ARE YOUR CYBER RISKS UNDER CONTROL?

IT plays a critical role in business success. When performing well, IT systems support management in fulfilling the business strategy, providing timely, reliable data in a secure environment; at their worst they drain investment resources and hamper efficient decision-making and operations. 

With over 84% of Australian businesses online and over 12000 cyber-crimes in Australia last year, now is the time consider your cyber readiness. 91% of attacks start with an email, and the average cost to a business per attack is over $275,000. Boards and management teams need confidence that their IT systems are secure and able to withstand external or internal threats.

Many businesses appreciate the value of gaining expert external assistance to ensure that IT systems and controls are working effectively and securely – and will continue to do so.

The challenge is to harness the power of your IT while managing the risks.

 
Considering new and emerging cyber threats
 
While the IT environment at many organisations has functioned successfully for a long period of time, this is often largely due to the experience of IT employees, who have a good knowledge of the organisation and experience in its information technology environment. Many Board members and CEO’s are now asking if management has sufficient systems and processes in place to protect the organisation against new and emerging cyber threats.
 
The Prosperity Cyber Assessment covers the foundational cyber prevention practices that should be addressed in all organisations with practical recommendations provided on how to best address gaps.
 
Scope and objectives
 
The objectives of the Prosperity Cyber Assessment are to:
 
  • Provide management with a high-level assessment of the status of cyber risk preparedness; and
  • Consider controls in place to prevent a cyber risk eventuating.

The scope includes considering your approach to:

  • Assignment of security responsibilities
  • Cyber risk analysis
  • Security strategy and policies
  • Remediation activities
  • Third party vendors
  • Staff training
  • Independent review
  • Security controls currently in place
  • Backup arrangements
  • Mobile device management
  • Incident reporting and logging. 
We work with clients to understand their operations, objectives, technology risks, IT control framework, regulatory environment and priorities.

 

What is involved?
 
We provide you with a checklist to complete and return to us, or we can meet with your IT personnel to understand your organisation’s cyber preparedness, and the controls in situ in your organisation. Based on your responses, a report will be provided rating your cyber maturity, and detailing steps you can take immediately to improve your cyber risk preparedness.
 
Additional steps
 
In addition to the Prosperity Cyber Assessment, we can also support the development, implementation and operation of your entire information security program.
 
We do this by:
 
  • Delivering a detailed vulnerability assessment to understand potential technical security issues; 
  • Reviewing your security policies, standards, guidelines and procedures for adequacy;
  • Assessing your compliance with regulatory obligations and industry standards; and
  • Building your security information and event management framework so that you receive real-time analysis of security alerts generated by your applications and network hardware. 
We then help integrate your security program with your overall risk management processes, to ensure decision- makers are presented with comprehensive and consistent risk and loss event information.

 

Our service model

We work with clients to understand their operations, objectives, technology risks,
IT control framework, regulatory environment and priorities. This high quality service is provided in the most cost-efficient manner.
 
Contact us
 
If you would like to discuss your cybersecurity assurance needs with one of our Directors, please contact Stephen Coates on +61 468 686 093 or at scoates@prosperity.com.au.

 

Related Articles