Logo of Centium
Contact Us

Prudential Standard CPS 234, which outlines the information security requirements that APRA regulated organisations must comply with, is a mandatory regulation issued by APRA to ensure that your organisation’s information assets remain safe and secure from breaches.

In order to increase the rigour of compliance of CPS 234, Boards of regulated entities are required to engage third party independent Auditors to undertake a thorough CPS 234 compliance audit, with the results reported to both the Board and APRA.

APRA has developed a program of tripartite independent information security compliance reviews across all its regulated industries to ensure these audits are being conducted and the entities are complying with the Standard. It has recently begun issuing notifications to regulated financial institutions advising them to start preparing for these reviews.

Who needs to comply with the CPS 234 Standard?

All APRA-regulated entities, which include:

  • Authorised deposit-taking institutions (ADIs) including foreign ADIs, and non-operating holding companies authorised under the Banking Act
  • General insurers, including Category C insurers, non-operating holding companies authorised under the Insurance Act (authorised insurance NOHCs), and parent entities of Level 2 insurance groups
  • Life companies, including friendly societies, eligible foreign life insurance companies (EFLICs) and non-operating holding companies registered under the Life Insurance Act
  • Private health insurers registered under the PHIPS Act and (e) RSE licensees under the SIS Act.

What does complying with CPS 234 mean for my organisation?

Compliance with the Standard will ensure the following within your organisation:

  • Board accountability for information security risks
  • Better management and security of information assets
  • Information security strategy alignment with the overall business strategy
  • Executive level representation at security governance committees
  • Effective third-party security compliance management
  • Appropriate security controls for the most critical & sensitive information assets
  • An effective assessment program for information security controls and incident management, including a periodically tested cyber incident response plan. 

What are the consequences of non-compliance?

As cybercriminals and their programs become more advanced, so too should Australian cybersecurity systems – and CPS 234 ensures that these businesses continue to develop and maintain their online defences. It goes without saying that non-compliant organisations are operating at a much higher risk of being exposed to a cyber security breach, including business interruption, confidential records being compromised or fraud.  Additionally, formal enforcement action may be taken for non-compliance and potential breach notices could be issued by APRA.

How can Centium help your organisation comply?

In order to meet the CPS 234 Standard, your organisation needs to employ an independent Auditor to undertake a thorough audit.

Centium is uniquely qualified to perform the requisite compliance audit and report as per Australian Standard on Assurance Engagements ASAE 3100 Compliance Engagements (ASAE 3100), issued by the Auditing and Assurance Standards Board.

We will:

  • Use our professional judgement to assess the risks that may cause material non- compliance with each of the CPS 234 paragraph 13 to 36 requirements
  • Consider relevant internal controls when designing our assurance procedures
  • Assess design and operating effectiveness of controls to meet CPS 234 compliance
  • Ensure that the engagement team possess the appropriate knowledge, skills and professional competencies
  • Apply independence in our role to ensure the highest integrity and acceptance of our work.
  • Deliver the audit report.

Contact Us

If your organisation needs a helping hand in complying with APRA’s CPS 234 Standard in order to increase your security and better manage your information assets, Centium is more than happy to discuss how we can help you.

For more information, please contact Scott Thomson, Director Cyber & IT on 0412 562 797 or scott.thomson@centium.com.au.

For further information about our service, team and experience, refer to our capability infosheet. If we can assist you, please don't hesitate to get in touch.

Workplace investigations of alleged misconduct can absorb a significant amount of resources and potentially contribute to industrial relations problems and staff morale issues.  A well-conducted, independent investigation of alleged workplace misconduct can greatly assist in effectively and fairly resolving a complaint and mitigating these organisational and employee impacts.

But a badly conducted or poorly documented investigation can only add to an organisation's problems, inviting scrutiny and challenges.

To avoid this, you need to ensure that all investigations reports are fit for purpose and demonstrate that the investigation was timely, complete, detailed and fair.

Without a clear process in place, this isn't easy to do. So, Centium's expert investigators have put together the following simple report evaluation checklist to help you identify the good from the not-so-good.

Ten criteria for evaluating investigation reports

1. The investigation achieved its purpose

The investigation achieved its purpose within the scope defined in the client-provided terms of reference and followed applicable policies and procedures.

2. The process was thorough

The investigator made all necessary enquiries, via a combination of document review and interviews.

3. Findings are evidence based

The findings of fact and the reasons for those findings were sound and evidence-based.

4. Valid reasoning for certain actions

The reasons the investigator did or did not pursue any lines of enquiry that came to light during the investigation were clearly articulated.

5. All parties were treated fairly

The investigation was fair to all parties, and the respondent was:

  • Advised in writing of the allegations against them and the particulars of those allegations
  • Given the opportunity to respond to the allegations in person and/or in writing
  • Given a fair and unbiased hearing

6. Findings are clear

The report concludes whether the allegations were substantiated or not substantiated and provides sufficient information to support such conclusions.

7. Mitigating circumstances are explained

Any mitigating circumstances associated with the findings are described and explained, which the delegated decision-maker can defer to when determining future action.

8. Any delays are explained

The reason for any delays that occurred during the investigation is set out, noting that such delays should have been brought to the client's attention during the investigation.

9. Supporting documents are included

All witness statements or interview transcripts and documentary evidence are attached to the report.

10. Structure & Quality Assurance 

A good quality investigation report:

  • Is logically structured, concise and grammatically correct
  • Includes a brief executive summary
  • Includes a brief narrative describing the circumstances that led to the investigation
  • Refers to the relevant sections of the organisation's code of conduct or policies that may have been breached
  • Is peer-reviewed
  • Includes a list of Attachments comprising all relevant documents, interview transcripts and other artefacts referred to in the report

Centium offers quality, independent and confidential investigation services

Centium provides investigation services to more than 100 organisations and has conducted more than 2,000 workplace and code of conduct investigations over the last two decades.

Our Ethical Conduct & Investigations specialists are committed to assisting our clients to achieve and maintain a robust governance framework and an ethical workplace culture. We can help organisations carry out investigations, review reports and improve complaint handling systems and processes.

To learn how we can assist your organisation, please contact Peter Mulhall, Director, Ethical Conduct & Investigations on peter.mulhall@centium.com.au or 0416 161 819 or browse Centium's Ethical Conduct & Investigations services.

How would you describe your company’s organisational risk culture?

Before you answer…

Cast your mind over recent publicly prominent investigations that have raised organisational risk management failings, with ever-increasing scrutiny of organisational risk culture.

Imagine for a moment a research department seeking to be the first to deliver new technologies. What if, in the race to deliver, staff take unacceptable risks and develop work-around technologies to meet the targets at any cost? What if these technologies go on to dupe millions of customers and cause untold reputational damage to the company? You don’t have to imagine, just remember Volkswagen’s recent failings.

Now consider a company that incentivises its employees using aspirational sales targets – these employees go on to not only exceed the targets but achieve unimaginable growth.  What if these staff were taking risks and not following company policies to meet the targets at any cost? What if that same company then went on to charge customers for products/services they didn’t want? What if this company also suffered massive data breaches? It’s not a what if. Not long ago, Wells Fargo was found to have pursued a business strategy that prioritised growth without ensuring appropriate management of risks.[1] What does this say about risk culture?

