Skip to main content

Cyber Security

The Cyber Security CRC (CS CRC) established in 2018, have provided guidance and a roadmap for other CRCS on this journey and its learnings from CSCRC’s investment in cyber security in the link below.  It includes defining business requirements (every CRC is different), lessons learned and a recommended CRC Roadmap including cybersecurity at set up phase, operational establishment phase, research and commercialisation phase and wind down phase.

Download the CS CRC Guidance Paper | Cyber Security Roadmap for Cooperative Research Centres.pdf

Good cyber security practices have two critical components. The first one is that there is a strategy (or roadmap) of what technical and human controls you will have in place, that is, getting to an adequate steady state. The second component is of equal importance is maintenance of your steady state (which is also referred to often as good cyber hygiene).

There are many excellent resources out there to assist you at every stage of your cyber security journey (along with the Guide above). The Australian Cyber Security Centre has developed some excellent resources and the Australian Institute of Company Directors (AICD) (whom CS CRC partnered with) on both editions of the Cyber Governance Principles (which has sections for SMEs and NFPs) as well as the Cyber Incident Management.

The cyber security lifecycle of a CRC requires continued consideration alongside other elements of running a successful CRC. 

Managing cyber security effectively does not need to be a costly exercise, there is ample support available in Australia for managing cyber security regardless of the budget available or the resources on hand.

In summary:

  • Make time to understand what your obligations, objectives, and constraints are, and build from there
  • Establish a governance structure, bringing management and board into the security conversation continually
  • Understand and continually manage your risks
  • Implement controls that directly address and minimise your risks
  • Consider support available and engage external assistance where needed.