part look at cyborg technology, we consider how Australia might navigate the potential social and legal tensions arising from human and machine integration.

Forget Terminator: Cyborgs have rights too (Part One)

Cyborgs are no longer a sci-fi curiosity. In the first of our two-part look at this technology, we consider how Australia might navigate surveillance and privacy issues that will inevitably arise.

Cyber Resilience: The Role of the General Counsel

General Counsel have a key role to play in ensuring their organisations are cyber resilient.

Brand new cybersecurity regulations are now in effect in New York: How might they affect your organisation?

They’ve been hailed as a world first. How will New York’s new cybersecurity regulations shape legislation in Australia?

Preparing for life with robots: How will they be regulated in Australia?

As robots become more complex, capable and autonomous, there are serious liability, safety and privacy issues to address. How should Australia regulate these issues?

The future of correction centres – does virtual reality have a place?

Augmented and virtual reality technology is fast becoming more pervasive and affordable. But what does it offer for correctional services?

Mandatory data breach notification: how will the new laws in Australia impact your business?

The new mandatory data breach notification laws in Australia are likely to take effect in the next 12 months. So, it’s time for organisations to start preparing.

Watching the Watchman – Full Federal Court rejects Australian Privacy Commissioner’s stance on metadata

In a decision that has important ramifications for the regulation of metadata in Australia, the Full Federal Court has dismissed Telstra’s appeal of the Administrative Appeals Tribunal’s decision in the Ben Grubb metadata case.

Privacy New Year’s Resolution: Updating your privacy policy

Time to review your Privacy Policy? Here’s what you need to consider in an ever-changing technological environment.

Review of Queensland Privacy and Right to Information Legislation

Do Queensland’s Privacy and Right to Information laws need to change? Government agencies and service providers can have their say – but they’ll need to move quickly.

Bold Cyber Security Regulations for the Financial Services Industry – Will we see them in Australia?

Cyber Security Mandate: Will proposed cyber security regulations for New York banks and financial institutions pave the way for prescriptive cyber security requirements in Australia?

Compulsory data breach notification will also highlight contractual obligations

Changes to privacy law requiring notification of serious breaches of personal information will also have consequences for contractual relationships and corporate data security.

What are ‘reasonable steps’ to protect personal information’? 5 key lessons from the Privacy Commissioner’s determinations

Under Australian privacy laws, organisations need to implement ‘reasonable steps’ to protect any personal information they hold.

Breaking Brexit Down: Privacy (VIDEO)

In part three of our video series, Corrs Partner Phil Catania takes a closer look at the implications of the UK’s decision to leave the EU and considers how it will impact on privacy.

Cyber risk finally getting the attention it deserves

In the last few months, the Australian Government released the mandatory data breach notification bill and a Cyber Security Strategy. The dual release indicates that cyber security opportunities and threats must be considered together.

Big Brother is watching! Covert government and corporate regulator hacking in Australia

This article focuses on recent legislative developments regarding covert hacking in Australia that your organisation needs to be aware of, and also touches on some new legislative approaches being adopted in the USA.

Government gives cyber security the attention it requires and $230m boost

The Federal Government today launched its new Cyber Security Strategy, giving cyber security a $230m boost and the national attention it deserves. The strategy contains a five point action plan designed to build national cyber resilience and unlock

5 key actions your business can take to manage data breach risk

There are a variety of reasons why you should take data breach risk management seriously, not the least of which is the Federal Government’s recent draft bill to introduce mandatory data breach notification requirements.

Ideas boom full steam ahead - The Australian Government commits over $1 billion to science and innovation

The key measures that are front and centre of the Government’s National Innovation and Science Agenda.

General Counsels’ top priority for 2016: Managing cyber security

Data security is top of the “worry” list for general counsel and directors.

You’ve been hacked! How will your data breach response plan perform and what does the OAIC suggest?

The key is to have a clear line of command and accountability and established procedures for responding to data breaches.

Eight steps to managing security breaches when storing data in the cloud

Storing data in the cloud presents serious challenges for companies in the event of a data security breach.

No love lost: Five lessons to be learned from Cupid Media’s privacy breach

The Privacy Commissioner found Cupid Media failed to take reasonable steps to secure its users’ personal information. What are those reasonable steps?

Our Experts

Andrew Korbel.jpg

Andrew Korbel

Partner Sydney + 61 2 9210 6537
Daniel Marquet.jpg

Daniel Marquet

Partner Melbourne +61 3 9672 3172
YATES Davids website grey SIZED TH

David Yates

Partner Perth +61 8 9460 1806
Eugenia Kolivos.jpg

Eugenia Kolivos

Partner Sydney +61 2 9210 6316
WHEELAHAN Frances website grey SIZED TH

Frances Wheelahan

Partner Melbourne +61 3 9672 3380
THOMAS Georg website grey SIZED TH

Georg Thomas

National Security & Risk Manager Melbourne +61 3 9672 3373
Helen Carke.jpg

Helen Clarke

Partner Brisbane +61 7 3228 9818
James North.jpg

James North

Partner Sydney +61 2 9210 6734
James Whittaker.jpg

James Whittaker

Partner Sydney +61 2 9210 6667
DO ROZARIO Michael website grey SIZED TH

Michael do Rozario

Partner Sydney +61 2 9210 6566
CATANIAPhilipwebsiteTH.jpg

Philip Catania

Partner Melbourne +61 3 9672 3333
Magness Phillip Website SIZED TH

Phillip Magness

National Forensic Technology Manager Melbourne +61 3 9672 3299
Richard Leder.jpg

Richard Leder

Partner Melbourne +61 3 9672 3489
JOHNSON Simon2 website TH

Simon Johnson

Partner Sydney +61 2 9210 6606