Cyber threats are rising. Can your fragmented risk program keep up?
Cyber risk is a business challenge, not just a security one. Attacks are rising 44% a year while enterprises juggle around 45 different tools. Fragmentation creates blind spots. Learn how leaders build provable, defensible cyber resilience.
26 FEBRUARY 2026 | 11:00 - 12:00 PM (AEDT / GMT / EST)
Cyber risk is a leadership challenge, not just a security issue.
The problem is fragmentation. When cyber risks, controls, assets, testing, ownership, and evidence are spread across disconnected tools and spreadsheets, leaders struggle to answer the most basic questions during a crisis: what’s affected, who owns it, and what proof can we show right now?
This webinar explores why fragmented cyber programs create blind spots, slow decision-making, and increase regulatory exposure, and what leading enterprises are doing to move toward provable, defensible cyber resilience.
In this webinar, you'll will learn:
-
Why ‘more tools’ often result in less clarity during incidents and audits
-
How fragmentation slows response, duplicates controls, and weakens accountability
-
Why cyber attacks increasingly test business continuity, not just data security
- How third-party risk and compressed reporting timelines raise the bar for assurance
- What provable cyber resilience looks like in practice without adding complexity.
Register today!
Cyber risk is no longer just a security problem. It’s a business condition that tests operational resilience, leadership confidence, and regulatory readiness at the same time.
The numbers tell a sobering story:
200+
Average days to identify a cyber breach (World Economic Forum)
44%
Increase in attack events for the average enterprise (Check Point)
45
Number of tools in the average enterprise cyber security stack (Gartner)
+150%
Increase in cyber intrusions coming from China (CrowdStrike)
Your presenters
Michael Franklin
Michael Franklin is Protecht’s global Cyber Security Lead, with more than two decades of experience across cyber security, technology risk, and controls assurance in highly regulated environments.
He has held senior roles at Commonwealth Bank of Australia, Macquarie Group, and major universities including UNSW and the University of Sydney, where he has been directly accountable for translating cyber and technology risk into clear, defensible assurance for executives, boards, and regulators.
With a background that spans IT operations, audit, and enterprise risk, Michel has a practical view of where cyber programs break down during incidents and audits. He holds an MSc in Information Technology, a Graduate Certificate in Cyber Security, and industry certifications including CISM, CISA, and CDPSE.
Michael Howell
Michael Howell is Protecht’s Head of Risk Research & Knowledge, leading risk research, thought leadership, training through Protecht Academy, and Protecht’s industry responses to regulatory consultations.
Before joining Protecht, Michael spent more than a decade in risk and compliance roles with companies including MyBudget and RAA, including oversight of enterprise risk profiles, chairing a Risk Audit & Compliance Committee, and leading internal audit as a second line of defence.
A Certified Practicing Risk Manager, Michael has managed enterprise risk frameworks, assurance programs, incident management, policy, business continuity, and internal audit, giving him a practical understanding of how risk governance holds up when organisations are under pressure.
Comparing your options
Move from reactive, spreadsheet-based compliance to a connected, automated governance system - ready for the Aged Care Act 2024.
| Capabilities | Manual approach using spreadsheets | Protecht | ||
|---|---|---|---|---|
|
Incident & SIRS management
|
Incidents tracked manually, inconsistent categorisation, limited visibility, and no automated escalation. | Real-time logging and automated escalation aligned to SIRS, with full audit trails and reporting. | ||
|
Compliance & governance reporting
|
Separate spreadsheets per site; time-consuming updates; high audit risk. | Centralised dashboards and reports showing compliance across all facilities, in real time. | ||
|
Risk & quality oversight
|
Disconnected risk registers make trend analysis and board reporting difficult. | Integrated risk framework connecting controls, incidents, and actions to deliver organisation-wide visibility. | ||
|
Audit readiness
|
Manual evidence gathering across documents and emails - error-prone and stressful. | Pre-configured, auditable registers with one-click reporting and timestamped compliance evidence. | ||
|
Workflow & accountability
|
No clear ownership or task tracking; actions often lost in email. | Automated workflows with defined responsibilities, due dates, and escalation paths. | ||
|
Data security & integrity
|
Version control issues and risk of accidental data loss or breaches. | Secure, cloud-hosted platform with role-based access, encryption, and complete audit logs. |
Your partner for clarity and control
Move from fragmented cyber management to defensible, decision-ready resilience.
Move faster and make better decisions with a single, connected system for risk, compliance, and assurance:
- A single, connected view of cyber risks, controls, assets, incidents, and obligations
- Clear ownership and accountability at the control and issue level
- Continuous linkage between controls, testing, issues, and supporting evidence
- AI-enhanced reporting with Cognita that translates cyber posture into business impact and assurance


