<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>RISK | InConsult</title>
	<atom:link href="https://inconsult.com.au/publication-category/risk/feed/" rel="self" type="application/rss+xml" />
	<link>https://inconsult.com.au</link>
	<description>Helping you confidently take risks</description>
	<lastBuildDate>Mon, 13 Apr 2026 01:27:37 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://inconsult.com.au/wp-content/uploads/2021/06/cropped-favicon-3-32x32.jpg</url>
	<title>RISK | InConsult</title>
	<link>https://inconsult.com.au</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Restricted vs Unrestricted Funds in Local Government</title>
		<link>https://inconsult.com.au/publication/restricted-vs-unrestricted-funds-in-local-government/</link>
		
		<dc:creator><![CDATA[Tony Harb]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 01:27:37 +0000</pubDate>
				<guid isPermaLink="false">https://inconsult.com.au/?post_type=publication&#038;p=14741</guid>

					<description><![CDATA[<p>Restricted vs Unrestricted Funds in Local Government: Governance, Risks and Controls For many NSW councils, financial sustainability is a real risk and not just something in a risk register.  Managing financial expenditure i.e. public funds in accordance with legislation is critical. But the real financial question is not how much cash sits on the balance sheet, [&#8230;]</p>
The post <a href="https://inconsult.com.au/publication/restricted-vs-unrestricted-funds-in-local-government/">Restricted vs Unrestricted Funds in Local Government</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></description>
										<content:encoded><![CDATA[<h1>Restricted vs Unrestricted Funds in Local Government: Governance, Risks and Controls</h1>
<p>For many NSW councils, financial sustainability is a real risk and not just something in a risk register.  Managing financial expenditure i.e. public funds in accordance with legislation is critical. But the real financial question is not how much cash sits on the balance sheet, it is how much of that cash is actually available to use. That is why understanding restricted vs unrestricted funds in local government is critical.</p>
<p>In NSW local government, the restricted vs unrestricted funds distinction matters because a significant share of council cash is either legally quarantined, internally allocated for future purposes, or needed to maintain liquidity for day-to-day operations. The recent NSW Audit Office’s Local government 2025 <a href="https://www.audit.nsw.gov.au/our-work/reports/local-government-2025">report</a> identified that:</p>
<ul>
<li>19 councils did not have enough cash and investments not subject to external restrictions to cover three months of general expenses, and</li>
<li>weaknesses in internal controls and governance were identified at most councils.</li>
</ul>
<p>For this, and many other important reasons, restricted and unrestricted funds should be treated as a frontline governance issue, not just a finance note at year end.</p>
<p>The legislative and policy framework is clear. The Local Government Act 1993 (the Act) says money raised by a special rate or charge, money that legislation says can only be used for a specific purpose, and specific purpose advances or grants from government cannot be used for other purposes except in limited circumstances.</p>
<p>The Office of Local Government (OLG) Local Government Code of Accounting Practice and Financial Reporting (OLG Code) also requires councils to maintain adequate accounting records, systems and internal controls, and to disclose restricted and allocated cash, cash equivalents and investments in their financial statements.</p>
<h2>Council funds sit in 3 &#8216;buckets&#8217;</h2>
<p>In simple terms, council funds typically sit in three distinct ‘buckets’:</p>
<ul>
<li><strong>Externally restricted fund</strong>s: money that council is legally required to use for a specific purpose it was provided.</li>
<li><strong>Internally restricted funds</strong>: money that council has set aside by resolution for a specific future purpose, These funds are not &#8216;legally&#8217; restricted, but they should only be moved or repurposed through formal council resolution.</li>
<li><strong>Unrestricted funds</strong>: money that is available to support day-to-day operations, manage cash flow, respond to unexpected costs and maintain financial flexibility.</li>
</ul>
<p><img fetchpriority="high" decoding="async" class=" wp-image-14750 aligncenter" src="https://inconsult.com.au/wp-content/uploads/2026/04/three-buckets-of-council-funds-300x89.png" alt="restricted vs unrestricted funds in local government" width="860" height="255" srcset="https://inconsult.com.au/wp-content/uploads/2026/04/three-buckets-of-council-funds-300x89.png 300w, https://inconsult.com.au/wp-content/uploads/2026/04/three-buckets-of-council-funds-1224x362.png 1224w, https://inconsult.com.au/wp-content/uploads/2026/04/three-buckets-of-council-funds-768x227.png 768w, https://inconsult.com.au/wp-content/uploads/2026/04/three-buckets-of-council-funds-1536x455.png 1536w, https://inconsult.com.au/wp-content/uploads/2026/04/three-buckets-of-council-funds-2048x606.png 2048w" sizes="(max-width: 860px) 100vw, 860px" /></p>
