Corporate Governance 2018: Enhancing Cyber Resilience at Woolworths

Verified

Added on  2023/06/07

|12
|3140
|444
Report
AI Summary
This report examines the increasing importance of cyber security and resilience in today's business environment, particularly in light of growing cyber risks. It focuses on Woolworths Group Limited, an ASX 200 listed company, as a case study to explore the integration of cyber security infrastructure with resilience protocols. The report discusses current cyber risks such as DDoS attacks and malware, which can lead to data breaches and system outages. It highlights the principles and steps for establishing cyber resilience, emphasizing the board's responsibility in overseeing cyber risk management. Examples of best practices from companies like PepsiCo, Google, and Nike are provided to illustrate how corporations are improving their cyber security infrastructure. The report concludes with recommendations for Woolworths Group and other enterprises to integrate cyber security with resilience protocols, including establishing system hygiene, developing a comprehensive plan, and mapping a risk profile to protect corporate assets from cyber-attacks. Desklib provides a platform for students to access similar past papers and solved assignments.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Corporate
Governance
2018
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
TABLE OF CONTENTS
Introduction...............................................................................................................................2
Current Cyber Risks....................................................................................................................3
Integration of cyber security and resilience protocols..............................................................3
Examples of best practice..........................................................................................................4
Recommendations.....................................................................................................................6
Conclusion..................................................................................................................................9
References................................................................................................................................10
Document Page
2
INTRODUCTION
In today’s competitive business world, the important for the internet and online based
services has grown significantly. Along with the popularity of these services, the risk
associated with cyber security has increased substantially in the past few decades. Due to
the risk of cyber-attacks, the enterprises are facing the risk of violation of their data which
adversely affect their financial position and reputation in the market. In order to address
these issues, the corporations focus on implementing the latest cyber security policies in
their business structure. The importance of cyber resilience has increased substantially since
corporations have to adapt their business structure to ensure that they are able to avoid the
key risks associated with their cyber security (Herrington and Aldrich, 2013). In this report,
the current cyber risks which affect the operations of an enterprise will be discussed in
order to understand the key cyber security risks faced by corporations. This report will take
the example of ‘Woolworths Group Limited’ which is listed on ASX 200 to evaluate how the
company can integrate its cyber security structure along with resilience protocols to address
the key issues associated with cyber securities. Examples of various corporations will be
discussed in the report to understand how other corporations have integrated their cyber
security infrastructure with resilience protocols. Lastly, various recommendations will be
given in the report which can be used by enterprises to address the key issues related to
cyber security.
Document Page
3
CURRENT CYBER RISKS
There is a wide range of cyber security risks which corporations face while using an online
based infrastructure in their business structure. These risks resulted in increasing the threats
faced by corporations while using their data. Woolworths Group is a major Australia based
organisation which operates in the retailing industry. The enterprise faces risks associated
with loss of their data due to increased risk of cyber-attacks. Cyber criminals focus on
finding new ways based on which they can attack the servers of the company and collect its
confidential data. The cyber criminals use Distributed Denial of Service (DDoS) attract to
order to gain access to the computer systems of large organisations which result in
compromising their computer systems (Biener, Eling and Wirfs, 2015). Cyber criminals attack
websites, servers or computer systems of organisations in order to stop them from
accessing their data or using their services. Cyber criminals also use malware to hack into
the servers of corporations to access their confidential data. In April 2018, Woolworths
reported data crash due to which the computer systems of the corporations situated across
the country suffered from data breach, and they stop responding. Woolworths is the third
largest enterprise in Australia which has reported this system failure in a single month,
other companies include ANZ Bank and Commonwealth Bank (The Weekly Times, 2018). The
system outage of Woolworths shows that the cyber infrastructure of the enterprise is not
suitable for protecting its servers and data from cyber-attacks.
INTEGRATION OF CYBER SECURITY AND RESILIENCE PROTOCOLS
Organisations focus on integration of their cyber security infrastructure and resilience
protocols in order to promote cyber resilience in the enterprise. Cyber resilience is referred
to a broad approach which focuses on encompassing cyber security along with business
continuity management. The objective of this strategy is to defend the corporation from
potential cyber-attacks while ensuring the survival of the company during such attacks.