Closer to home, reflect on the now very public risk management failures of the Crown Resorts Group. The public inquiry, led by Patricia Bergin SC, highlighted (amongst other things) the misalignment between day-to-day practices, management reporting and the Board’s own risk appetite. What does this say about the Crown’s risk culture if the management team determined to handle important developments themselves…without “troubling the Board”?

So – how’s your organisational risk culture?

Risk Culture & Maturity

An organisation’s risk culture encompasses an array of behaviours, beliefs attitudes and competencies associated with perceptions of risk and related decision-making. 

Risk culture is a subset of broader organisational culture, or ‘the way we do things around here” - noting that there may be several such cultures within an organisation.[2]

Collectively, risk culture determines a team, division, department or possibly an organisation’s commitment to the principles and practices of risk management.  Alongside risk management frameworks, culture is a key influencing factor with respect to how individuals, teams or groups identify, manage, report and escalate risks.

Mature organisations effectively manage their risks. Such organisations have well-developed risk management frameworks, comprising formal policies, procedures, systems and processes. 

More importantly, organisations with mature risk cultures have:

  • A documented and shared understanding of their risk appetite and target maturity
  • Systems in place to regularly (and independently) check the consistency or “current state” of their risk culture
  • Achieved “buy-in” at all levels of the organisation as to the value of risk management
  • An inclination towards continuously improving against key risk maturity indicators.

When organisations don’t quite get it right… and what you can do…

There are a number of common pitfalls and/or reoccurring themes amongst organisations with less mature risk cultures

Deficient IT risk management systems 

Perhaps the most common issue is that of a poorly constructed, broken risk management system. Or worse still, an IT system that drives rather than supports risk management. Risk management systems that fail to adequately capture and report risks become a hindrance to risk culture. Over time, such systems become sidelined and eventually all but ignored.  

Typical pitfalls include the capture of too many risks; inconsistencies between system and organisational risk levels; overly complicated monitoring and review processes; insufficient training; and inadequate consideration of the resources required to both administer the system and ensure ongoing compliance.

A mature risk culture is underpinned by a system that is capable of capturing, managing and manipulating risk data. Implicit in this requirement, is that there are processes by which risk owners keep this information up-to-date to enable accurate analysis and reporting.

Limited recognition that variation in individual risk perception impacts culture

No two people perceive risk in the exact same manner and as such, an organisation made of many individuals will generate many differing views on risks. By way of example, a retrospective examination of critical incident causation will generally highlight differences in individual perceptions of risks and possible consequences.

Better practice organisations define and communicate risk behaviours and attitudes, and ensure that these are built into recruitment, induction, as well as training, information and awareness initiatives. Lessons learned are communicated so that corrective action can be taken, and employees are encouraged to report concerns.

Positive outcomes are emphasised over extant risk 

Organisations often promote positive achievements/activities irrespective of the fact that such actions incorporated a level of risk that attracted (or should have attracted) additional scrutiny and management oversight. This can lead to an escalation of risk tolerance and related attitudes/behaviours outside the desired culture, possibly increasing the overall risk.

Within a strong risk culture, risk roles, responsibilities and tolerances are clearly defined.  While achievements are celebrated, lessons learned are reviewed to consider impacts on risk tolerances. In addition, risk tolerances are periodically reviewed by governance committees, including the Executive, Board and Audit & Risk Committee. Importantly, decision-makers understand the organisation’s risk appetite and act/escalate matters outside agreed tolerances.

Absent or inappropriate communication of risk

Another common issue associated with poor organisational risk culture is inadequate or unclear communication regarding acceptable and unacceptable activities/behaviours.

Organisations with mature risk cultures communicate clearly, consistently and often. These organisations look for every opportunity to incorporate conversations about risk management into day-to-day activities and performance discussions; include risk management as a standing agenda item on team meetings, and ensure risk policies, procedures and systems are accessible and understood by staff.

Building a Strong Risk Culture

It should come as no surprise that regulatory bodies are increasingly scrutinising risk culture.  Public sector organisations are also increasingly coming to value a strong risk culture and hold their organisational leaders accountable. Independent assessment of risk culture is also an expectation of Boards and governance committees.

As recently noted by the Institute of Internal Auditors (IIA) Australia, there is currently no prescriptive role for the internal audit activity to audit risk culture. However, given the requirement to independently assess risk maturity and culture, there is an increasing role for internal audit in this regard.  External collaboration with like organisations and risk specialists is also central to a mature risk culture.

There are a number of fit-for-purpose tools available to assess risk culture maturity, including Auditing Risk Culture: A Practical Guide (IIA 2021). The NSW Treasury has also released a Risk Maturity Assessment Tool Guidance Paper that can be adapted for various sectors and business contexts.

So, before you get started, there are a few final things to consider:

  1. Is your in-house internal audit team independent?  If like many organisations, you combine your risk and audit activities, the answer is probably not. This was the recent experience of a health-related client, which in turn, opted to outsource their risk culture assessment to an independent and specialist provider.
  2. Is your organisation ready for the results?  While your organisation may have documented its risk management policies and procedures, they might not be understood or consistently adopted. The results of a comprehensive, ‘deep dive’ risk culture audit might thus be too confronting. Consider instead the path of a small mutual bank client, which has opted for a phased approach involving the executive in the first instance, with ‘deep dive’ audits to be rolled out across various divisions in future years.
  3. To what level of maturity does your organisation aspire?  Depending on the size and context of your organisation, it might not be cost effective or practicable to aim for ‘gold’ when ‘silver’ or ‘bronze’ is perfectly acceptable. This was a consideration for a moderate-sized NSW Local Council client when collaboratively developing a risk maturity program of works (i.e. ‘roadmap’).
  4. What is your risk appetite and is it shared by all layers of the organisation?  Key decision-makers should have a shared understanding of organisational risks and related tolerances. There should be consistency between the risk appetite of the oversight body (e.g. Board) and day-to-day decisions made by management/executive. Often an independent, specialist facilitator is required to elicit responses and craft the risk appetite statement, particularly given the divergence of views - this was the case for several, recent Not for Profit and Government sector clients.

How can Centium help you?

Risk management is frequently perceived as a defensive discipline. At Centium, we see risk management as a positive force that benefits all organisations. Properly executed and integrated into strategic and operational planning models, risk management can be used to prevent or mitigate negative events.

Risk management is also important in enabling organisations to take better advantage of positive events and opportunities for growth. Risk culture and risk maturity assessments are thus an exciting extension of this discipline. These services are further enhanced by expert advice and support to assist organisations build risk maturity via a fit-for-purpose program of works.

Contact our Director Risk & Assurance for a no-obligation discussion on 0409 251 011 or at penelope.corkill@centium.com.au. Alternatively, browse Centium's range of Risk & Assurance services.


[1] Press Release, US Federal Reserve, 2 February 2018.

[2] Auditing Risk Culture Guide, IIA, 2021.


In a month where billionaire entrepreneurs are reaching for the stars (or at least the edge of space), we thought it was timely to share our research and recent experiences about the audit topics that are trending in the Local Government audit universe.

Councils are probably aware that the NSW Audit Office has recently published an annual summary of its Local Government Internal Audit Program. This informative document (and there’s a short video for the time-poor) includes trends and patterns that might be of interest when planning a risk-based, local internal audit program.

