Optus Unveils Cybersecurity Woes: Privilege Claim Over Deloitte Report Crumbles
Optus Unveils Cybersecurity Woes: Privilege Claim Over Deloitte Report Crumbles
Optus has lost its battle to shield the Deloitte root-cause cyber breach report under the cloak of legal privilege. The revelation comes as a blow following a class action initiated in April 2023 against Optus and related entities concerning a data breach that rattled the company's foundations in mid-September 2022.
Optus Unveils Cybersecurity Woes: Privilege Claim Over Deloitte Report Crumbles
Why our Chief Strategist, Hank Clark, believes an integrated security approach is best
Why our Chief Strategist, Hank Clark, believes an integrated security approach is best
A successful cybersecurity program is underpinned by understanding and safeguarding against the expanded attack surface, as threat actors actively seek gaps in your defences. With new threats arising daily, your defences must adapt continuously to ensure successful cyber security outcomes.
categories
Cyber Security Strategy, Digital and Cyber Security Risk
Why our Chief Strategist, Hank Clark, believes an integrated security approach is best
Cyber Security VS Cyber Resilience: Shifting Business Mindsets
Cyber Security VS Cyber Resilience: Shifting Business Mindsets
Organisations are more attune than ever to the criticality of elevating cyber security as a business priority. However, when it comes to planning for and dealing with cyber attacks, organisations often fail to consider the implications of defending and responding and further, what it takes to journey back to recovery. This is where cyber security differs from cyber resilience.
categories
Cyber Security Strategy, Digital and Cyber Security Risk
Cyber Security VS Cyber Resilience: Shifting Business Mindsets
What you need to know about the changes to ISO 27001
What you need to know about the changes to ISO 27001
ISO 27001 and ISO 27002 were last updated in 2013, however a new iteration of ISO 27002 was published earlier this year in February 2022, and a revised version is likely to be published in a month.
categories
Governance, Risk and Compliance
What you need to know about the changes to ISO 27001
What to consider when incorporating a successful Operating Model
What to consider when incorporating a successful Operating Model
The importance of leading with a well structured operating model to sustain your cyber security strategy investment and efficacy is quite often overlooked. A true operating model is broader than just your security team and cyber services...
categories
Cyber Security Strategy, Operating Models
What to consider when incorporating a successful Operating Model
Five ways to futureproof your cyber security strategy in 2022
Five ways to futureproof your cyber security strategy in 2022
While it may not be possible to avoid cyberattacks entirely, there are critical steps that businesses can take to strengthen their cybersecurity strategies and be better prepared for the inevitability of cyberthreats, download the tip sheet to learn more about:
categories
Cyber Security Strategy
Five ways to futureproof your cyber security strategy in 2022
Assessing digital risk goes beyond the cyber security strategy.
Assessing digital risk goes beyond the cyber security strategy.
As we are all required to find ways to deliver more with less, digital transformation is often one of the ways to meet this need. More often than not, we are so focused on the function of transforming that we do not consider the risks and net benefits of its objective ....
categories
Digital Transformation, Digital and Cyber Security Risk
Assessing digital risk goes beyond the cyber security strategy.
Risks to Consider Before Integrating AI and ML into Your Business.
Risks to Consider Before Integrating AI and ML into Your Business.
Despite the advantages, when it comes to transforming business operations, AI and ML aren't a quick fix or band-aid solution for all potential problems. And, they each come with potential risks to the business...
categories
Artificial Intelligence and Machine Learning, Digital Transformation, Digital and Cyber Security Risk
Risks to Consider Before Integrating AI and ML into Your Business.
Three Questions to Consider before going to RFP
Three Questions to Consider before going to RFP
Successfully selecting a cybersecurity firm to protect your organisation is not simple. IT security is highly technical, requires tools and expert people to work in concert, must match your risk profile, and fit in a budget, all in a constantly evolving threat landscape.
categories
Cyber Security Strategy
Three Questions to Consider before going to RFP