THINGUIDES

The whys, wherefores and essentials of any 'technology in business' topic

Sponsor a THINGUIDE to share with your customers, clients and prospects

CGI-Sponsored THINGUIDE to Securing Critical Infrastructure: Australian Edition

THINGUIDE and CGI splash

October 14 2022: We are delighted to have worked again with CGI to deliver the third CGI-sponsored THINGUIDE, this time on Securing Critical Infrastructure in Australia.

Presented as both a physical and online book by CGI, one of the world's largest IT and business consulting services firms, the guide provides an understanding of and pragmatic management approach to Securing Australian Critical Infrastructure, from a cyber-, supply-chain- and physical-viewpoint. The guide will prove valuable to leaders of any organisation concerned about the security of their own critical assets and infrastructures.

The guide is also endorsed by the Australian Information Security Association (AISA).

We’d like to thank all at CGI Australia for their assistance and contribution to the guide.

You can download a copy at the CGI Australia website. Or at bit.ly/CGI-SCI

CGI introduces the guide this way:
Securing Australia’s Critical Infrastructure is just that, critical. Recent legislation, including the Security Legislation Amendment (Critical Infrastructure Protection) [or SCLACIP], has increased and better defined the obligations placed on Australian companies and directors.
Where to start? This guide sets out how CXOs and board level decision-makers can approach securing Australia’s Critical Infrastructure. The advice enclosed applies to all organisations whose assets are critical to business operations. It can also support you in setting up best practice protocols to reduce reputational and financial damage to your organisation, your customers and your team members.

What you’ll learn inside:

  • What to do if your organisation is affected by Australian critical infrastructure legislation or if you have been nominated as part of Australia’s Systems of National Significance (SoNS)
  • How to develop a plan, and the security controls essential to protect critical infrastructure
  • How to understand the current threat landscape and assess your company's riskse
  • What obligations Australian companies have to defend their critical infrastructure
  • How to develop and structure an incident response team
  • The steps to take to create critical infrastructure security risk review processes
  • And more...

THINGUIDES give business readers sufficient grasp of a subject to enable them to fully participate in the technology strategies that are becoming central to the functioning of all organisations, whether large or small. Sponsors are able to provide their prospects and customers with a valuable, easy to read, business tool carrying their logo and messages.



CONTACT US