More importantly, with Local Council elections postponed until December 2021, we expect that Council strategic and operational planning will be similarly pushed back. This presents an opportunity for internal audit to provide assurance regarding the management of high risks and the effectiveness of governance frameworks prior to the commencement of a new Council.

To ensure long-term effectiveness of frameworks and that new councils are well-positioned to continue to produce the best service delivery outcomes, Local Government internal audits should consider the following high-risk areas:

  1. Asset Management – Councils have millions (possibly billions) of dollars’ worth of assets under management, and as such, it is critical to have sound, robust controls over the asset lifecycle.  An internal audit could look at governance arrangements; planning and reporting; maintenance and replacement; and/or data and systems coverage.   This audit could also apply to Council’s broader asset management framework, or a sample of asset classes managed by Council. For example, roads, plant and fleet, property, leisure and community facilities, natural environment and waterways.  Importantly, this audit complements the external audit program, which looks at the valuation of various asset classes and their recognition in Council’s Financial Statements.
  2. Investments & Commercial Ventures – Investments and commercial ventures represent a strategically significant function for most Councils in ensuring financial sustainability and performance.  All investment decisions involve a degree of risk or uncertainty, which can result in potential financial shortfall and loss of investor (i.e. community) confidence. In the case of commercial entities, there are often additional risks associated with legislative or regulatory non-compliance and inadequate management of conflicts of interest (i.e. where Council is responsible for enforcing their own legislative and regulatory compliance).
  3. Fraud & Corruption Prevention – Councils in NSW are required to align their fraud and corruption prevention frameworks with the ten fraud control attributes outlined by the Audit Office of NSW. There is also a new Fraud and Corruption Control Standard that includes the minimum requirements of an effective fraud and corruption control system.  An audit can evaluate the potential for the occurrence of fraud and provide assurance that a Council is managing its fraud risks appropriately.  It can also identify and test high risk fraud areas to ensure controls are in place to mitigate risks to an acceptable level and, where not, recommend an appropriate improvement plan/remedial action.
  4. Work Health & Safety – The importance of minimising workplace injury and illness cannot be overstated. Councils have a primary duty of care to their workers and visitors to their workplace, including contractors and volunteers. There are numerous strategies and processes that employers and businesses need to have in place to comply with workplace health and safety legislation. An audit or health check against recognised standards can identify any gaps in compliance, minimise risks and suggest improvements. Alternatively, you could consider an audit of WHS culture or embeddedness to check that policies, procedures and good intentions are being adopted across Council.
  5. Procurement & Tendering – Still one of the highest risks for Local Councils, the controls over procurement and tendering are essential in minimising financial and reputational risks. A procurement and tendering audit can compare a Council's policies and procedures with good practices outlined by the Audit Office and/or ensure that these policies and procedures are understood and followed by staff at all levels of Council.
  6. Environmental Protection & Sustainability – Councils have numerous environmental obligations, including with regards to coastal and land management, Crown Land reforms and asbestos remediation. There are also annual environmental reporting obligations for Councils managing waste management facilities and/or water and sewer services. An audit of environmental initiatives, including one or more of its compliance obligations, can provide assurance that Council is taking all reasonable steps to mitigate its environmental (and associated reputational and financial) risks.
  7. Recruitment and Selection – the ICAC made a number of findings in its report into Operation Dasha that relate to the appointment of senior personnel within Councils. These findings are particularly topical given the period of organisational change expected to follow the December 2021 elections. An internal audit of the end-to-end recruitment process could provide reasonable assurance of compliance with in-house policies and procedures. Importantly, given the ICAC’s recommendations, such an audit might also consider the appropriateness and currency of Council’s policies and procedures in the context of relevant legislative provisions and the OLG’s standard contracts of employment.
  8. Cyber Security – Strong IT controls are critical in protecting a Council's systems, networks, and programs. Cyber-attacks aim to disrupt/interrupt normal business processes; gain access to information with the aim of stealing, changing or destroying content; and/or extort money from individuals or organisation. A cyber security audit against a recognised Standard will determine whether Council has strong and effective controls in place to protect sensitive information and minimise business disruption.   This audit is included on the Audit Office of NSW’s forward program for 2022-23 to 2023-24.

Centium's Approach to Internal Audit

An effective risk-based, internal audit plan enables well-run Councils to focus resources on their highest risks -  as well as areas that may be perceived as being of concern for new and incoming Councils. 

Centium offers an independent, insightful and practical perspective.  Importantly, we develop strong partnerships with our clients to provide assurance, build capacity and facilitate ownership of outcomes.  We are also available to provide advice and facilitate management discussions regarding risk.

Browse Centium's range of Risk & Assurance services or talk to us about how we can help.


The Australian Cyber Security Centre (ACSC) has updated its Essential Eight (8) Maturity Model in July 2021 to counter the sophistication of different levels of adversaries rather than just being aligned to the intent of a mitigation strategy.

The ACSC asserts that the maturity model is focused on "Windows-based internet-connected networks", and while it could be applied to other environments, other "mitigation strategies may be more appropriate".

Essential 8 Key Governance Changes: 

  1. Moving to a stronger risk-based approach to implementation.
  2. Implementing the mitigation strategies as a package. Organisations should fully achieve a maturity level across all eight mitigation strategies before moving to achieve a higher maturity level.
  3.  Redefining the number of maturity levels and what they represent.

 The following are the key high-level changes made within the updated Essential 8.

1. Maturity model moving to a stronger risk-based approach to implementation.

  • The ACSC acknowledged that organisations can be unfairly criticised for not strictly complying with the Essential Eight, even though they have strong cyber security practices and mature risk management processes.
  • The ACSC has updated the supporting guidance for the maturity model to note that while full implementation is ideal, there will be circumstances (such as legacy systems and technical debt) that may prevent this, and in such cases, risk management processes may adequately address this.

2. How can the mitigation strategies be implemented as a package?

  • Organisations have traditionally been assessed on each of the eight mitigation strategies individually. This resulted in eight maturity level ratings for each organisation. The previous approach was seen as potentially leading to a false sense of security. This was most noticeable when resources were used implementing Maturity Level Three for a few mitigation strategies (such as the Top Four) while other mitigation strategies were not addressed or addressed at a lower maturity level.
  •  Organisations are now advised to achieve a consistent maturity level across all eight mitigation strategies before moving onto a higher maturity level.
  •   Achieving a maturity level as a package will provide a more secure baseline than achieving higher maturity levels in a few mitigation strategies to the detriment of others. This is due to the Essential Eight being designed to complement each other and to provide broad coverage of various cyber threats.

