Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs April 6, 2023 3 Steps to Understanding IAM Challenges in Securing the DevSecOps Ecosystem This blog post was authored by Siobhan Moran - Director, Senthil Kumar Kothandaraman - Associate Director, Security and Privacy on The Technology Insights Blog. DevSecOps is an organisational software engineering culture and practice that aims at unifying software development (Dev), application security (Sec), and operations (Ops). The main characteristic of DevSecOps is to monitor and… Blogs October 5, 2023 Australia’s Privacy Act is fundamentally changing: What this means for your organisation On the 28th of September, the Australian Government released its long-awaited response to the Attorney General’s Privacy Act Review Report. The Government response outlines its stance across the 116 proposals put forward by the Attorney General. In May, we originally published our article analysing the proposed changes that we believe will be most impactful for our clients, we have updated the… Blogs April 21, 2023 Enhancing cyber capabilities using a threat-driven strategy Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite these… Blogs April 19, 2023 Achieving Diversity’s Benefits in Cybersecurity Could any security organisation benefit from greater innovation? Or from responding more effectively to diverse internal customers? How about benefitting by retaining the talent its leaders have so carefully nurtured, by accessing more diverse capabilities, or by improving problem-solving capabilities within the team? Blogs May 5, 2023 Creating a resilient cybersecurity strategy: The governance lifecycle approach Cybersecurity governance should do more than manage cyber risk. Good cybersecurity governance creates efficiencies by clarifying the outcomes expected from its processes and establishing boundaries of responsibility among cybersecurity practitioners, frontline operational areas, senior leaders and board members. Recently, numerous crises have drawn senior leaders and board members down… Whitepaper October 13, 2021 The Biden administration's executive order on cybersecurity and possible effects for financial services firms Safer supply chain, more information sharing, additional compliance Having faced more cyberattacks than other sectors, banks and other financial services firms have been at the forefront of the fight against cybercrime in recent years. To protect themselves, banks have substantially invested in cyberattack prevention and increased their incidence-response capabilities. Podcast Transcript January 5, 2021 Transcript - Building an Effective Industrial Control Systems Security Programme In this episode, Kevin Donahue, a senior director with Protiviti speaks with Protiviti's associate director Justin Turner and manager Derek Dunkel-JahanTigh about security for industrial control systems, or operational technology. Whitepaper July 28, 2022 Maximising OT Security and Resiliency Through a Risk-Based Framework The past 18 months have seen a significant increase in threats targeting critical infrastructure and operational technology (OT) networks. These environments are prime targets due to their age, complexity and importance to organisations. OT is the driver behind the largest corporations in the world – whether it is mixing the secret recipe for Coca-Cola, generating power for millions of customers… Load More