Following are various principles and key steps which can be taken in a corporation in order
to establish cyber resilience (World Economic Forum, 2017).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
Firstly, the board of the company should take the ultimate responsibility to oversight
the operations of cyber risk and resilience. The board can delegate its responsibility
to an existing or new committee as well (Linkov et al., 2013).
The board should have a continuous command on the cyber security issues, and they
should receive continuous updates regarding the current threats and trends in the
industry.
The responsibility of a corporate officer should be established by the board to hold
the party accountable for the managing cyber resilience infrastructure along with the
progress in implementing its goals.
The cyber resilience infrastructure and its objectives should be integrated with the
business strategy which applies to the entire company.
Defining quantifies business risk tolerance is another key step which the board
should take in order to determine the current and future risk exposure faced by the
company.
The management of the company should be accountable for the reporting regarding
the cyber resilience process, and they should focus on quantifying and
understanding the threat and risks associated with cyber security (World Economic
Forum, 2017).
The plans for establishing and promoting cyber resilience should be established in
the company. These plans should be created, implemented and tested by the
management, and they should be held accountable for reporting regarding the on-
going improvement of cyber resilience plans.
The board should collaborate with other stakeholders in order to ensure systemic
cyber resilience.
The resilience plans should be reviewed annually by the board, and the review must
be independent to maintain the integrity.
Periodical review of the cyber resilience plans and their effectiveness is the key for
continuous improvements in these programs.
Based on effective compliance with these provisions, the corporations can establish
integration between cyber security and resilience protocols. By integrating these factors
Document Page
5
together, the company can implement cyber resilience which assists it in addressing the
cyber security risks faced by the firm.
EXAMPLES OF BEST PRACTICE
The importance of cyber resilience has increased rapidly among organisations with the
growing threat of cyber-attacks. In order to protect the confidential data of corporations,
the board of directors is getting serious about the cyber security infrastructure of the
companies. The board is taking the responsibility to involve in the process in order to
promote cyber resilience in the company. The board of various leading corporations is
taking the responsibility to improve their cyber infrastructure in order to address their cyber
security issues and protecting their data from cyber-attacks. PepsiCo is a good example; the
company is a global brand which operates in beverages and food processing industry. The
company has taken the decision to put cyber experts on its board to increase the
involvement of the board of directors in promoting cyber resilience procedure. This decision
is focused towards taking appropriate measures which the corporation is required to take in
order to ensure that its data is protected from violation (Damouni, 2014). Recently, the
enterprise was involved in a controversy regarding posting an advertisement offended
people. Due to this advertisement, the corporation also suffered from cyber-attacks which
are targeted to leak its confidential data in public.
However, due to effective cyber resilience infrastructure, the enterprise was able to address
these risks which assist in protecting its data from cyber-attacks. Google is another leading
company which operates in the internet, software, and computer hardware industry. It is a
leading brand which offers its services across the globe which includes search engine,
smartphone operating system, web browser, and others. The company takes its cyber
security seriously, and it continuously focuses on taking appropriate measures to improve
its cyber security infrastructure. A recent study has shown that almost 90 percent of Google
users are vulnerable to cyber-attacks due to lack of security integrations (Outlook, 2018).
Thus, in order to address this issue, Google is focusing on improving its cyber resilience
policies which are focused on improving the safety of the company and its users. The board
of the company gets involved in the procedure of forming strategies regarding improving
the cyber security of the company. Recently, the corporation has introduced the new
Document Page
6
version of its popular mobile operating system called Android Pie which has brought new
security features for its users to protect them from cyber-attacks.