3. Redefining the number of maturity levels and what they represent

Many of the details have changed, becoming more definite while also reducing timeframe recommendations. The following are the key technical changes:

  • Maturity level zero has been reintroduced, as organisations may fail to achieve Maturity Level One.
  • Under application control, maturity level one calls for "execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications, and control panel applets" to be prevented on workstations within user-profiles and temp folders. The next level up sees this extended to internet-facing servers and the executables white-listed. At level three, the restrictions include all servers as well as whitelisting drivers, using Microsoft's block rules, and validating the whitelist.
  • For patching applications, the level one recommendation now drops the patching of apps on internet-facing servers down to two weeks, or 48 hours if exploitation exists -- for workstation software, the deadline is a month. The ACSC is also recommending the use of vulnerability scanners daily on internet-facing servers, and fortnightly otherwise. “Internet-facing services, office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed," the level one recommendation states. At level two, the workstation application patch deadline drops to two weeks, while all other updates get a month-long deadline. Also at level two, vulnerability scanning should occur at least weekly on workstations, and fortnightly for all other parts of the network. Any unsupported application is removed at the highest level, and workstation patching drops to 48 hours if an exploit exists.
  •  Patching for operating systems has the same timelines and recommendations for vulnerability scanning, with the inclusion at level three of only using the latest, or immediately previous release, of a supported operating system.
  •  For the MS Office macro, the ACSC has also recommended for macros to be disabled for users without a business case, macros in downloaded files to be blocked, antivirus solutions to scan macros, and macro security to not be allowed to be changed by users. Level two sees macros blocked from Win32 API calls, and attempted macro executions logged. For level three, macros need to run from within a sandbox or trusted location and need to be validated and digitally signed by trusted publishers that occupy a list that is reviewed at least annually.
  •  Under application hardening and previous recommendations to block ads and Java in browsers, the ACSC adds that users cannot change security settings and IE 11 cannot process content from the net. Level two introduced the use of three attack surface reduction rules related to Microsoft Office and one attack surface reduction rule related to PDF software, while also being blocked from creating executables, injecting code into other processes, or activating OLE packages. Any blocked PowerShell scripts executions need to be centrally logged, and Office and PDF software security settings cannot be changed. Internet Explorer 11, NET Framework 3.5 and lower, and PowerShell 2.0 are disabled or removed at level three. PowerShell could also be configured to use Constrained Language Mode, ACSC states.
  •  Under restrict administrative privileges, the guide now says privileged accounts, except for privileged service accounts, should be prevented from accessing the internet and run only in a privileged environment that does not allow unprivileged logging on. At level two, access to privileged systems is disabled after a year unless reauthorised and is removed after 45 days of inactivity. The ACSC added that privileged environments cannot be visualised on unprivileged systems, admin activities should use jump servers, use and changes to privileged accounts should be logged, and credentials are unique and managed. At level three, the privileged service accounts exception is removed, just-in-time administration is used, privilege access is restricted only to what users need, and Windows Defender Credential Guard and Windows Defender Remote Credential Guard are used.
  • Multi-factor authentication (MFA) is recommended on third-party services that use an organisation's data, and on an entity's internet-facing servers. This increases to recommending MFA for privileged users and logging all MFA interactions at level two; for level three, it is expanded to include "important data repositories" and ensuring MFA is "verifier impersonation resistant ".
  •  Regarding backups, the prior monthly recommendation is dropped in favour of "a coordinated and resilient manner in accordance with business continuity requirements", and timeframes for testing recovery from backup and holding backup data are dropped. Added as a recommendation is ensuring unprivileged users have read-only access to their own backups. At level two, the read-only access is extended to privileged users. At level three, only backup administrators can read backups, and only "backup break glass accounts" can modify or delete backups.

To know more about the ACSC Essential Eight requirements, please visit the ACSC website.

How can Centium help you?

We have a team of ISMS experts and cybersecurity specialists who have worked with dozens of State Government agencies across NSW. We have also mapped out all related processes and requirements across Essential 8 and have developed a suite of (fully compliant) shortcuts and helpful “lessons learnt” to share with our clients. We can help you with the following:

  • Undertaking an Essential 8 maturity assessment
  • Reviewing/updating your ISMS so that it is risk-based, fit for purpose and aligned with the CSP
  • Undertaking an ISMS independent internal audit per CSP requirements
  • Conducting mock audits to identify any gaps that may prevent you from demonstrating CSP and Essential 8 improvement
  • Testing your Cyber Security Incident Response Plan
  • Testing your Business Continuity and ICT Recovery Plans
  • Reviewing your third-party supplier arrangements
  • Facilitating face-to-face and e-Learning cybersecurity sessions for staff and contractors.

Contact us

For more information, please contact Scott Thomson, Director, Cyber & IT on 0412 562 797 or scott.thomson@centium.com.au.

Explore Centium's robust and proven Cyber, IT & Business Continuity for small and medium Government organisations.

[1]Our thanks to the ACSC for proactively updating Essential 8 requirements and providing us with a supporting guidance document to understand the context of these changes.

Current challenges for CFOs

Most Chief Financial Officers are under time pressure – having to do more with less. Not only does the CFO have to ensure the controls over transaction processing are in place and the reporting ticks over like clockwork, but he/she also has to provide financial insight and significantly contribute to the Executive team.

The CFO is expected to facilitate the creation of a relevant and flexible plan which provides direction and improves business performance. With increasing uncertainty, business ambiguity, and environmental turbulence, there are great difficulties understanding what the future holds and how we should respond to various factors such as climate change, the COVID-19 pandemic, and trading partners. Some industries benefit and others are severely impacted. But all businesses need to develop a plan to be “future-ready”.

The desire is for the CFO is to have more time and control, less stress, improved decision making, better business alignment, and a forward-looking approach. The CFO needs to have a seat at the decision-making table and to be relevant to the CEO’s strategic thinking. The old response of a CFO to guess that next year’s revenue will be last year plus inflation plus 5% for growth are no longer good enough. Knocking up an Excel spreadsheet over the weekend with a bit of hope and ambition embedded in the formulae has become inadequate.

Some answers which many have tried, include:

  • Better technology – there are many good software packages which integrate with the ERP system and provide sophisticated reports, create budgets and financial plans, and display financial results in compelling graphs and coloured charts. However, technology alone is not the answer but merely an efficient vehicle.
  • More detail – the proven approach to understanding something has been to visualise items at a detail level. In the arena of expenses, many General Ledger Chart of Accounts have hundreds of line items for expenses, yet they often have only a few dozen revenue accounts. Yet it is the revenue that is difficult to be certain about, to understand, and to plan.
  • More resources – another approach to solve the issue is to have more resources and to have specialist resources who understand the financial planning and analysis techniques. This is a good, albeit costly, route to improvement, provided they bring a comprehensive suite of skills and experience to the arena.
  • More time – we often feel that time is the factor that is missing in getting the job done. Yet having more time and more focus does not address the issue of better and smarter thinking about planning.

The Good News – There is help available

High performing CFOs, who have a seat at the decision-making table, approach planning in a manner that is consistent with and contributes to the CEO’s strategic thinking and objectives. They are expected to facilitate relevant and flexible plans, to provide direction and improve business performance. How to deal with radical uncertainty is therefore a constant challenge.

Models and frameworks do exist, which the CFO can utilise, to accommodate extreme environmental unpredictability such as climate change, COVID-19, trading partners and other factors.

These models and frameworks can be best understood by taking into account the six non-negotiable lenses which will give rise to better, more strategic, ‘future-ready’ planning and decision making.

