Continuous controls monitoring: Moving beyond checklists to mitigate risk


High-profile data breaches have been making headlines across the Asia-Pacific region. In New Zealand, a third-party data breach affecting several government organisations compromised thousands of autopsy reports and other data. In Australia, recent major breaches of a health insurer and telecom company resulted in a combined 19.5 million stolen customer records. A further 14 million highly sensitive customer records were stolen in March when a consumer finance provided was the latest to fall victim to a cyberattack. A Bloomberg estimate put the total company cost for just one of these attacks between A$700 – A$960 million.

In light of these increasingly frequent incidents, one concept has become top of mind for IT and information security professionals: continuous controls monitoring.