Due to an integrated system, Google is able to use its services to increase the security of its
users. For example, the company has improved its web browser called Chrome and
introduced new security features for its users to protect them from malware (Guthrie,
2018). Cyber criminals are able to hack into users data while there is browsing the web,
thus, the security measures taken by Google ensures that the users are protected from
malware which could breach their data. Due to these security patches, Google is also able to
ensure its cyber security as well which enable the enterprise in effectively offering its
services to the public. Nike is another leading organisation which operates in apparel,
accessories, and sports equipment industry and it offers its services across the globe. The
company takes its cyber security very seriously, and it focuses on taking appropriate
measures to ensure that its data is protected from breaching. As per cyber resilience
principles, the board of Nike focuses on encouraging other stakeholders in the company to
contribute to the success of cyber security infrastructure of the company. The board has
asked its employees to ensure that they take appropriate measures to ensure the security of
the computing infrastructure of the enterprise (Brettman, 2015). Based on the integration
with its employees, the enterprise is able to promote its cyber security infrastructure which
ensures its security.
RECOMMENDATIONS
Based on the above examples, it can be seen that corporations which implement effective
cyber resilience policies are able to ensure that their data is protected from cyber breaches.
Thus, integration of cyber security with resilience protocols has become a key requirement
for corporations. Woolworths Group has faced various cyber security related issues in the
past, and the organisation is required to promote cyber resilience in the company. Based on
effective compliance with these principles, the corporation would be able to avoid system
outage in the future while at the same time ensuring that its data is not breached by cyber
criminals. Following are various recommendations which can be used by companies to
ensure that they integrate their cyber security infrastructure with resilience protocols.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
System hygiene
Firstly, Woolworths Group should establish a proactive and system procedure which is
focused on promoting cyber resilience in the company. The objective of this project is to
manage a standard of system hygiene which is focused on promoting cyber security in the
company. The board of the company should get involved in this procedure, or they should
delegate their responsibility to an existing or a new committee which has expertise in this
field (World Economic Forum, 2017).
Developing a plan
Effective establishing a systematic procedure, the enterprise will be able to ensure that it
becomes familiar with the key issues faced by the company. In the case of Woolworths
Group, the key issues are associated with ensuring the cyber security of the company and its
customers (Karsai et al., 2017). After identifying the key security threats and issues face by
the company, it will be able to establish key future goals regarding ensuring the cyber
security of the enterprise. Based on these future objectives, Woolworths Group will be able
to develop a plan regarding integrating the cyber security policies along with the principles
of resilience protocols. The plan should identify the key security threats of the enterprise,
and it should be focused on taking appropriate measures to address such issues.
Mapping a risk profile
After developing the plan and establishing the key threats and challenges, the corporation is
required to study cyber patterns and develop attack modes (Cybenko, 2017). Based on the
evaluation of these factors, Woolworths Group will be able to develop a tailored approach
in the organisation which is focused on achieving the cyber resilience goals of the
enterprise. Based on mapping the risk profile, the corporation will be able to protect the
assets of the corporation from cyber-attacks. Since Woolworths Group is a global brand, the
company is required to establish an integrated structure which addresses the key security
issues faced by the enterprise while managing its operations globally. The customer data
which is collected by Woolworths Group from its supermarkets should be transmitted with
safety, and this should be the priority of the company. Furthermore, the confidential data of
the enterprise is at risk as well, thus, it should be protected as well.
Document Page
8
Assessing and measuring the impact
The corporation is required to focus on rough figures which it has collected during this
procedure to develop future business strategies. These figures did not have to be precise,
but it gives a proper estimate to Woolworths Group regarding the key security issues which
it faces relating to its cyber security issues.
Mitigate risk
Based on the evaluation of the key risks faced by Woolworths Group, the company will be
able to mitigate such risks by establishing a cyber-resilience program. The corporation is
required to increase its budget of cyber security to ensure that it is able to take appropriate
measure while mitigating the key cyber security risks which are faced by the company.
Currently, the risk of DDoS and malware attack are two of the most common cyber-attacks
which are faced by the enterprise.
Cyber insurance
The corporation should obtain a cyber-insurance to provide contingent capital regarding
ensuring that it is able to protect its data in case it is lost. In case the company faces a cyber-
attack, and it loses its data, then the cyber insurance will protect the company from being
financially incapable of managing its operations. The cyber insurance also assists the
company in providing specialised assistance which is crucial in case an event relating to
cyber-attack occurs.
