Global State of Information Security® Survey 2017: The Australian story

Moving forward with cybersecurity and privacy

Organisations are adopting innovative cybersecurity and privacy safeguards to manage threats and achieve competitive advantages. To do so, they are thinking more broadly about cybersecurity and privacy as both protectors and enablers for the business, third-party partners and customers.

New cybersecurity and privacy safeguards to jumpstart success

Threat Intelligence has quickly become a talking point across industries. But have Australian companies kept up with the rest of the globe? Do they trust their competitors to collaborate and share Threat Intelligence? This report on ‘threat management’ is the first in a series of short perspectives looking at the cybersecurity trends and implications specifically for Australian organisations.

This year’s Global State of Information Security® Survey findings explore how organisations around the world are proactively negotiating the increasingly dynamic cybersecurity and privacy landscape. More than 10,000 business and IT executives told us what they are doing – and plan to do in the future – to project digital assets and create business advantages.

Download the report

Bold new combinations in the cloud

The power and interoperability of a centralised cloud platform enables organisations to synthesise a range of synergistic threat management technologies. The fusion of advanced technologies with cloud architectures can help organisations more quickly identify and respond to threats, better understand customers and the business ecosystem and ultimately, reduce costs.

Integrating key threat management tools in the cloud

Overall, 62% of respondents use managed security services for initiatives like authentication, identity and access management, real-time monitoring and analytics, and threat intelligence. In this instance, the use of managed security services in Australia (and also China) was far higher than the global average.

Advanced authentication to catch phishers

Over the past year, phishing has emerged as a significant risk to businesses of all sizes and across industries. Cybercriminals have become adept at using phishing schemes to obtain user credentials and then gain access to information systems and data.

Collaboration with others

The survey results showed a slight dip for Australian companies compared to the previous year when it comes to the use of threat intelligence and sharing of information. This year’s feedback confirms that Australia is behind on the use of threat intelligence and the sharing of indicators of compromise compared to Asia, China and the world average. Continuous awareness will help users to determine the benefits of sharing threat intelligence. By doing so organisations can expand their visibility and insight into potential and active threats.

New report: Securing the potential of the Internet of Things

Despite its myriad promises, the Internet of Things (IoT) is a growing cybersecurity and privacy concern. To address risks, many organizations are proactively updating data-governance policies, assessing devices and technologies, and creating employee training programs. This paper will take a look at how businesses are preparing for the commerce, manufacturing and society of tomorrow.

Download report: Uncovering the potential of IoT

Connecting the dots: A timeline of technologies, threats and regulations that redefined cybersecurity and privacy

This interactive timeline shows how cybersecurity and privacy practices have evolved in line with technology advances, regulations and threats. You can correlate topics by year, category and major milestones, and delve deeper into related original articles, blog posts, videos and PwC thought leadership. 

Background  •  Further reading

Malware is nothing new: The first PC virus hit more than three decades ago. While early malware was relatively harmless—and sometimes little more than amateurish hijinks—over the years the technical complexity, method of proliferation and destructive capabilities have changed dramatically.

The ways that malware proliferates has evolved alongside technology. The first PC virus, Brain, was identified in 1985 and spread slowly via floppy disk. The game changed with Morris, the first Internet worm that quickly infected thousands of computers in 1988. A decade later, in 1987, viruses that propagate via document sharing were introduced, followed by malware that is spread via email.

Today’s malware is technically sophisticated, difficult to detect and capable of causing physical damage. One of the most notable examples is Stuxnet. This weaponized malware, which disrupted an Iranian uranium enrichment facility in 2010, was designed to stealthily infiltrate industrial control systems and enable operators to remotely control physical systems. Similarly, in 2014 the Energetic Bear malware affected the industrial control systems of US and European energy companies.

In 2013, the Target Stores data breach spotlighted the risk of attack via the systems of third-party partners. Hackers gained access to the retailers point-of-sale system via a trusted contractor, and over the course a month compromised 110 million customer records. The breach was not without an upside: The attendant publicity helped boost the awareness of cybersecurity risks in the Boardroom.

