Custodial Information Security (CIS) is an emerging field of cyber security that aims to overcome many of the limitations inherent in traditional forms of cyber security.  

At its heart, CIS mediates the relationship between information and the authorised users who require access to that information. CIS does not provide any of the countermeasures that are typically found in a ‘Perimeter Defence’ styled network security environment – no Anti-Virus, no Anti-Malware, etc.  

Custodial Information Security is intended to curate, track and forensically detail all interactions between users and the Custodial Information stored on the organisation’s systems. Where traditional cyber security is inside, looking out towards threats, CIS is inside the system, watching for threatening behaviour among credentialed users.  

Over 70% of all data breaches have a credentialed user as their source, with over 80% of these breaches being traced back to human error. This makes human error, by legitimate staff, the single biggest threat to data security. It is also the one threat that traditional perimeter style defences cannot detect.  

Meeting the challenge posed by raised cyber security requirements will be of paramount concern to suppliers intending to win a share of Defence business. Custodial Information

Security provides an opportunity to mature your organisation’s security posture toward ever greater compliance to the National Institute of Standards and Technology (NIST) and  International trade in Arms Regulations (ITAR)/Export Administration Regulations (EAR)  compliance instruments that are contract discriminators in the Defence world.


This seminar addresses the "Expert", which we define as:

  • those already in the market and now needing specific skill areas.




  • Virtual Workshops x 6
  • Podcasts x 1

6 Weeks


This virtual workshop bundle will build knowledge of how Custodial Information Security can provide crucial insight into the risks associated with having custody of the Controlled, Unclassified Information necessary to participate in Defence contract work.


  • The importance of Data and Security governance 
  • How to identify and classify data that matters 
  • An understanding of different concepts involved in proper handling, usage, storage and eventual disposal of sensitive data 
  • What are different types of security controls and where to start from when you have limited resources.


On Demand


  • Introduction to seminar and  facilitator 
  • Description of seminar bundle incl learning outcomes



Week 1


  • What is data governance? 
  • Using a data centric approach. 
    • Determining what data is important?  Categories and types of data. 
      • Data governed by regulations and standards.
      • Custodial Information.
      • Intellectual Property.
        Commercially sensitive data.  
  • Classifying data 
    • What is data classification? 
    • Sensitivity of data.  
    • Value of data.  
    • Criticality of data. 
    • Legal requirements.  
    • Data timeline. 
  • What is Data Retention  
    • Determining appropriate record retention timeframe.  
    • Record retention best practices.
  • Roles and responsibilities
    • Understanding the importance of data ownership.  
    • The roles and responsibilities of different users in an organisation.
  • Developing a classification Scheme.
    • Introduction to PSPF classification scheme.
    • PPSPF vs a commercial classification scheme.
    • Using information markers
  • Developing an asset inventory
    • Mapping data to classification.
    • Data labelling and marking.


The attendee will gain an understanding of: 

  • Understand what is Data Governance.
  • Understanding of data-centric and custodial information approaches. 
  • How to categorise data and determine what is important.
  • Understand what is required to build a data classification scheme for your organisation. 
  • Roles and responsibilities of different users within an organisation. 
  • Developing an asset inventory.

Virtual Workshop

30min bump in, 60mins, plus 30 - 45 mins of Q&A and chat  room participation

Week 2


  • Recap on areas covered in the previous workshop.  
  • What is data lifecycle?  
  • What are data states? 
  • Types of controls.  
    • Administrative 
    • Technical  
    • Physical  
  • Access Control Management. 
    • User registration and de registration.
    • User access authorisation and accountability.
    • Access restrictions. 
    • Authentication methods.  
    • Identity management systems.
    • Data centric access control systems.
  • Auditing Access. 
    • On-going monitoring and logging. 
    • Review of user access rights. 
    • Removal or adjustment of access rights. 
  • Encryption fundamentals. 
    • Disk based encryption.  
    • Data or File based  
    • encryption. 
    • Encryption in  
    • communication.  
    • Database encryption. 
  • Securing data in motion or when shared. 
    • Email Security  
    • Cloud security  
    • Removable Media  
    • Printing  
    • file transfer applications  
    • Web based communication  
    • methods  
    • VPN  
  • Auditing data in motion. 
  • Securing Data at Rest. How to securely store your data? 
    • File Servers  
    • Mobile devices  
    • Removable media 
    • Cloud storage  
    • Database servers  
    • Data Backups  
  • Using data discovery tools to locate stored data.  
    • Label based discovery. 
    • Meta data based discovery.  
    • Content based discovery.  
  • Data backup fundamentals.  
  • Data Disposal. 
    • Declassifying data  
    • Data disposal mechanisms  
  • Auditing end-of-life data.
  • Running scenario using provided data control matrix.


