<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

EXCLUSIVE CONTENT

Measuring DevSecOps Effectiveness, Australia

The DevSecOps Shift Has Arrived


The way applications are developed, deployed, accessed and used has changed.

Infrastructures that were once contained and relatively straightforward to encircle with security measures have become complex and multi-cloud. Applications are now operationalised in tandem with their development, live online and are updated regularly and rapidly. Just as development has been modernised with DevOps practices, securing applications is undergoing a similar shift to become DevSecOps, with security decisions and processes now embedded into the development cycle.

This report examines the processes and best practices currently being used to evaluate the effectiveness of DevSecOps practices. Through insights gathered from cybersecurity leaders within organisations using DevSecOps approaches, we discuss how security leaders measure these programs and what considerations other CISOs and cyber leaders should make to improve security in DevOps.

Download your copy today!

Download page Square Image DevSecOps Bois

Download your copy

0904 Rapid7 SupplyChainBanner1

 

Supply chains represent a considerable area of risk for organisations all over the world. From software to services, any engagement an organisation has with an outside party comes with risk that must be managed.

With large organisations participating in more supply chains than ever, and those relationships often being deep, the surface area for potential threats grows ever wider, with new conduits for cybercriminals to traverse and attack their targets.

Featuring insights from interviews and independent research, this report explores the way Australian security leaders consider and manage the cybersecurity risks through their chain of suppliers.

Download your copy of the full report today to find out more!

Download your copy

Identity Risk Intelligence Trends Australia, 2022

Australian Cybersecurity Leaders Share Insights and Explore Challenges Related to the Future of Identity Security

What role does identity and authorisation play in risk, and how is that risk managed by Australian cybersecurity leaders?

Featuring insights from interviews with expert cybersecurity leaders, this report will explore the way Australian security professionals view risk through an identity lens, the approaches they take to gain intelligence around that risk, and how they see the industry moving toward mature identity management solutions. 

Download your copy of the full report today to find out more!

Download your copy

 


0931 Ping Identity report PDF image

 

Christie Wilson

 

Making Staff Care About Cyber – UniSuper’s Christie Wilson

UniSuper Cyber Resilience Manager, Christie Wilson, shares thoughts on cutting through to non-security staff on information security 

Read the article

Senior information security leaders helm the important job of protecting organisations from cyber threats and risk. Increasingly, however, organisations are recognising they need to take a company-wide approach to security responsibility.

This has given rise to programs that educate and train non-cybersecurity staff to be more aware of the risk and threat landscape that exists. With it, come new roles and approaches.  

Christie Wilson is Cyber Resilience Manager for UniSuper, a large Australian superannuation provider that boasts more than 450,000 members and more than $100 billion in funds management.

Wilson leads the initiative within the organisation to bring cybersecurity awareness to the staff, but says it’s more than just running training programs on security policy.