We recently moved our readers to a new system. You may need to reset your password here to login.
Not a member ? Join here for free.
Forgot your password?
Home Features The enemy within: seven strategies to stop cyber breaches
Text size :
PEOPLEPwC, Richard Bergman
TAGS data security, Information security, Threat, Computer crimes, Computer security
While focus is normally on preventing external technology threats, department and agency heads need to look closer to home when implementing preventative strategies.
A significant amount of time and money across the public sector is focused on external cyber breaches and threats. But the landscape and risk has shifted such that we need to re-think and reprioritise the level of investment and focus on the insider threat.
The latest research by PwC on the 2015 Global State of Information Security reveals that insider cyber crimes are both more frequent, but also more damaging than outside attacks.
So while the Australian Government continues to invest significantly in national security, with a focus on nation-states, hacktivists, and organised crime groups, the threat landscape is changing and for the Australian public sector the insider threat is a clear and present danger, according to PwC Cyber security expert Richard Bergman.
Receive unlimited access, get all the latest public sector news and features, plus The Juice, our daily news update sent direct to your inbox.
The Mandarin is where Australia's public sector leaders discuss their work and the issues faced within modern bureaucracy. Join today to discover the latest in public administration thinking and news from our dedicated reporters, current and former agency heads and senior executives.
Richard is a Partner in PwC’s Cyber business and works with organisations to balance the risks of Cyber with the upside of the rapid adoption of Digital. Richard leads the firm’s national Incident Response, Threat Intelligence, Cyber Analytics and Cyber Forensics capabilities.
Richard works across the public and private sector and has deep expertise in leading complex incident response and cyber investigations throughout Australia, Asia, Europe and the US.
Read Related Content
Pingback: The enemy within: seven strategies to stop cyber breaches()