Six lenses for smart planning

Think about your time horizon

In Australia, most businesses use a fixed 12-month period for the budget which usually finishes on 30 June, occasionally 31 December. The right time for a plan horizon should usually be determined by decision making lead times – and so will vary between and within businesses. The Capex budget for a mining company could be 5 plus years.  The longest lead time for a new product could be 12-24 months. So the plan horizon should be at least 12 months. StatOil in Norway operates an exploration business with long lead times, a retail business with short lead times and a refinery business which has lead times somewhere in between.

So, this and other recent international trends seem to confirm that effective businesses today need to operate with a horizon greater than 12 months. This requires the adoption of a rolling forecast where the horizon rolls forward such that there is always a consistent level of visibility.

Forecasting to the wall

The conventional approach of 12 months fixed to 30 June determines that the length of the horizon will vary depending on the point of time during the year. Using a car-driving analogy, during the budgeting cycle we shine a strong light into the future, then we “turn off the high beams” and start driving into next year with low beams only. At the beginning of the year our lights illuminate all four quarters ahead. As we drive on and the quarters pass, the low beams gradually get covered in mud and become weaker and weaker… but we do not mind as long as we can see until year-end…Is this a safe way of driving in the dark?”

The following diagram illustrates this diminishing visibility of the future time after the wall of 30 June is reached.

What is a rolling forecast?

A driver-based rolling forecast is a management tool that enables a continuous planning process unencumbered by fiscal accounting periods.

The focus for this tool is the ongoing planning for the revenue required to maintain/grow profit margins, and the resources required for optimal capital investment – ie continuous “keep the lights on” work.

This continuous planning process immediately reflects known changes in sales, capital requirements, deteriorating delivery infrastructure, economic conditions, external forces and/or anything else that will affect the future physical and financial condition of the company.

Most businesses who have adopted rolling forecasts operate with a horizon that is longer than a year. Amex uses five quarters; Unilever Canada uses 18 months. This might not sound like a big change, but in fact, an 18-month rolling forecast, updated every quarter, can increase visibility by a factor of 3 over 1 within a fixed annual period.

Focus on revenue

The revenue element of the budget process is the hardest to forecast, as it is the most turbulent. Often the business drivers and the business model are not well known by those who are entrusted with preparing revenue projections. However, trying to ensure such projections are as accurate as possible is vital, as revenue drives the rest of the business.

Typically, when formulating the budget, the management team is comfortable with the expenses area of the forecast. This is reflected in the level of detail, most of which is historically based. Yet when looking at forecast accuracy, it is the revenue which has the greatest impact, both positively or negatively on the result. The level of revenue-related detail is often only a few lines, which reflects how poorly the causality of revenue is known or can be easily controlled.

Driver based planning

Driver-based forecasting focuses first on planning for the work that drives the economics of the business, such as:

  • Customer demand for existing and new products
  • Investments/upgrades/maintenance in the production and delivery of products
  • R&D / new product introductions
  • Reliability of logistics
  • The number and mix of customers and the propensity of those customers to contact the company
  • Events that cause disruptions in the delivery of products
  • Changes in regulation and rate-making tendencies (if a regulated company)

The key benefits of Driver-Based Planning are:

The key steps in getting ready for Driver-Based Planning are:

  • List your key business and value drivers
  • Create scenarios based on these key drivers
  • Categorize the resultant drivers as being either internal or external (refer diagram below).

Case Study: For a major university we looked at the major drivers, which for revenue were student enrolments (by degree type, under and post-graduate by subject area), and for costs were staffing numbers (staff rates by position and level). By factoring these drivers in we were able to develop the following financial forecasting models.

Forecasting Model Design

Faculties and Schools are responsible for carrying out the day-to-day teaching and research operations of the university. As such, they are in the best position to understand the detail of their operational drivers. The design of the University’s 5-year forecasting model is depicted below:

Model Design – Inputs (Drivers): Focusing on the key drivers of the university will enable the Finance team to formulate the forecasts quickly, with more time available to spend on analysing, rather than collecting data. Assumptions and rates should be pre-determined to ensure consistency across the university and ease of collection.

Overcome uncertainty with scenarios

All of the major banks in Australia use 5-year financial models to project their P&Ls and Balance Sheets. They are trying to address their interest rate risk (i.e., how their products change in terms of rates and volumes based on changes in the underlying market interest rates.) They have sophisticated software, measures, and risk appetite targets with formal decision-making processes driven by a powerful ALCO (Asset/ Liability Committee). The goal is to understand the nature of risk under different situations and to address strategies to mitigate the risk.

Case Study: For a major University we developed a base case and financial management plan and budget and then added on scenarios for changes in research funding and student enrolments.

Business confidence comes when a forecasting model is transparent and inclusive. Accordingly, getting participation from all relevant parties was vital to the forecasting process. Once the base case was developed, sandpit scenario modelling led to the development of management playbooks. Various forecast scenarios assisted in developing budgets and forecasting plans to help the University shape a different future, thereby enabling the organisation to become ‘future ready’.

This led to the development of a range of management playbooks that addressed changing student numbers by +/- 10% and changing research by +/- 10%. This process (which is depicted below) resulted in the following significant improvements:

  • Clear visibility of the bottom-line impact of the initiatives over each year of the 5-year horizon;
  • The generation of insightful understanding about the value and risk of each initiative versus the “Do Nothing” option;
  • Development of a financial mechanism for Faculties to utilise for future initiatives; and
  • A stronger integration of Finance into the University’s executive decision-making processes.

Use modern technology

Most financial models are developed using Excel. However there are many limitations to spreadsheets which are improved by using specialist budgeting and planning software.

Spreadsheets vs. software

Strong communication

The Planning team should lead a process to make better smarter decisions. As well as producing an information pack which includes the financial results and future plans, the finance team should identify options, make recommendations and lead a discussion to support the Executive Leadership Team to make smarter plans. The Finance Team needs to help facilitate answers to these questions and to then clearly and consistently communicate these to all relevant parties.

Conclusion

The big opportunity for the ‘modern’ CFO is to not only gain more time in the planning process, but to also be more relevant to and an integral component of the Executive’s strategic planning and decision-making functions.

The key message is that while CFOs cannot 100% accurately forecast the future for both them and their organisation, with ‘good enough’ foresight, wise preparation, and timely action, they can significantly contribute to making their organisation’s future direction and desired performance levels much more predictable.  The best analogy is for the CFO to be more aligned with the navigator of a sailing ship, rather than a fortune teller.

Centium’s Director Financial Management Consulting (Grahame Scriven) has many years’ experience in the Financial Services, Commercial, Government and Education sectors. He has lived through the transition stages of the ‘modern’ CFO and has personally implemented many of the strategies referred to above.

If you would like to have a confidential and obligation-free discussion, please email or call Grahame Scriven on grahame.scriven@centium.com.au or 0422 773 352 or contact us to arrange a 1-hour Teams meeting or else an in-person consultation to address your business challenges and how Centium can help. Browse additional information about Centium's Financial Management Consulting services.

The buzz term of recent years in local government has been ‘smart cities’ – a pretty exciting concept for those people working at the heart of delivery services in our communities. Billions of connected devices instantly translate our physical world into the digital realm by capturing and analysing data about our surroundings in real time.