<h2>Why externally restricted funds matter</h2>
<p>Externally restricted funds are the most tightly controlled category of council cash. These are amounts that council holds because legislation or a third-party agreement says the money can only be used for a defined purpose. The OLG Code describes them as cash, cash equivalents and investments available only for specific use because of legislation or third-party contractual agreement, and requires councils to disclose both the amount and nature of those restrictions. Common examples include water funds, sewer funds, developer contributions, domestic waste management, stormwater management and tied grants.</p>
<p>The purpose of external restriction is simple &#8211; it protects public trust and legal compliance. Developer contributions are collected to fund future infrastructure. Tied grants are provided to deliver a specified program. Special rates and charges are levied for a stated purpose. These are not general operating funds.</p>
<p>The NSW Audit Office warned that low available cash (money available as unrestricted funds) increases the risk of externally restricted cash being used for an improper purpose, and reported two high-risk findings where councils breached the Act by spending externally restricted cash and investments for an improper purpose.</p>
<h2>The strategic role of internal restricted funds</h2>
<p>Internal restricted funds, often described as internal allocations or reserves, are different. They are not imposed by legislation or grant conditions. They are set aside by council resolution or policy for a defined future purpose.</p>
<p>The OLG Code says internal allocations are cash, cash equivalents and investments allocated by council resolution or policy to identified programs of work and forward plans, and because they remain at council’s discretion they are disclosed but not deducted from total cash and investments in the same way as external restrictions.</p>
<p>This is where good financial leadership and governance becomes visible. Internal allocations are how councils plan ahead to smooth future costs instead of lurching from one budget shock to the next. Internal restricted funds can be used for plant and vehicle replacement, employee leave entitlements, asset replacement, IT renewal, carryover works, quarry remediation and bonds and deposits. That is exactly what a mature, proactive reserve framework should do &#8211; convert foreseeable liabilities, renewal needs and cyclical expenditures into transparent funding strategies.</p>
<p>The <a href="https://www.olg.nsw.gov.au/councils/policy-and-legislation/integrated-planning-and-reporting">IP&amp;R framework</a> also reinforces this discipline. NSW councils must prepare and adopt a Long-Term Financial Plan, use it to inform decision-making, and review and update its assumptions, projected income, expenditure, balance sheet and cash flow at least annually as part of the Operational Plan.</p>
<p>A Council&#8217;s Annual Report is also framed as a key point of accountability to the community and must include the council’s audited financial statements. In other words, internal allocations should never sit outside strategy; they should be linked directly to the Long-Term Financial Plan, Delivery Program and Operational Plan.</p>
<h2>Why unrestricted funds are the real test of resilience</h2>
<p>Unrestricted funds are the balances genuinely available to support day-to-day operations and liquidity, absorb shocks and fund priorities that are not already allocated elsewhere. Unrestricted funds are the cash councils rely on to pay suppliers, continue services, retain staff, manage timing differences in capital delivery and maintain financial flexibility.</p>
<p>The Audit Office’s 2025 report makes it clear why this is important. 19 councils lacked enough available cash to meet three months of general expenses, and the unrestricted current ratio remains an important indicator of short-term financial capacity. The report notes the previous OLG benchmark of 1.5, meaning $1.50 in unrestricted current assets for every $1 in current liabilities.</p>
<p>Therefore, unrestricted cash as funding available for unexpected or emergency expenses, liquidity support, short-term cash flow, operational efficiency and long-term financial sustainability. It also sets a target level of unrestricted cash at the greater of $2 million or 50% of current liabilities not otherwise funded by restrictions or allocations, and treats an unrestricted current ratio below 1.5:1 as a trigger for immediate attention.</p>
