Slideshow

Can the channel capitalise on Australia's new mandatory data breach notification laws?

Within six months, the security conversation across the country will have changed, for both customers and partners. Australia’s data breach notification laws – which will come in effect by 22 February 2018 – impose mandatory investigation and notification requirements on most businesses with an annual turnover greater than $3 million. Yet most local IT executives remain unprepared to handle the requirements, creating a need for external guidance and advice. Step forward the channel, who will be called upon to deliver outcome-driven solutions, solid security insights and unparalleled levels of ongoing service. This exclusive ARN Roundtable - in association with F5 Networks; SecureSoft; Sophos and Trustwave -​ deep-dived into the end-user impact of Australia’s data breach notification laws, outlining key opportunities and challenges for the channel, alongside how security-focused partners can capitalise. Photos by Leïla Joy.​

  • L-R - Wade Smith (F5 Networks); Nick Lowe (InfoTrust); Louise Bremberg (Meridian IT); Darren Lynn (Outcomex); Robert Pizzari (Trustwave); Tony Vizza (Sententia); James Wootton (Intalock); David Sykes (Sophos); James Henderson (ARN); Stewart Sim (WebSecure Technologies); Naomi Burley (GRC Institute); Steve Cronan (SecureSoft) and Ken Pang (Content Security)

  • David Sykes (Sophos)

  • Naomi Burley (GRC Institute)

  • James Wootton (Intalock)

  • Stewart Sim (WebSecure Technologies) and Nick Lowe (InfoTrust)

  • Ken Pang (Content Security)

  • Steve Cronan (SecureSoft)

  • Stewart Sim (WebSecure Technologies) and Nick Lowe (InfoTrust)

  • Steve Cronan (SecureSoft)

  • Tony Vizza (Sententia)

  • Wade Smith (F5 Networks)

  • Darren Lynn (Outcomex) and James Henderson (ARN)

  • David Sykes (Sophos); Louise Bremberg (Meridian IT); Cherry Yumul (ARN) and Steve Cronan (SecureSoft)

  • James Wootton (Intalock) and Tony Vizza (Sententia)

  • Robert Pizzari (Trustwave)

  • David Sykes (Sophos)

  • Robert Pizzari (Trustwave) and James Wootton (Intalock)

  • Wade Smith (F5 Networks)

  • Ken Pang (Content Security) and Eduardo Silva (ARN)

  • James Wootton (Intalock) and Tony Vizza (Sententia)

  • James Wootton (Intalock) and Robert Pizzari (Trustwave)

  • Ken Pang (Content Security); Naomi Burley (GRC Institute) and Steve Cronan (SecureSoft)

  • Louise Bremberg (Meridian IT) and David Sykes (Sophos)

  • Darren Lynn (Outcomex) and Wade Smith (F5 Networks)

  • Tony Vizza (Sententia) and Ken Pang (Content Security)

  • Stewart Sim (WebSecure Technologies) and Nick Lowe (InfoTrust)

  • Robert Pizzari (Trustwave); Stewart Sim (WebSecure Technologies); Nick Lowe (InfoTrust) and James Henderson (ARN)

  • Naomi Burley (GRC Institute) and Steve Cronan (SecureSoft)

  • Darren Lynn (Outcomex) and Wade Smith (F5 Networks)

  • Wade Smith (F5 Networks); Louise Bremberg (Meridian IT); David Sykes (Sophos) and James Wootton (Intalock)

  • Robert Pizzari (Trustwave); Stewart Sim (WebSecure Technologies) and Nick Lowe (InfoTrust)

  • Darren Lynn (Outcomex)

  • James Wootton (Intalock); Robert Pizzari (Trustwave) and Stewart Sim (WebSecure Technologies)

  • Naomi Burley (GRC Institute) and Steve Cronan (SecureSoft)

  • James Henderson (ARN); Tony Vizza (Sententia) and Ken Pang (Content Security)

  • James Wootton (Intalock) and Robert Pizzari (Trustwave)

  • Darren Lynn (Outcomex) and Wade Smith (F5 Networks)

  • Louise Bremberg (Meridian IT) and David Sykes (Sophos)

  • Steve Cronan (SecureSoft)

  • Stewart Sim (WebSecure Technologies); Nick Lowe (InfoTrust); James Henderson (ARN); Tony Vizza (Sententia) and Ken Pang (Content Security)

  • Wade Smith (F5 Networks) and Louise Bremberg (Meridian IT)

  • James Wootton (Intalock)

  • Wade Smith (F5 Networks) and Louise Bremberg (Meridian IT)

  • Ken Pang (Content Security) and Naomi Burley (GRC Institute)

  • James Henderson (ARN); Tony Vizza (Sententia) and Ken Pang (Content Security)

Show Comments