Winning formulas in IT security

By on
Winning formulas in IT security

[Blog entry] What it takes to win an SC Award.

Last week I had the pleasure of presenting the first of a new breed of SC Award that rewards excellence in IT security.

While in the US or UK the SC Awards are handed out to suppliers on the basis of months of exhausting product evaluations undertaken by a panel of experts, I'm hoping our local Award can mirror the work we've done over the past few years on the iTnews Benchmark Awards, where we recognise technology leaders on the basis of their innovative use of IT or on the success of their projects.

We call for nominations, we vet them with executives and direct reports, and we put the finalists before a panel of their peers for a final vote.

To kick things off for the Australian SC Award, we polled about 40 of the nation's top CIOs with a set of criteria for putting their CSO or IT security manager forward for an Editor’s Choice award. My thanks to McAfee/Intel Security for coming on board to sponsor this inaugural award.

I had the great honour on the night of presenting Troy Braban, CISO at Australia Post, the SC Award, for reasons I went into in some detail on the day after the ceremony. 

Today I thought it also worthwhile to list two IT security managers that were Highly Commended on the night, to better illustrate what we’ll be looking for when the awards submission and voting process rolls around again later this year.

The first highly commended was awarded to David Zagorsky, IT Security Manager at ING Direct.

David was put forward by both the bank’s global head of infrastructure and local team. He has had a very busy 12 months. David designed, from the ground up, all security aspects of a radical banking infrastructure consolidation and simplification program, including everything from:

  • Network segmentation, to
  • Application and storage security
  • Access control
  • Testing
  • Compliance, and
  • Security monitoring tools

This came off the back of ING releasing a mobile app that did away with PINs for low risk functions like account balance, and did away with SMS as an authentication factor.

The second Highly Commended was awarded to Matthew Sirotich, service assurance security manager at Businesslink.

Businesslink is a NSW Government shared IT services function that is now being absorbed into NSW FACS (Family and Community Services).

As you might expect, an agency like FACS takes data privacy very seriously. So when it comes to assessing third party service providers that wish to host Businesslink’s applications and services, a great deal of research and due diligence is required.

Matthew developed an exhaustive external service adoption framework to help the agency navigate cloud and other external services, taking into consideration the privacy imperative, the agency’s compliance obligations under state and federal law, and many others. It also sets in place the thresholds that need to be met and boxes that need to be ticked before any such proposition can be approved.

Stay tuned later in the year as we embark on a new SC Awards program.

Tags:
Brett Winterford

One of Australia’s most experienced technology journalists, former iTnews Group Editor Brett Winterford has written about the business of technology for 15 years.

Awarded Business Journalist and Technology Journalist of the year at the 2004 ITjourno awards and Editor of the Year at the 2009 Publishers Australia 'Bell' awards, Winterford has extensive experience in both the business and technology press, writing for such publications as the Australian Financial Review and The Sydney Morning Herald.

As editor of iTnews Brett has led a team of award-winning journalists; delivered speeches at industry events; authored, commissioned and edited research papers, curated technology conferences [The iTnews Executive Summit and Australian Data Centre Strategy Summit and also shares the judging of the annual Benchmark Awards.

Brett's areas of specialty include enterprise software, cloud computing and IT services.

Read more from this blog: System II

Most Read Articles

Log In

Username:
Password:
|  Forgot your password?