<h2>Governance arrangements for restricted vs unrestricted funds</h2>
<p>The strongest councils do not manage restricted and unrestricted funds just via council resolutions, spreadsheets and memory. They manage them through formal governance arrangements.</p>
<p>That starts with a <strong>council-adopted policy</strong> that defines external restrictions, internal allocations and unrestricted cash. The policy should set approval pathways and links reserves to the Community Strategic Plan, Delivery Program, Operational Plan and Long-Term Financial Plan. Good practice requires any future internal allocation to be established by council resolution, with a defined purpose and a basis for calculating transfers.</p>
<p>From there, the control framework needs to be operational, not symbolic.</p>
<p>The NSW Audit Office’s better-practice observations are especially useful here. It found some councils still rely on highly manual annual processes to manage and report restricted cash, which increases the risk of error and breach. By contrast, one better-practice council case study linked its quarterly cash and investment budget review statement directly to the general ledger, configured the ledger to reflect externally restricted balances, and had the statement independently reviewed within the finance team.</p>
<p>The NSW Audit Office also highlighted the importance of regular reconciliation, enhanced processes and controls, transparent reporting to decision-makers, and ARIC oversight.</p>
<p>In practical terms, councils should have a clear ownership model.  Finance owns the register and reconciliations, business units own the business purpose of each reserve, executives own challenge and reprioritisation, council owns creation and release of internal allocations by resolution, and ARIC owns oversight of control effectiveness, compliance risk and remediation actions.</p>
<h2>Rules for moving money in, out or between funds</h2>
<p>This is where councils most often get into trouble.</p>
<p>Externally restricted funds cannot simply be used to solve a general fund cash pressure. Section 409 of the Act limits the use of special rates or charges, legislatively restricted money and specific purpose advances or grants to their intended purpose. Section 410 creates only a narrow pathway for alternative use of some money raised by special rates or charges once the original purpose has been achieved or is no longer required, and only after public notice through the operational plan process.</p>
<p>Internal allocations are more flexible, but that does not mean they should be moved casually. Council&#8217;s should adopt a policy that is sensible i.e. transfers into or out of restricted cash require council resolution, whether through a specific resolution, adoption of the Quarterly Budget Review Statement, or adoption of annual financial statements containing a schedule of movements. The policy can state that councils may borrow from internally allocated cash, but not from externally restricted cash without Ministerial consent, and any such borrowing must be authorised by resolution with the full impact disclosed and interest paid.</p>
<p>That is the right principle for all councils to adopt. Legal restrictions are not optional, and internal restrictions are not informal. Even where council has discretion, reserve movements should be rule-based, transparent and documented.</p>
<h2>The biggest risks councils need to control</h2>
<p>The governance risk is not just technical non-compliance. It is a financial control drift. When councils lose sight of what cash is restricted, allocated or genuinely free, three risks will emerge quickly.</p>
<ol>
<li><strong>Councils may misstate liquidity.</strong> A healthy cash balance can hide a weak unrestricted cash position if too much of the total balance is externally restricted. The NSW Audit Office’s analysis shows that many regional and rural councils carry high proportions of externally restricted balances, especially where water and sewer charges form a large part of cash holdings.</li>
<li><strong>Councils may create “shadow budgets” through unmanaged internal reserves.</strong> If internal allocations are not tied to a documented purpose, target funding basis, forecast drawdown and annual review, they can become stale, duplicated or politically immovable. The IP&amp;R framework is designed to prevent that by requiring annual review of the Long-Term Financial Plan and alignment between planning, delivery and reporting.</li>
<li><strong>Councils may breach the Act through weak controls, errors or deliberate misconduct.</strong> The NSW Audit Office’s findings on externally restricted cash show that poor monitoring, manual processes and weak reporting are enough to create serious compliance failures.</li>