As examples across the developed world are already proving, it’s no exaggeration to say that the IoT (Internet of Things) has the potential to dramatically transform how we live and work, including:

  • Digital factories in countries such as Japan and the USA are operating at previously unimaginable levels of efficiency and flexibility to scale to the market
  • Farmers are now able to increase productivity and improve sustainability at the same time
  • Our cities offer residents all kinds of new integrated work and lifestyle services at lower cost
  • Consumers are able to access a range of applications that make their lives more convenient and their homes safer
  • Building energy usage can be reduced by 20%, saving on emissions and costs.

Connecting our homes and workspaces can deliver enormous efficiency, safety and convenience benefits. Yet the networks of sensors, the data they collect, and the complex software and algorithms used to analyse the data are now combining into IoT ecosystems that challenge traditional governance approaches.

The rapid growth of the IoT raises critical concerns about its security.

The question needs to be asked: is it smart to connect multiple infrastructures and new built environments, without designing and factoring in security against potentially debilitating cyber attacks?

Think of that classic movie scene – from virtually any era you might belong to – where a city is bought to a standstill by criminals in control of a city’s traffic light system. They are able to flee the crime scene after a heist, with the city in gridlock and police unable to pursue them.

Now extrapolate from this to the smart city environment. We don’t need to paint some kind of doomsday picture. But the fact is if we think about all the smart sensors we are deploying across local government infrastructure, to collect data in order to make services more efficient, or to optimise other characteristics to serve our communities, the compound effects of a cyber attack are magnified.

Smart cities really are not smart unless they are secure. IoT environments are different in a number of critical ways to what we might consider ‘traditional’ connected environments. The vast number of interconnected devices and sensors in the IoT environment offer hackers a huge choice of points of entry or attack.

Devices such as routers that aggregate IoT data may have numerous vulnerabilities. Most IoT vendors offer their own devices and network elements, with different security features, capabilities and levels of protection, making it very difficult to develop industry-wide security protocols. Many IoT systems are connected to sensitive corporate and government networks, offering hackers especially tempting targets.

Time for improved security awareness and revised governance arrangements

It’s time for a new set of governance arrangements around ubiquitous connectivity – the IoT and smart cities – to safeguard our built environments, our food production and every aspect of our interconnected world.

We need to get this right for the safety of our citizens. Already, there are more connected devices than people in the world, and it is predicted that by 2025, 41.6 billion devices will be capturing data on how we live, work, move through our cities, and operate and maintain the machines on which we depend.

When we reach ubiquitous connectivity, which is not far away, the consequences of a major cyber attack will be of a far different scale to those we regularly read about in the news today.

Perhaps one of the biggest risks we face is the relative lack of awareness of security amongst the community. We are recently witnessing Government agencies taking cyber security training for their staff seriously. However, what is further required is for all workplaces to take a far greater responsibility for public awareness of ‘security by design’.

As the tipping point of connectivity is reached, where more everyday ‘things’ are connected than not, there will be an urgent need to remediate any organisations that do not have strong basic cyber security measures in place. This will need to be augmented by more specific standards and certifications for industries with particular exposures.

How local Councils can benefit from secure smart technology

Smart technology represents huge opportunities and enables many benefits across council and community settings. There are already many examples of projects across NSW where technology is being used to enhance the lives of the citizens of NSW, including:

  • Sensors detecting the presence of activity and lighting up public areas, saving Councils thousands in electricity costs – and making areas safer at night
  • Pavement integrated sensors sending real-time updates (and historical data) of traffic flow to automatically adjust traffic lights
  • Rubbish bins fitted with sensors telling collectors when they need emptying

IoT technology has also been successfully used to help fight the COVID-19 pandemic, utilsing smartphones and wearables to monitor social distancing and aid contact tracing.

But it’s not an easy job for our local Councils to concurrently deliver a diverse range of community services, while also ensuring the cyber security of its essential services and operations. The incredibly fast pace of digital change, compounded by the impacts of recent events like drought, bushfires, floods and the COVID-19 pandemic, means that Council finances are stretched to the limit. Leadership is thus required to ensure the implementation of best practice security standards, and to ensure that the ‘crown jewels’ of local Council infrastructure are protected with the relevant cyber security controls.

Last year the State Government’s $45 million Smart Places Strategy assisted some NSW local Councils with the uptake of smart technologies. Conversations with local government officials reveal that funding is beginning to trickle down from the State to local level with some targeted resources provided. However, we can’t under-estimate the scale of the challenge facing Councils as the owners of some very significant infrastructure, as it becomes more connected.

To successfully address these challenges, Councils will need to start:

  • Mapping out all local authority infrastructure and its connectivity
  • Identifying which pieces of infrastructure they consider to be ‘critical’ (i.e. if they fail the lights go out)
  • Assessing the critical inter-dependencies between each piece of infrastructure
  • Following guidance laid out in the ISO37100 series of Standards on smart cities

Technology now reaches into most aspects of our lives, whether we live in a ‘smart city’ or not. It guides our spending decisions, directs us home, informs our holiday plans, tracks our movements and aids our productivity in many ways. This places even greater importance on ensuring the continuity of and security of services to ensure we are rarely, ideally never, disconnected. The Audit Office is rightly taking what this means for the security of both State and Local Government very seriously, by reaffirming their commitment to an audit programme of NSW Council cyber security in the remainder of 2021.

Centium works closely with a number of Local Councils and State Government colleagues to implement information security best practice. We ensure these agencies are compliant with all requisite standards and their staff are trained in their roles and responsibilities. We also test the preparedness of our client’s response to potential threats by conducting tailored, real-life simulation scenarios.

For a free, no obligation conversation about getting started with the next phase of your cyber security journey, call Centium’s Director Cyber & IT, Scott Thomson, on 0412 562 797 or contact us online.

Cash transactions are slowly dwindling in Australia. The Reserve Bank’s 2019 Consumer Payments Survey found that only 32% of in-person transactions are conducted in cash, with the fall in small transactions (i.e. under ten dollars) particularly pronounced given “tap and go” technologies.

The percentage of cash transactions has decreased even further over the past year, as a result of the Covid pandemic.

But despite its recent fall in popularity, there is no denying that cash will continue to be regularly used by some customers (such as older persons), and occasionally by all of us (due to system outages and accessibility issues). Because of this, most businesses will continue to accept cash transactions, and accumulate cash takings throughout the day.

These takings remain attractive and subject to risks - namely financial, physical security and fraud.

What does this mean for internal audit?

It is suggested that while businesses continue to accept cash transactions there is still a role for internal audit. However, in our experience, a more modern approach is required to enable internal audit to monitor cash handling activities and build capacity as part of its “first line of defense”. This could involve such aspects as CCTV surveillance monitoring and notification to the public; staff safety regarding potential armed hold up; counterfeit notes information, identification and reporting procedures; and strategies to maintain a low level of cash on hand, including monitoring the frequency of cash collection by armed security.

Centium specialises in minimising risk for small to medium organisations, many of whom deal with a broad range of businesses that handle cash.

Our team has developed a self-assessment checklist, which is based on good practice controls and is designed to be completed by front-line supervisors on an agreed periodic basis. It can also be adapted to support staff induction activities.

The checklist includes the following cash handling aspects:

  • Strategy and policy
  • Staff awareness and training
  • Cash handling practices
  • Physical security
  • Cashing up and banking
  • Receipts and recordkeeping
  • Processes for “overs” and “unders”

For a FREE COPY of our self-assessment checklist or for more information as to how we could help your business improve its cash handling and financial operations, Contact Us online or give us a call on 1300 237 810.