The sophisticated nation-state attack on Sony Pictures Entertainment in 2014 represented a new level of malice and disruption. The hack exposed sensitive data and communications, significantly disrupted business operations and resulted in last-minute cancellation of a motion picture. It also blurred the lines between cybersecurity attacks and cyberwar.

Recently, public sector organizations have been targeted by adversaries that are believed to be nation-states or hacktivists. In 2015, an attack on the US Office of Personnel Management compromised personal information of 21.5 million individuals. In 2016, the Turkish government announced an earlier data breach that exposed personal data of 50 million citizens of Turkey. Nation-states are also believed to be behind attacks on the websites of US presidential candidates, campaigns and committees.

Not all attacks are accomplished with complex code, however. Phishing schemes and business email compromise are two well-known threats that have been around for (and successful) as long as the first worms, and rely mostly on simple research and social engineering. In fact, phishing was the most-cited vector of compromise among GSISS respondents in 2016.

Background  •  Further reading

You might think that sharing of cyberthreat intelligence to improve incident detection and response is this year’s cyberfad. Not really. The Financial Services-Information Sharing and Analysis Center (FS-ISAC) was founded in 1999 and today counts members from more than 6,000 firms around the world.

What is new are a slew of government-backed initiatives to promote information sharing between the private and public sectors. In 2013, for instance, the UK launched the Cyber Security Information Sharing Partnership to promote sharing of cyberthreat and vulnerability information among businesses. The next year, the US National Institute of Standards and Technology (NIST) published its NIST Cybersecurity Framework, which heavily emphasizes the importance of information sharing between government and industry.

In 2015, US President Barack Obama signed Executive Order 13691, an initiative that promotes sharing of cybersecurity threat intelligence among private-sector companies. The Executive Order also called on businesses and government to create Information Sharing and Analysis Organizations (ISAOs). These new organizations, unlike ISACs, are not industry-specific and can be based on a region or even a response to a specific threat.

Later in the year, the US voted in the 2015 Cybersecurity Information Sharing Act (CISA), a federal law that provides a framework for sharing cyberthreat information between industry and government. In the European Union, the newly approved General Data Protection Regulation (GDPR) will require that member nations participate in a cybersecurity information-sharing group and establish Computer Security Incident Response Teams to promote swift operational cooperation. Most recently, Japan created a Personal Information Protection Commission to act as a supervisory body on privacy protection and to help businesses understand the impacts of the GDPR.

Whether by legislation or individual initiative, the sharing of cybersecurity intelligence can provide an additional layer of knowledge and support in detecting and responding to incidents. But information sharing will not achieve its potential if government agencies, businesses and other stakeholders do not proactively take action and commit to collaborate.

Background  •  Further reading

When cellular phones took off in the early 1990s, they were used exclusively for phone calls. That changed as smartphones and tablet computers were developed and mobile operating systems and apps enabled devices to deliver a rich computing experience.

These technologies set the stage for one of the biggest moments in mobility: On January 9, 2007, Apple announced its first iPhone. The iPhone was an entirely new breed of mobile device that integrated new functionalities and services through mobile apps. A decade later, smartphones are the go-to device for email, instant messaging, online banking, snapping photos, social media, shopping and more. In the workplace, businesses have gradually adopted smartphones and tablets to enhance employee processes and productivity. In doing so, they have redefined whefirst iPhonen, where and how work is done.

As use of mobile devices surges, so too do cybersecurity risks. In part, that’s because mobile devices use a range of communications interfaces—such as cellular, Wi-Fi, Bluetooth, GPS and Near Field Communication—that expose more surface areas to attack. In addition, mobile devices present an increased opportunity for data loss and exposure, aggravated by the fact that they are more easily stolen or lost than desktop computers and servers. And mobile devices are also subject to specialized malware and phishing attacks.

