Managing Data Risk

Johnny Thai • November 8, 2023

Malicious generative AI tools raising concerns around data risk

WormGBT

The Sydney Morning Herald reports an emergence of generative AI tools being sold on the dark web with no ethical boundaries are being used for cyberattacks on Australian businesses. Cybersecurity experts warn as innovative cyberattacks are generated by the AI technology including sophisticated phishing attacks and malware variants. As these malicious generative AI tools for example FraudGPT, EvilGPT, DarkBard, WolfGBT, XXXGBT and WormGBT exacerbate the cybersecurity threat, Generative AI tools can also be used for defensive purposes to defend against cyber threats.

What is Data Risk?

According to Australian Prudential Regulation Authority (APRA) in the Prudential Practice Guide (PPG) CPG 235 Managing Data Risk; Data risk refers to potential data loss resulting from internal problems, external factors, or people-related issues. These risks can be broadly categorised into two categories: internal and external and applies to both physical and digital data. Examples of data risk include fraud caused by data theft, disruptions in business operations due to data corruption or unavailability, delivery failures due to inaccurate data, and legal or compliance violations resulting from the unauthorised disclosure of sensitive data.

Internal Data Risks

These risks stem from inadequate or failed internal processes, people-related issues, and system vulnerabilities. For example, data theft leading to fraudulent activities within the organisation, data corruption or unavailability causing business disruptions, or inaccurate data impacting the execution of critical processes.

External Data Risks

These risks result from external events that affect data security. One significant example is the breach of legal or compliance obligations due to the unauthorized disclosure of sensitive data.


Data risk is not limited to the format of data; whether it's physical or digital, organisations must take measures to safeguard their data assets. According to APRA, ‘data is the new gold’ because of the immense benefits organisations can derive out of it. However, for data to be of any value, it must be:

  • Free of dataquality issues;
  • Protected with adequate controls;
  • Owned by real people;
  • And most importantly, data must be nurtured and governed like an asset.


Managing Data Risk to adopt an approach towards Data Governance

To effectively mitigate data risk, businesses must adopt a comprehensive approach to data governance. The APRA has provided valuable guidelines in Prudential Practice Guide CPG 235 Managing Data Risk. This guide serves as a vital resource for regulated entities to navigate the complexities of data risk management.


Here are some key aspects of managing data risk, as outlined in CPG 235:


  •  Managing Data Risk: Recognising that data is a valuable asset, organizations must implement data risk management practices to ensure that adequate controls are applied throughout the data's lifecycle.


  • Implementation of Data Management Framework: Integrating data management practices into daily operations and establishing clear roles and responsibilities regarding data management.


  • Generating Staff Awareness & Support: Promoting awareness among non-data professionals to ensure adherence to data management policies and standards.


  • Managing Risks throughout Data Lifecycle: Identifying and mitigating data risks at each stage of the data lifecycle, aided by data lineage diagrams.


  • Implementation of Controls & Validations: Ensuring transparency and security by creating metadata repositories and implementing access controls, especially when data is shared with third parties.


  • Managing Data Quality: Establishing a framework to identify, resolve, and report data quality issues, thereby improving overall data quality.


  • Data Risk Assurance: Seeking regular assurance that data quality is appropriate and data risk management is effective through systematic assessments.


By following these guidelines, organisations can better protect their data assets and reduce the potential for data loss and misuse.

Managing Digital Data Risks

Data risk is a critical concern for organisations in the digital age. Recognising the importance of data and taking proactive measures to manage data risk is essential for business success. By adhering to guidelines such as CPG 235, businesses can safeguard their data assets and operate in a more secure and compliant manner. In an era where data is often referred to as "the new gold," prudent data risk management is a key component of modern business governance.

Replace aging and disparate infrastructure with Forcepoint ONE

Forcepoint ONE enable users to securely work anywhere. According to Gartner, Forcepoint ONE is an all-in-one Security Service Edge (SSE) platform that is seamless to adopt Zero Trust, protect against threats, and prevent the theft or loss of sensitive data and intellectual property on the web as a Secure Web Gateway (SWG), in the Cloud Access Service Broker (CASB), and in internal private applications Zero Trust Network Access (ZTNA).

Forcepoint as your Security Access Service Edge (SASE) or Security Service Edge (SSE) solution 

SSE is a cybersecurity concept introduced by Gartner in 2021. SSE represents the security component within the broader framework of secure access service edge (SASE). According to Gartner, SSE encompasses a set of integrated security capabilities centered around cloud technologies. These capabilities include Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Firewall as-a-service (FWaaS), and Secure Web Gateway (SWG). The primary objective of SSE is to ensure the secure access to all web, cloud services, and locally hosted applications.

Forcepoint ONE SSE

In 2021, Forcepoint purchased Deep Secure, which has designed its platform to help enterprises defend cyberattacks delivered via malware in addition to preventing data loss. The purchase was made following Forcepoint's acquisition of Cyberinc to add more remote browser isolation control. Forcepoint's strategic and key acquisitions enabled their transition of new products and their legacy products into something called "Forcepoint ONE".