Still prefer Credit Card payments? Don’t forget that all organisations who receive credit card payments have responsibilities and obligations to comply with, as per the Payment Card Industry Data Security Standard (PCI DSS). Click here for further details on how best to stay compliant.

Privacy Awareness Week is a global campaign that highlights the importance of maintaining privacy and raises awareness for public sector agencies about how to protect the personal information of the people they serve.

Respecting privacy is important because it can be highly personal. We are all different, and everyone has different ideas about their privacy. While some people might not be concerned about certain information being kept private, others have their own reasons to worry – including reputational damage, previous trauma or anxiety, a history of harassment or abuse, or even prior experience of identity theft.

Firstly, what is (and is not) Personal Information?

Personal information is:

  • Information or an opinion about an individual which can identify the person, and can be in either hard or soft copy format

Personal information is not:

  • Information that is already publicly available, for example online or in a directory
  • Information or an opinion about the individual’s suitability for appointment or employment as a public official
  • Information about someone who has been deceased for more than 30 years

Privacy obligations in NSW

Under NSW privacy laws, public sector agencies and their staff are responsible for protecting the personal information they collect. 

Government organisations hold a wealth of personal information, with some examples including:

1. Records of property ownership8. Leave and salary details
2. Submissions9. Complaints, investigations and disciplinary matters
3. Various kinds of applications10. Qualifications, tickets, licenses and education history
4. Service attendance lists11. Pecuniary interests returns
5. Petitions12. Tax file numbers and bank account details
6. Booking systems13. Performance management plans
7. Insurance claims14. Medical certificates

There are legal obligations by which NSW public sector agencies, statutory bodies, universities and local councils must abide by when they collect, store, use or disclose personal information.

These obligations are outlined in the Privacy and Personal Information Protection Act 1998 (PPIP Act) and the Health Records and Information Privacy Act 2002 (HRIP Act).

How can you respect and prioritise privacy?

It’s simple. If staff have access to personal information and receive a query or request for that information, they need to think about their privacy obligations. Staff should look for all possible reasons as to why the information might be sensitive, and always comply with the rules set out in the legislation.  

Importantly, staff should not become complacent and should actively participate in training regarding their privacy obligations.

How can Centium help

Centium has developed a new Privacy eLearning module based on NSW legislation. The module aims to raise awareness of the importance of privacy and provide practical information to allow staff to fulfil their legislative obligations.

Our suite of eLearning modules:

  • Are standalone or compatible with most in-house learning management systems
  • Are Quick, engaging and effective
  • Can complement or replace face-to-face training
  • Are easy to access
  • Require minimal administration
  • Include a range of day-to-day scenarios regularly faced by public employees

In addition to our Privacy module, Centium has also developed other eLearning modules on the Local Government Code of Conduct, Records and Information Management, and the Public Interest Disclosures Act.

To discuss your information and governance training needs or for more information about how our eLearning solutions can meet your unique needs and circumstances, please contact us or check out our Learning and Development services.

The Auditor General’s Report into Local Government published on May 27th highlights how important business continuity activity will be to local Councils for the remainder of 2021. The Report concluded that Council’s plans need to be updated to reflect lessons learnt from the disasters of recent years. The Audit Office will be conducting a performance audit of business continuity planning in the coming months.

Amongst all the doom and uncertainty associated with Covid-19, there was one tangible benefit that emerged for most organisations. That was that they were compelled to review the currency and efficacy of their Business Continuity Management (BCM) framework and implement (in real-time) their Business Continuity Plan (BCP).

While the vast majority may not have included such a significant pandemic event in their BCP, the better-managed organisations were able to quickly address this anomaly, confront the prevailing challenges and are now recovering in a ‘new normal’ operating environment.

While we all certainly hope we don’t face an event like Covid-19 again any time soon, it has shown us the importance of having the appropriate preparations and frameworks in place in case of business disruption. Ensuring you’re aware of the components of a robust and dynamic BCM framework – and that these components are actively reviewed and fit for purpose – has maybe never been more important.

What is Business Continuity?

BCP gives your organisation a structured approach to respond to unexpected business disruptions, such as fires, floods or severe weather events, IT outages, cyber incidents, outbreaks of pandemics or supply chain outages.

When it comes to ensuring your organisation can survive these kinds of incidents, maintain its operations and protect its reputation, brand and shareholder value, there is certainly truth in the 16th Century saying, “forewarned, is forearmed”. Industry research by the USA Federal Emergency Management Agency (FEMA) shows that “40% of businesses that have no plan do not reopen following a disaster and an additional 25% will fail within one year.”

Business Continuity Benefits

In some industries, Business Continuity Management is mandatory or even regulated (such as financial services). In others, such as the media industry, it’s not even on the radar. Regardless of whether you are mandated to implement BCM or not, there are many benefits for doing so, including:

  • Business priorities, roles and responsibilities, resources and expectations are predefined so that in the event of an incident, a structured response is in place
  • Business Continuity Plans can be tested and exercised via simulation incidents to improve their effectiveness in a real incident and also raise organisational awareness of what to do should disaster strike
  • There are marketing benefits to having business continuity in place; it enables you to demonstrate to the outside world (i.e. customers, suppliers and other stakeholders) that your business is robust
  • Above all, it is simply good business practice to know that you have a plan in place to deal with unforeseen incidents or disasters

Of course, some say that the time and cost to implement and maintain business continuity management is not worthwhile. They’d prefer to simply deal with an incident or disaster if and when it arises or hope that all business risks will just ‘go away’. But with the frequency, severity and impact of all types of incidents and disasters on the rise (including cyber incidents, climate-change related natural disasters and the current pandemic), there is an increasing demand for organisations to increase their business resilience and continuity capabilities.

Business Continuity Methodology

There are numerous local and international standards for business continuity management, as well as those from the likes of the Disaster Recovery Institute .

Regardless of which methodology you adopt, there is consensus that BC projects should be broken into several project stages or phases, as demonstrated in this diagram and detailed below.

  • Stage 1 – Understanding your Business. This stage, often referred to as a Business Impact Assessment, assesses the business strategy, structure, functions and processes, in addition to prioritising possible operational risks and their potential business impact. Deliverable: BC Requirements
  • Stage 2 – Business Continuity Strategy Options. Response strategy options for various incidents and impacts, often including business case and expected financial expenditure. Deliverable: BC Strategy Options
  • Stage 3 – Develop & Implement Plans. Specific BC Plans for each Business Unit, Location and Executive Team(s). Deliverable: BC Plans
  • Stage 4 – Training & Awareness. Training and awareness materials for internal staff and external stakeholders. Deliverable: BC Training Plan, BC Training Materials
  • Stage 5 – Test and Exercise. Test and Exercise work-specific Scenario Incidents to stress test and prove the BC Plans. Deliverable: BC Exercise Plan, Incident Scenarios and BC Exercise Outcomes Reports
  • Stage 6 – Maintain, Govern and Audit. Maintenance plans for ongoing review and update of risks, business impacts and response plans, along with governance and audit schedules and plans to keep plans up-to-date. Deliverable: BC Maintenance Plan, BC Audit and Governance Plan

Business Continuity Plan Structure & Content

While a BCP format varies widely depending on the audience and intended use, a mature Plan will include quick reference ‘aid-memoires’, handbooks, business unit or location-specific plans, and executive focused Command Team’ plans. Increasingly, BCPs are made available online via specialist business continuity software packages, intranet sites and smartphone applications.

