iTnews

Winning formulas in IT security

By Brett Winterford on May 22, 2014 6:20AM
Winning formulas in IT security
Linked gallery: Photos: AusCERT and SC Awards 2014

[Blog entry] What it takes to win an SC Award.

Last week I had the pleasure of presenting the first of a new breed of SC Award that rewards excellence in IT security.

While in the US or UK the SC Awards are handed out to suppliers on the basis of months of exhausting product evaluations undertaken by a panel of experts, I'm hoping our local Award can mirror the work we've done over the past few years on the iTnews Benchmark Awards, where we recognise technology leaders on the basis of their innovative use of IT or on the success of their projects.

We call for nominations, we vet them with executives and direct reports, and we put the finalists before a panel of their peers for a final vote.

To kick things off for the Australian SC Award, we polled about 40 of the nation's top CIOs with a set of criteria for putting their CSO or IT security manager forward for an Editor’s Choice award. My thanks to McAfee/Intel Security for coming on board to sponsor this inaugural award.

I had the great honour on the night of presenting Troy Braban, CISO at Australia Post, the SC Award, for reasons I went into in some detail on the day after the ceremony. 

Today I thought it also worthwhile to list two IT security managers that were Highly Commended on the night, to better illustrate what we’ll be looking for when the awards submission and voting process rolls around again later this year.

The first highly commended was awarded to David Zagorsky, IT Security Manager at ING Direct.

David was put forward by both the bank’s global head of infrastructure and local team. He has had a very busy 12 months. David designed, from the ground up, all security aspects of a radical banking infrastructure consolidation and simplification program, including everything from:

  • Network segmentation, to
  • Application and storage security
  • Access control
  • Testing
  • Compliance, and
  • Security monitoring tools

This came off the back of ING releasing a mobile app that did away with PINs for low risk functions like account balance, and did away with SMS as an authentication factor.

The second Highly Commended was awarded to Matthew Sirotich, service assurance security manager at Businesslink.

Businesslink is a NSW Government shared IT services function that is now being absorbed into NSW FACS (Family and Community Services).

As you might expect, an agency like FACS takes data privacy very seriously. So when it comes to assessing third party service providers that wish to host Businesslink’s applications and services, a great deal of research and due diligence is required.

Matthew developed an exhaustive external service adoption framework to help the agency navigate cloud and other external services, taking into consideration the privacy imperative, the agency’s compliance obligations under state and federal law, and many others. It also sets in place the thresholds that need to be met and boxes that need to be ticked before any such proposition can be approved.

Stay tuned later in the year as we embark on a new SC Awards program.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
australia post businesslink cso ing direct it security sc award security software
Brett Winterford

One of Australia’s most experienced technology journalists, former iTnews Group Editor Brett Winterford has written about the business of technology for 15 years.

Awarded Business Journalist and Technology Journalist of the year at the 2004 ITjourno awards and Editor of the Year at the 2009 Publishers Australia 'Bell' awards, Winterford has extensive experience in both the business and technology press, writing for such publications as the Australian Financial Review and The Sydney Morning Herald.

As editor of iTnews Brett has led a team of award-winning journalists; delivered speeches at industry events; authored, commissioned and edited research papers, curated technology conferences [The iTnews Executive Summit and Australian Data Centre Strategy Summit and also shares the judging of the annual Benchmark Awards.

Brett's areas of specialty include enterprise software, cloud computing and IT services.

Read more from this blog: System II

Partner Content

MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
MSI launches innovative new laptops
Partner Content MSI launches innovative new laptops
Improving returns from SD-WAN spending
Sponsored Content Improving returns from SD-WAN spending
NCS expands into Australia in partnership with Optus Enterprise
Sponsored Content NCS expands into Australia in partnership with Optus Enterprise

Sponsored Whitepapers

The risky business of open source
The risky business of open source
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation
How to choose a WAF that's right for you
How to choose a WAF that's right for you
The global telco 5G cloud gaming opportunity
The global telco 5G cloud gaming opportunity
Building a ransomware remediation backup strategy
Building a ransomware remediation backup strategy

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
By Brett Winterford
May 22 2014
6:20AM
0 Comments

Related Articles

  • Signal to ramp up hiring after WhatsApp controversy drives download surge
  • Mimecast says hackers hijacked its products
  • Apple loses court case against security vendor Corellium
  • Experts who wrestled with SolarWinds hackers say cleanup could take months
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Telstra pilots its first neurodiversity recruitment program

Telstra pilots its first neurodiversity recruitment program

Update Chrome or risk remote takeover, US govt warns

Update Chrome or risk remote takeover, US govt warns

Accellion hack behind Reserve Bank of NZ data breach

Accellion hack behind Reserve Bank of NZ data breach

Google unravels state-of-art Android and Windows exploit chains

Google unravels state-of-art Android and Windows exploit chains

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.