Category: Risk Management

  • Planning for Cyber Risk in Uncertainty: How Cross-Sector Threat Visibility Shapes Executive Decisions

    Planning for Cyber Risk in Uncertainty: How Cross-Sector Threat Visibility Shapes Executive Decisions

    Executive teams across Australia’s critical infrastructure sectors are expected to make decisions about cyber risk, investment, and capability in a landscape that rarely feels settled. Threat activity evolves quickly, technology dependencies continue to deepen, and expectations around resilience and accountability are increasing. Yet many of these decisions are still made with a constrained view of

    Read article →

  • Forever Chasing the Ambulance: Why Reactive, Informal Cyber Threat Sharing Fails

    Forever Chasing the Ambulance: Why Reactive, Informal Cyber Threat Sharing Fails

    In the previous instalments of this series, we’ve established the need for sovereign cybersecurity capabilities & highlighted the crucial difference between raw data and actionable intelligence. Now, we turn our attention to how we share cyber threat information, arguing that the method of sharing is just as critical as the information itself. Relying on unstructured,

    Read article →

  • Sovereign Cybersecurity: Safeguarding Australia’s Critical Infrastructure

    Sovereign Cybersecurity: Safeguarding Australia’s Critical Infrastructure

    Trust, control, and resilience: These principles are paramount in cybersecurity, especially when it comes to protecting national critical infrastructure. This fourth installment explores why sovereign capability is essential for secure information sharing and a stronger national cybersecurity posture. In today’s interconnected world, the battleground for modern warfare has expanded to include the digital realm. Critical

    Read article →

  • The ‘Canary in a coal mine’ – A Business Cyber Risk Case Study

    The ‘Canary in a coal mine’ – A Business Cyber Risk Case Study

    WhatsApp, Signal, iMessage: These everyday apps could be putting your organisation at significant risk, especially when it comes to your organisation sharing sensitive Cyber Threat Intelligence (CTI). This second installment delves into a recent US legal case that exposes the dangers of relying on informal communication channels & underscores the need for a more structured,

    Read article →