When deciding on BC Plan structure, format and content, no one size fits all. Whether you opt for 100+ page documents, BC Summary Handbooks or 1-page Quick Reference Guides, the considerations include:

  • Design with the audience in mind. Will your executive team happily read though a lengthy document when their building is on fire? Or is a Quick Reference Guide, with high-level principles, more appropriate?
  • Compliance Requirements. When operating in a regulated industry, there may be a specific format and/or content dictated to you. Ensure you check regulatory requirements before starting BC plan development.
  • Certification to Standards. If you want formal certification to international standards such as ISO22301, review them carefully to understand any specific requirements they may have.

Ultimately, a combination of various continuity plans may be needed to meet all of your organisations’ stakeholder requirements.

Business Continuity Governance and Maintenance

Perhaps the most important aspect of Business Continuity Management is that it is viewed as a “process, not a project”. Point-in-time risk assessments, business impact analysis, business continuity strategies and plans can quickly become out of date, given today’s dynamic nature of business. Changes in business location, structure, staffing, processes, IT infrastructure and applications are all aspects of organisational change that impact continuity strategies and plans. And with out-of-date business continuity plans providing a false sense of security, relying on them can be fatal to business survival.

Therefore, a clear plan of governance and maintenance activities is critical to the ongoing success of business continuity management. This should map out the timing and responsibilities for all activities: risk business impact assessment reviews, business continuity plan updates, revision of education and training for staff and continuity team members and testing and exercising activities.

Industry good practice recommends annual governance and maintenance. The timing of these actions is dependent on many factors (such as company size, industry, regulatory requirements, budget availability and risk appetite). However, in our experience, relying on an annual review is fraught with danger and ideally continuous, or at a minimum quarterly, activities maintenance program should be put in place.

How can Centium help you?

Centium has partnered with a specialist Business Continuity service provider who can carry out all aspects of business continuity planning for your organisation. With over 20 years in business, over 140 clients, and over 450 consultancy projects, our accredited BCM partner can quickly and efficiently develop solutions tailored to your specific needs. Further, they offer an outsourced ‘managed service’ to ensure your plan is actively maintained, is current and always fit-for-purpose.

Combined with Centium’s in-house expertise in resilience, cyber and risk management services, we can provide our State and Local Government clients with a comprehensive and robust business continuity management service. This service is further enhanced by a tailored knowledge sharing and training program, which in turn enhances the effectiveness and timeliness of any identified corrective actions.

Contact our Director Risk & Assurance for a no-obligation discussion on penelope.corkill@centium.com.au or 0409 251 011

What is a Pen Test?

A cyber security penetration test (colloquially known as a pen test and sometimes described as ethical hacking) is an authorised simulated cyberattack on a computer system, performed to evaluate the security of the target system.

Pen tests are frequently mentioned in the media, yet when they are reported, their results are never released. That keeps the results confidential and secure – and ensure hackers can’t decompile them for their own further nefarious uses. However, for the external viewer, there is always an element of mystery and IT technical complexity surrounding these tests.

At the end of the test/s, a report is delivered to the client showing the weaknesses that have been found, so that the client can implement measures to reduce them. And there are other real benefits to pen testing, which we outline further below.

Pros and Cons

Potential benefits of a pen test include:

  • Identifying possible security holes before an attacker can
  • Identifying possible vulnerabilities in a network or computer program
  • Providing information that can help security teams mitigate vulnerabilities and create a control mechanism for attack.

Some of the potential drawbacks are:

  • Outages to critical services if the pen test is poorly designed or executed, which can end up causing more damage to the company in general
  • Difficulty conducting pen tests on legacy systems, which are often vital to businesses
  • Due to the nature of pen testing, it's impossible to guarantee that no unexpected reactions to testing will occur
  • It can be challenging to source a qualified resource who can provide the significant levels of expertise required in a cost-effective manner

Pen Test Reports

So, with all that mystery and IT technical complexity surrounding it, what does a pen test report look like? It will all depend on the outcomes and findings of those tests, and vary as much as the tests themselves. Always technical in nature and usually very confidential, the Executive Summary of a straight-forward pen test report can look similar to the example below.

Why do a Pen Test?

There are numerous benefits from employing penetration testing, which clearly outweigh the potential drawbacks:

Protect corporate reputation and company profile Pen testing helps an organisation avoid data incidents that may put the company’s reputation and reliability at risk.

Identify and assess security threats Organisations can more efficiently anticipate potential security threats and avoid illegal or unauthorised access to crucial information and critical systems through executing regular and complete pen testing.

Avoid application and network downtime Pen testing helps an organisation escape financial losses by proactively detecting and addressing threats before security breaches or attacks take place.

Service outages and cyber events are expensive Regular pen testing reduces the risk of incurring these expenses by the organisation than to face exceptional losses, commercial confidentiality, service availability and customer disruption.

Compliance obligations The reports produced by the pen tests can assist organisations in demonstrating compliance with Government or regulatory body standards, such as PCI or ISO 27001 certification. It assists the organisations to demonstrate ongoing due diligence to auditors by maintaining required security controls.

When and How Often?

Some companies make the mistake of starting a pen test too early on a network or system deployment. When a system or network is being deployed, changes are constantly occurring, and if a pen test is undertaken too early in that process, it might not be able to catch possible future security holes. In general, a pen test should be done right before a system is put into production, once the system is no longer in a state of constant change.

A pen test is not a one-time task. Networks and computer systems are dynamic — they do not stay the same for very long. As time goes on, new software is deployed and changes are made, and they need to be tested or retested.

How often a company should engage in pen testing depends on several factors, including:

  • Company size. Bigger organisations with a greater online presence might also have more urgency to test their systems, since they would have more attack vectors and might be juicier targets for threat actors.
  • Budget. Pen tests can be expensive, so an organization with a smaller budget might be less able to conduct them. A lack of funds might restrict pen testing to once every two years, for example, while a bigger budget might allow for more frequent and thorough testing.
  • Regulations, laws and compliance. Depending on the industry, various laws and regulations might require organizations to perform certain security tasks, including pen testing.
  • Infrastructure. Certain companies might have a 100 percent cloud environment and might not be allowed to test the cloud provider’s infrastructure. The provider may already conduct pen tests internally.

How can Centium help you?

Centium has partnered with two specialist Pen Testing firms who carry out the vulnerability assessments and penetration tests required to detail all risks pertaining to systems and applications in an organisation.

When combined with Centium’s in-house expertise in cyber and IT risk management services, we are able to provide our clients with a comprehensive vulnerability assessment service. This service is further enhanced by a tailored knowledge sharing and training program, which in turn enhances the effectiveness and timeliness of any identified corrective actions.

With Centium as your cyber security partner, you can rest assured that your valuable information and IT systems are protected, and you will be much better placed to mitigate potential cyber-attacks.

Centium specialises in cyber security and information management. Discover how we can help today by contacting us for a free consultation.

Our Clients

Top