The attendee will gain an understanding of: 

  • Understand different states and lifecycle of data.
  • Understand how to secure data in each of its life cycle stage and state.

Virtual Workshop

30min bump in, 60mins, plus 30 - 45 mins of Q&A and chat  room participation

Week 3


  • Recap on areas covered in the previous workshop. 
  • What is Insider Threat?
  • Managing Insider threat. 
    • Managing Human error.  
    • User behaviour monitoring.  
  • Importance of Assessments in data security. 
    • User vulnerability  
    • assessments.  
    • Data usage assessments.  
  • Techniques for controlling data when outside of the organisation.  
    • with suppliers  
    • with ex-employees  
  • Working from Home.  
    • Basic security hygiene when working from home. 
    • Secure ways of handling mobile devices.  
    • How best to handle BYOD (Bring Your Own Device). 
  • Cloud Computing fundamentals 
    • What is cloud and its variations. 
    • Business drivers to adopt cloud. What works and what doesn’t for SMEs? 
    • Key Cloud Computing Security considerations. 
    • Data in the cloud. Who is responsible for what?  
    • Responsibilities when using a cloud environment.
    • Running scenario using provided  data governance templates


The attendee will gain an understanding of: 

  • Understand ways to handle Insider threat. 
  • Importance of assessments. 
  • Deeper understanding of how to use the data governance templates.  
  • How to secure devices when working  from home. 
  • How to handle mobile devices and BYOD.  
  • Gain an understanding of various  options available to improve their security and secure their data.  
  • Understand cloud security considerations.  
  • Understand your role and responsibilities when using cloud providers.

Virtual Workshop

30min bump in, 60mins, plus 30 - 45 mins of Q&A and chat  room participation


3 hours instructions, up to 2.5 hours of Q&A and 1.5 hours of bump in.


Ray Harvey is the Internal Threat Business Development Manager for Cider House ICT, a  Goal Group Member. Ray is passionate about ensuring that Australian businesses are protecting themselves from evolving cyber threats and are as competitive as they can be in the competitive Defence market.

Rizwan has a passion to solve the human risks to data security and has spent the last 10  years consulting on human factors behind data loss and privacy and designing security systems. He has been engaged in the detection and response of 100s of insider threat cases involving corruption, insider trading, reputational damage, theft for personal gain and accidental loss. Many of which have also become part of OAIC stats. 

Rizwan works as Director Data Security and Compliance for e-Safe Systems a UK based security vendor specialising in human risk to data security and compliance, since its inception.  

Rizwan has 18 years of experience of designing and management information security and artificial Intelligence-based systems. He holds a Masters in Information Technology  Management from Staffordshire University, UK, and is a certified Information Systems  Security Professional (CISSP) and Project Management Professional PMP®. 

During his time with e-Safe Systems he has held several strategic and leadership roles and has been instrumental in growing the business which is now protecting over a million users worldwide.  

Prior to migrating to Australia, as Chief Operating Officer he was responsible for establishing e-Safe’s R&D and support centre and lead the design and development of e Safe’s offerings which include Data loss Prevention, Document Rights Management, File encryption, user behaviour analytics, user activity monitoring, data classification, filtering and e-safety solutions. In his current role as Director Data Security and Compliance, he is responsible for leading the consulting engagements in Australia and is responsible for defining strategic direction for e-Safe’s product in light of new challenges and market trends.



EOI Cut-Off: 02 February

Successful Applicants Notified: 03 – 10 February

Course Joining Instructions Issued: 10 February

Course Timing: 24 February – 31 March 2022 – weekly 1-hour workshops on a Thursday. Time TBC.

The Defence Ready Seminar Series is being delivered thanks to funding and collaboration with the Centre for Defence Industry Capability (CDIC) and, for each seminar, forty (40) funded places are being made available to SMEs.

The Defence Department has set very clear guidance around the criteria for access to one of the forty funded places within each of the thirteen courses, and priority will be given to Hunter and regional-NSW based SMEs, building capability to potentially partner on Defence projects in the future.

With the full seminar series rolling out over the next twelve-months, Hunter Defence will be scheduling ongoing communications as each course gets close to commencing. If your organisation has been successful in achieving a funded place in one of these courses, Hunter Defence will let you know three (3) weeks before your selected seminars(s) of interest are due to start.

EOI Hunter Defence Readiness Seminar - Launch Ready
Do you currently work in defence? *
What seminar series topics are you interested in attending? *
The inclusions and time required to participate within each seminar range in length from 4 hours–14 hours and are spread over weeks/months. Will you be able to commit to completing the course? *
Sign up to the Hunter Defence mailing list? *


Sign up to our Hunter Defence mailing list to learn about all upcoming events and industry updates.