</ol>
<h2>The KPIs and reports that matter most</h2>
<p>Councils should separate compliance reporting from decision-based reporting. At a minimum, councillors, executives and ARIC should receive a reporting pack that clearly distinguishes externally restricted balances, internal allocations and unrestricted cash.</p>
<p>The core KPIs should include the unrestricted current ratio, unrestricted cash as a percentage of current liabilities, months of general expenses covered by available cash, total externally restricted balances by category, internal allocations against target and forecast drawdown, local infrastructure contribution balances and spend rates, and the number and value of approved transfers, internal borrowings, breaches or near misses.</p>
<p>The NSW Audit Office’s financial sustainability analysis specifically used available cash, unrestricted current ratio and own source revenue to assess councils with heightened risk, which makes those measures especially useful for internal monitoring.</p>
<p>The reporting cycle should also be disciplined. The OLG Code states that councils must meet multiple financial reporting requirements, including annual audited financial reports, an annual operational plan, a Long-Term Financial Plan and quarterly budget review statements. The IP&amp;R Guidelines require budget review statements to be reported to council within two months after the end of each quarter, except the fourth quarter, and the Annual Report to be prepared within five months of year end. Many councils have a monthly Investments Report for unrestricted cash oversight.</p>
<h2>Restricted vs unrestricted funds &#8211; Takeaways</h2>
<p>The strongest councils understand that reserve management is not about hoarding cash. It is about governing purpose.</p>
<p>Externally restricted funds protect legal and community obligations. Internal restricted funds protect future service capacity and planned asset renewal. Unrestricted funds protect resilience, liquidity and strategic choice.</p>
<p>When councils clearly define each category, set strict movement rules, link reserves to long-term planning, and report them transparently to council, ARIC and the community, they do more than stay compliant. They become more credible, more sustainable and strengthen the financial management and control culture.</p>
<h2>Can we help?</h2>
<p>Since 2001, we have worked with more than 115 NSW councils to strengthen risk management, resilience and internal controls through our internal audit and assurance services.  Whichever service you choose, our goal remains the same, to help you manage risk with confidence and provide practical advice that supports informed, effective decision-making.</p>
<p>Can we help? If your council is reviewing its approach to restricted and unrestricted funds, reserve governance or financial control settings, <a href="https://inconsult.com.au/contact-us/" target="_blank" rel="noopener noreferrer">contact us</a> to discuss how we can support your needs.</p>
<p>#RiskManagement #InternalAudit #Assurance #Governance #LocalGovernment #FinancialSustainability #InternalControls #RestrictedFunds #UnrestrictedFunds #CouncilGovernance</p>
<div class='printomatic pom-default ' id='id5102'  data-print_target='body'></div>The post <a href="https://inconsult.com.au/publication/restricted-vs-unrestricted-funds-in-local-government/">Restricted vs Unrestricted Funds in Local Government</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Construction Cyber Threats: When Hackers Hit the Jobsite</title>
		<link>https://inconsult.com.au/publication/construction-cyber-threats-when-hackers-hit-the-jobsite/</link>
		
		<dc:creator><![CDATA[Tony Harb]]></dc:creator>
		<pubDate>Mon, 01 Dec 2025 21:02:54 +0000</pubDate>
				<guid isPermaLink="false">https://inconsult.com.au/?post_type=publication&#038;p=14433</guid>

					<description><![CDATA[<p>When Hackers Hit the Jobsite: The New Frontier of Construction Cyber Threats &#160; The Australian construction industry has undergone one of the most significant digital transformations in its history. Building Information Modelling (BIM), cloud-based project management, IoT-enabled devices, remote site connectivity and integrated supply-chain platforms have improved efficiency, collaboration and onsite safety. But the digital evolution [&#8230;]</p>
The post <a href="https://inconsult.com.au/publication/construction-cyber-threats-when-hackers-hit-the-jobsite/">Construction Cyber Threats: When Hackers Hit the Jobsite</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></description>
										<content:encoded><![CDATA[<p><span style="color: #003366;"><strong>When Hackers Hit the Jobsite: </strong><strong>The New Frontier of Construction Cyber Threats</strong></span></p>
<hr />
<p>&nbsp;</p>