It’s not surprising, then, that the number of GSISS respondents who reported compromise of a mobile device increased by 76% from 2009 to 2016. To address these risks, 54% of this year’s GSISS respondents said they have implemented a mobile security strategy, while 47% (in 2014) said they use Mobile Device Management software. In addition to technology solutions, mobile device security also will require ongoing employee training to reduce cybersecurity incidents that result from user carelessness or lack of awareness.

Background  •  Further reading

As cybersecurity incidents multiply in frequency and destructive power, the Chief Information Security Officer (CISO) has become increasingly pivotal to business success. And the stature of the CISO will continue to rise as businesses are digitized and dependent on effective cybersecurity.

A decade ago, only 32% of GSISS respondents had a CISO in charge of information security; in 2016, more than half (53%) said they have hired a CISO. But this year’s CISO will probably not resemble his or her 2007 counterpart. In the past, CISOs typically rose through the ranks of IT and relied on technical skills to manage cybersecurity. They tended to be siloed in IT, and typically were not attuned to the business objectives and strategies of the overall organization.

As companies recognize that cybersecurity is an enterprise-wide risk issue—not an IT responsibility—the CISO’s responsibilities and competencies have become increasingly business focused. Today’s CISOs are held accountable for risks and are expected to deliver a minimum information security posture across the organization. They also should be prepared to help C-suite executives and the Board understand that managing cyberthreats is just as important as managing operational, legal, financial and compliance risks.

Increasingly, CISOs are senior business managers who have expertise not only in cybersecurity but also risk management, corporate governance and overall business objectives. They have access to—and the confidence of—key executives to provide insight into cybersecurity risks in a language that the C-suite and Board understands.

This level of accountability is more likely to be achieved when the top security leader reports to a corporate officer who has broad oversight of both risk and strategy, preferably the CEO or other C-suite executives. GSISS research shows that most CISOs report directly to the CEO, followed by the CIO and Board.

Background  •  Further reading

The Heartland Payment Systems hack in 2009, which compromised 100 million payment cards, was among the first mega-breaches to boost awareness of digital credit card compromise. It also focused attention on rising payment card fraud: According The Nilson Report, US payment card fraud losses reached $3.56 billion in 2010.

These factors galvanized US credit card issuers to announce in 2012 migration roadmaps to the EMV payment card standard, which will replace magnetic-swipe cards. Card issuers set a deadline of October 2015 for most US retailers.

The years after the announcement of the EMV road map certainly supported the need for more secure card payment systems. In 2013 and 2014, breaches at Target Stores (110 million customer records), Neiman Marcus (payment card information of 350,000 customers) and Home Depot (56 million payment card records) galvanized support for adoption of the EMV standard.

Despite the rise of mega-breaches and industry support for EMV, by 2016 only 20% of GSISS US retail and consumer respondents said they had implemented EMV capabilities. US merchants that have not deployed EMV should take action now to assess the liability risk compared with the cost and impact of implementation. It’s also important to factor in customer trust in charting a road map for EMV deployment.

Choose a story and have all the associated events selected
View the background and related events for the currently selected story
Click to turn on or off a category
Hover to preview an event
Click to view an event
Scroll through the timeline
Click to start


We understand cybersecurity is not a technology issue – it is about people, it is about information and it is about coordination. In Australia, we need to increase cybersecurity awareness in both the public and private sector with the view to establishing a layered approach for sharing information among different industries.

Steve Ingram Asia-Pacific Cyber Lead

Contact us

Andrew Gordon

Andrew Gordon

Partner, Melbourne, PwC Australia

Tel: +61 402 892 184

Jason Knott

Jason Knott

Partner, Perth, PwC Australia

Tel: +61 8 9238 3418

Rob Parker

Rob Parker

Partner, Canberra, PwC Australia

Tel: +61 2 6271 3484

Mike Cerny

Mike Cerny

Partner, Digital Identity, PwC Australia

Tel: +61 3 8603 6866

Thomas Sonderegger

Thomas Sonderegger

Partner, PwC Australia

Tel: +61 (3) 8603 2548

Robert Martin

Robert Martin

Partner, Cyber Security, PwC Australia

Tel: +61 2 8266 5261

Follow PwC Australia