Forcepoint ONE provides an all in one SSE platform that empowers users to securely access an organisation's applications, data, and resources while also enabling the monitoring of user behavior to detect any unusual patterns that could be indicative of malicious activity or cyberattacks.

Forcepoint One modular approach

It comprises of CASB, ZTNA and SWG provide security in the cloud, on the web and safeguard access to private apps through both agent-based and agentless deployment to ensure productivity while data stays safe on any device.


Forcepoint ONE Data Loss Prevention (DLP) to deliver industry-leading data security with DLP Software as a Service (SaaS). Configure security policies once and apply everywhere to prevent data exfiltration on the web, in the cloud and in private apps.


FlexEdge Secure SD-WAN to securely connect offices and remote sites and deliver the fastest internet speeds possible with maximum resiliency, all from a single vendor.


Forcepoint Insights to analyse your security posture in real-time with live telemetry from all your Forcepoint ONE security products. Get an executive summary of the economic value your data and threat protection activity is generating for the business.


Forcepoint Single-Vendor SASE

SASE Competitive Comparison Chart

Konverge have been assisting Australian businesses for years in deploying infrastructure and security software solutions, and with the ability to provide 24/7 technical support to business with over 300 users. Konverge is a Forcepoint partner and is keen to assist your organisation achieve its data risk management objectives. For exmaple, inspection of data, data risk management, general information technology controls, data architecture, data governance and data metrics and data quality plans.

Contact us today on 1300 019 919 or sales@konverge.com.au for a obligation free discussion to understand how you can get visibility and control of your data within your existing IT infrastructure environment, from your end point devices to network infrastructure and applications, we are here to help.

A picture of a circle with the words `` secure your cloud first workforce '' on it.
By Johnny Thai June 4, 2025
Simplify cloud security with Palo Alto Prisma Access and Konverge Australia. Secure your hybrid workforce with cloud-delivered security, ZTNA, and SASE solutions.
A person is typing on a laptop with a microsoft logo in the background.
By Johnny Thai May 27, 2025
Discover Microsoft Purview with Konverge—unified data governance, compliance, and risk management for secure, agile, and efficient IT operations.
A banner that says education technology update on it
By Johnny Thai May 12, 2025
Make tech work better for your school. Discover education technology that simplifies IT, supports teachers, and improves student outcomes.
A banner for hpe hybrid cloud and private cloud.
By Johnny Thai April 28, 2025
Simplify Your Hybrid Cloud with HPE GreenLake
A banner for hp computers , printers and accessories
By Johnny Thai April 23, 2025
HP technology. Konverge expertise. Built around you. You’ve got enough on your plate. When it’s time to upgrade your devices or roll out something new, you don’t want complexity. You want to know you’re getting the right tech—with real support behind it. That’s where we come in. We bring HP’s trusted, reliable hardware together with Konverge’s local know-how to deliver technology that works from day one, and keeps working. ✅ Why work with Konverge + HP?  You’ll get the right fit We’ll help you choose the right HP devices for your setup, your business, and your future. No jargon. No guesswork. It just works We pre-configure, connect, and test everything—so you can plug in and start using it, fast. You stay protected Security’s not optional. We make sure your data, devices, and people are safe from day one. Help is always close Our local team has your back with real support—not robots, not runarounds. You’re not locked in We design with flexibility in mind. As your needs grow or change, your tech keeps up.
Blog banner your network your way
By Johnny Thai April 21, 2025
Take Control of Your Network—On Your Terms
Nvidia ai and hp server and storage updates by converge
By Johnny Thai April 14, 2025
Hewlett Packard Enterprise advances AI in their solutions
A man is shaking hands with another man at a conference.
By Johnny Thai April 3, 2025
Take Education to the Next Level with Konverge at the 2025 AISNSW ICT Management & Leadership Conference
A banner that says `` we all should rf using bridge ''
By Johnny Thai February 2, 2025
Digital content creation is happening faster than ever, that includes having so much image content or digital creations and staying organised is so important to not be overwhelmed and yet product high quality work. Whether you're a photographer, designer, illustrator, or video editor, managing thousands of files efficiently can be a daunting task. Adobe Bridge —a powerful, often underrated digital asset management tool that simplifies your workflow, enhances productivity, and integrates seamlessly with other Adobe Creative Cloud applications is essential to all users in the digital age (in my opinion). Adobe Bridge acts as a central hub for organising , previewing , and batch-processing media files . But beyond just being a file browser, it offers tagging , metadata editing , batch renaming , and automation features that significantly improve file management. If you've been juggling files manually, it’s time to discover why Adobe Bridge should be an essential part of your creative workflow.
An advertisement for paloalto security proven to work
By Johnny Thai January 22, 2025
Palo Alto Networks' security is proven to work
More Posts