CT Management Group Digital Strategy Update

Cloud Computing

CT Management Group has now completed the migration of all its IT services to Cloud-based technologies as part of our “Digital First Strategy” first outlined in 2017.  This move optimises our IT costs and as we shift towards subscribing to computing resources, we no longer need to maintain on-premises IT infrastructure.

Cloud computing is also enormously flexible, allowing us to rapidly scale the computing resources we actually use.

Cloud-based technologies will help make internal IT processes more efficient as they can be accessed on demand by employees. Our cloud-based apps will improve collaboration across the organisation and with our clients, as they allow for real-time communication and data sharing.

Cyber Security

Strong cyber security is an important component of the CT Management Group “Digital First Strategy”, enabling the effective use of emerging technologies and ensuring confidence in the services provided by CT Management Group. Cyber security covers all measures used to protect systems – and information processed, stored, or communicated on these systems – from compromise of confidentiality, integrity, and availability.

Cyber security is becoming more important as cyber risks continue to evolve. We have also had rapid technological change resulting in increased cyber connectivity and more dependency on cyber infrastructure.

The CT Management Group Cyber Security requirements include strengthening cyber security governance, strengthening cyber security controls, developing a cyber security culture across all staff, working across our organisation to share security and threat intelligence and a whole of organisation approach to cyber incident response.

CT Management is actively working towards the Essential Eight – Maturity Level One and is well advanced in reaching this level.

The Essential Eight Maturity Model is a series of baseline mitigation strategies taken from the Strategies to Mitigate Cyber Security Incidents recommended for organisations.

Implementing these strategies as a minimum makes it much harder for adversaries to compromise systems.

The Essential Eight’s origin is the Australian Cyber Security Centre part of the Australian Signals Directorate.

The following activities are being performed that identify our target maturity level that is suitable for our environment.

Our initial target level is Level 1 of 3 of the Essential Eight Maturity Model:

  • Which systems require protection (i.e. which systems store, process or communicate sensitive information or other information with a high availability requirement)
  • Adversaries most likely to target our systems (e.g. nation-states, cyber criminals or malicious insiders)
  • What level of protection is required (i.e. selecting mitigation strategies to implement based on the risks to business activities from specific adversaries)

Once CT Management Group has completed the implementation of the desired mitigation strategies to an initial maturity level 1, we will focus on increasing the maturity of our implementation to eventually reach full alignment with the intent of each mitigation.

Get in touch with us today