Beginning the procedure
After fulfilling the above mention requirements, the corporation is required to form a rough
plan and start taking steps towards promoting cyber resilience. Based on compliance with
these steps, Woolworths Group will be able to improve its cyber security while at the same
time protecting its data from breaching.
Document Page
9
CONCLUSION
From the above observations, it can be concluded that the importance of cyber resilience
has increased substantially since corporations focus on taking appropriate measures to
protect their cyber security. Currently, companies face cyber issues such as DDoS attacks,
Malware and data breaches which affect their operations. In order to address these issues,
the corporation is required to integrate its cyber security infrastructure with resilience
protocols by complying with various principles. Examples of PepsiCo, Google and Nike are
discussed in the report to understand how they use cyber resilience policies to protect their
data and customers information from cyber-attacks. Various recommendations are given in
the report for Woolworths Group such as system hygiene, developing a plan, mapping out
risks, assessing, mitigating the risks and cyber insurance which can be used by the
corporation to promote cyber resilience in the organisation. By effectively complying with
these policies, Woolworths Group will be able to initiate a cyber-resilience policy in the
organisation which assists it in addressing the cyber security challenges faced by the
company.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
REFERENCES
Biener, C., Eling, M. and Wirfs, J.H. (2015) Insurability of cyber risk: An empirical
analysis. The Geneva Papers on Risk and Insurance-Issues and Practice, 40(1), pp.131-158.
Brettman, A. (2015) Nike pushes security, wants employees to 'Keep It Tight'. [Online]
Available at:
https://www.oregonlive.com/playbooks-profits/index.ssf/2015/10/nikes_pushes_security_
wants_em.html [Accessed on 5th August 2018].
Cybenko, G. (2017) Metrics of cyber resilience. Cyber resilience, pp.26-38.
Damouni, N. (2014) Exclusive: U.S. companies seek cyber experts for top jobs, board seats.
[Online] Available at: https://www.reuters.com/article/us-usa-companies-cybersecurity-
exclusive-idUSKBN0EA0BX20140530 [Accessed on 5th August 2018].
Guthrie, G. (2018) Google amps up its fight against cyber attacks in the new version of
Chrome. [Online] Available at: https://www.consumeraffairs.com/news/google-amps-up-its-
fight-against-cyber-attacks-in-the-new-version-of-chrome-071618.html [Accessed on 5th
August 2018].
Herrington, L. and Aldrich, R. (2013) The future of cyber-resilience in an age of global
complexity. Politics, 33(4), pp.299-310.
Karsai, G., Koutsoukos, X., Neema, H., Volgyesi, P. and Sztipanovits, J. (2017) Simulation-
based analysis of cyber resilience in cyber-physical systems. Cyber resilience, p.131.
Linkov, I., Eisenberg, D.A., Plourde, K., Seager, T.P., Allen, J. and Kott, A. (2013) Resilience
metrics for cyber systems. Environment Systems and Decisions, 33(4), pp.471-476.
Outlook. (2018) Almost 90% Of Google Users Are Vulnerable To Cyber Attacks: Report.
[Online] Available at: https://www.outlookindia.com/website/story/almost-90-of-google-
users-are-severely-vulnerable-to-cyber-attacks-report/307230 [Accessed on 5th August
2018].
Document Page
11
The Weekly Times. (2018) Woolworths data crash follows ANZ and CommBank system
failures. [Online] Available at:
https://www.weeklytimesnow.com.au/news/national/woolworths-data-crash-follows-anz-
and-commbank-system-failures/news-story/52a4d115308ac0c795db6a385dda91bb
[Accessed on 5th August 2018].
World Economic Forum. (2017) Advancing Cyber Resilience: Principles and Tools for Boards.
[PDF] Available at:
http://www3.weforum.org/docs/IP/2017/Adv_Cyber_Resilience_Principles-Tools.pdf
[Accessed on 5th August 2018].
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]