Predicting Security Threats Caused By People & Supply Chains.
Quantifying Financial Risk For Small, Medium & Enterprise
Based on scientific proven method and reliable statistical data, your business will experience:
15.03 to 16.91 # supplier network breaches per year, for every 100 suppliers in your Supply Chain.
14.87 to 72.17** disengaged employees per year, for every 100 people. (complacency, carelessness, & interia)
3.67 to 15.92** actively disengaged employees per year, for every 100 people. (insider threats)
... and existing Cyber Security solutions have no mechanism to identify this.
It's not an "IT" problem, it's a people problem. Greater than 90% of all breaches come from employees or "business networks", so building higher walls and wider walls will not solve the problem.
* Based on IBM Security Australia 2020 report of breach data.
** Based on Australian ASX AGM reported workplace engagement results and Gallup 2017 employee engagement results for Australia/NZ.
Simplifying Cyber Security for
Non-Technical & Technical Decision Makers.
Risk Management Options
Proof of Compliance
Supply Chain Risk Management
Chain of Evidence
Encryption of Sensitive Data
Improve Cyber Risk Understanding
Simple Essential 8 Implementation Plan
Greater Customer Confidence (Increase Sales)
Evidence Based Risk Models
Proven Scientific Methods & Algorithms
Reduce Insurance Risk
Cyber Tracks Towards Insight & Compliance.
'Checkin Points' towards improved Cyber Management.
We believe that Cyber Security is a basic Business and Human Right and that affordable, leading solutions should be available for all businesses and organisations, no matter their size, location and financial constraints. We also believe that we're all in this together, and an integrated risk perspective is required to meet the exponential challenges being faced.
Straightline approach to intended outcome (business benefit) linking the risk, action and benefit for the business.
Checkin Points mapped to risk profile, and Probability of Monetary Loss (PML), reducing Cyber Risk Exposure through direct and indirect stakeholder and counter-party risk.
Easy business assessment process and analysis or risk, with simple correlated implementation strategies improving risk for the business, it's financiers, insurers and customers (supply chain/contractor risk).
Continuous Cyber improvement system through leading IT, Processes, Culture and Training solutions.
... Cyber Business Intelligence with our CISOSQUARED and integrated Workforce and Supply Chain solutions.
Simplified Risk Management Perspective.
Business and Organisational Cyber Security Risk is a direct reflection of the risk surface and the steps taken (Cyber Management & Systems) to reduce, mitigate or control the likelihood and consequence occuring.
CRR = RS x CMS
(Cyber Risk Rating = Risk Surface x Cyber Management & Systems)
Existing protocols have been focused on the Technological Risk Perimeter and how people interface with IT. It has failed to understand the first princples or root cause of the risk (risk does not mean breach), or how it conitnues to exponentially grow.
Consequently, the majority of existing approaches are focused on solving the symptons of the problem, not the cause.
Cyber Security is a Fundamental Human Right.
A Universal Declaration of Human Rights was proclaimed at a United Nations General Assembly in Paris on 10 December 1948, outlining a Charter for Member States. This contains 30 Articles across more than seventy human rights treaties, outlining common standards for all peoples and nations, where fundamental human rights are to be universally protected.
By virtual of the Charter, Articles 12, 18, 19, 20, 27, & 29, which pertain to Internet and Cyber Security (Safety) reveal that The Right to Privacy, Freedom of Thought, Freedom of Expression, Public Assembly, Copyright, & Responsibility to protect others rights is expected of all peoples and nations.
When businesses and organisations fail their basic duty of care to take reasonable action to protect their Cyber Risk through Technology, Process (Supply Chain) and People, they become potentially liable not only through an “Implied Duty of Care”, but also having breached Human Rights expectations to Protect their stakeholders Right to Privacy and Responsibility to protect other peoples rights and freedoms.