Australian execs less involved in security than APAC counterparts as business interruption surges: Telstra

Australian businesses were hit by business interruption from security breaches in 2015 at more than twice the rate of the previous year – but Australia is still getting off relatively easy, according to new Telstra security research that found the regional figure was nearly twice as high.

The Telstra 2016 Cyber Security Report surveyed 305 C-level executives and IT-security managers – 75 percent of whom came from Australia, with the remainder split between Indonesia, Philippines, Singapore, Malaysia and Hong Kong.

“The majority of Australian and Asia-Pacific organisations are becoming more effective at defining their security strategies and executing their security plans,” the report noted, adding that effective execution was still being hindered by a shortage of skilled security staff as well as a lack of staff training and security awareness that was hindering adoption of security initiatives.

Australian respondents were more likely to cite those issues – as well as a lack of government regulations and policies and a lack of access control and compliance – as significant security challenges than their Asia-Pacific counterparts.

For example, 23.3 percent of Australian respondents said the lack of skilled staff was challenging or very challenging, while the Asia-Pacific figure was just 14.3 percent.

Some 30.2 percent of Australian companies saw the lack of government regulations and policies as being challenging or very challenging, compared to just 11.7 percent of APAC organisations.

This finding coincides with ongoing frustration amongst Australian organisations as the government continues to refine its cybersecurity policy after a draft version was rejected by prime minister Malcolm Turnbull late last year.

Conversely, Asia-Pacific organisations were far more frustrated with practical issues in security execution than their Australian counterparts. This included localisation and availability of security software – cited as challenging or very challenging by 63.7 percent of APAC respondents and 27.6 percent of Australian respondents – and access to required security tools, cited by 26.4 percent of Australian and 55.9 percent of APAC respondents.

Australian organisations were far behind their APAC counterparts when it came to developing information-security strategies, with 36 percent of Australian companies saying they had an effective strategy in place compared with 60 percent of APAC companies.

Read more: ​Maintaining security when migrating from DNS architecture to NFV

Much of this was due to continuing executive frustration with the requirements of good security practice and a lack of understanding about how to implement it. “Many cyber security measures rely on complex technical controls and many senior executives feel uncomfortable in understanding the security technology that supports the business,” the report noted.

Australian organisations were proving more effective at redistributing security responsibilities – with 61.8 percent saying the IT department had responsibility for cyber security compared with 83.1 percent of APAC organisations.

However, APAC organisations were proving more effective at collaboration: 71.4 percent of respondents said business line managers were also involved and 35.1 percent said C-level executives were involved. This was well ahead of Australia, where just 36.8 percent reported responsibility had been directed to business line managers and 18.9 percent to C-level executives.


Read more: US CNAP sets pace as Australian industry continues “holding breath” for overdue cybersecurity policy


Join us at the CSO Perspectives Roadshow Read more: CSO Insights: 2016 IT Security Strategies Survey – prize terms and conditions in March.

  • Hear from International keynote speakers:Robert Lentz, and Graham Cluley,
  • A Security Awareness stream
  • 18 different interactive Security Exchange discussions
Join CSO for a day of networking with your peers, engaging and discussing topics relevant to you, hearing from some of the top worldwide IT Security leaders in the market and attending the exhibition floor to win some amazing prizes.

Join the CSO newsletter!

Error: Please check your email address.

Tags Telstra securityMalcolm Turnbullsecurity breachesTelstra 2016 Cyber Security ReportDavid BraueCSO Australia

More about APACCSOIT Security

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by David Braue

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place