<p>The Australian construction industry has undergone one of the most significant digital transformations in its history. Building Information Modelling (BIM), cloud-based project management, IoT-enabled devices, remote site connectivity and integrated supply-chain platforms have improved efficiency, collaboration and onsite safety.</p>
<p>But the digital evolution has brought a new and rapidly escalating challenge, construction cyber threats.</p>
<p>Why? This digital footprint, while transformative, creates a much wider attack surface for threat actors.</p>
<p>According to the Australian Federal Police and multiple global and local reports, the construction sector has become one of the most targeted industries for cybercrime. The <a href="https://www.afp.gov.au/news-centre/media-release/criminals-target-construction-sector-business-email-compromise-scams" target="_blank" rel="noopener">Australian Federal Police</a> distributed a media release in October 2025 warning of the significant increase in scams hitting the Construction sector.</p>
<p>For Australian construction companies including large head contractors, mid-tier builders, engineers, architects, subcontractors and suppliers, the threat landscape is intensifying. And without stronger cyber resilience, the industry risks becoming one of the easiest targets for cybercriminals within a short time period.</p>
<h2>Why Attackers are Targeting Construction</h2>
<p>Construction is now one of the top three most targeted sectors globally for ransomware. Cybercriminals see construction firms as:</p>
<ol>
<li><strong>Time-pressured</strong> &#8211; project deadlines create urgency, making companies more likely to pay ransoms.</li>
<li><strong>Data-rich</strong> &#8211; building plans, smart homes and offices, access credentials, project financials and bank account details are extremely valuable.</li>
<li><strong>Under-protected</strong> &#8211; many construction companies and contractors rely on outdated systems, legacy networks, or unmanaged subcontractor connections.</li>
<li><strong>Highly interconnected</strong> &#8211; multiple vendors, suppliers and subcontractors increase the number of entry points.</li>
</ol>
<p>With billions of dollars in infrastructure, commercial and residential projects underway across Australia, the stakes have never been higher.</p>
<h2>When Construction Cyber Threats Become Reality</h2>
<p>In recent years, the construction sector has experienced several high-profile cyber incidents that highlight the industry’s growing vulnerability.</p>
<p>In Australia, <a href="https://www.cyberdaily.au/security/11317-exclusive-australian-firm-goodline-confirms-ransomhub-cyber-attack" target="_blank" rel="noopener">Goodline</a> suffered a major ransomware attack in 2024 after criminals gained access through compromised credentials, stealing over 600GB of sensitive corporate and employee data.</p>
<p>In early 2025, mid-tier builder <a href="https://www.cyberdaily.au/security/11580-exclusive-lynx-ransomware-targets-australian-construction-company-novati" target="_blank" rel="noopener">Novati Constructions</a> was listed on the Lynx ransomware gang’s leak site, with attackers claiming to have exfiltrated contracts, financial data and internal reports.</p>
<p>Internationally, Chicago-based contractor <a href="https://www.constructiondive.com/news/skender-ransomware-attack-chicago-maine/712844" target="_blank" rel="noopener">Skender Construction</a> was hit by a ransomware attack in 2024 that encrypted critical project information and exposed personal data belonging to more than 1,000 individuals before the company restored systems from backups and notified affected parties.</p>
<p>These cases underscore the escalating frequency and impact of cyber-attacks across the construction ecosystem, from major contractors to engineering firms and mid-sized builders alike.</p>
<h2>Construction Cyber Threats Come from Many Angles</h2>
<p>One of the biggest misconceptions in construction cyber security is the belief that the primary risk comes from a malicious external hacker. In reality, threats come from almost every corner of a construction project.</p>
<p>From our experience in post cyber incident investigations, these are the biggest threat vectors impacting Australian builders:</p>
<p><strong>a) Insecure subcontractors and suppliers</strong></p>
<p>Subcontractors often connect to head contractor systems, share files, or use project collaboration platforms. Many operate with minimal cyber security, outdated devices or weak password policies, turning them into high-risk gateways for attackers.</p>
<p><strong>b) Legacy and outdated systems</strong></p>
<p>Many builders rely on old project management platforms, access control systems, servers and network infrastructure, SCADA (Supervisory Control and Data Acquisition) / operational technology and outdated Microsoft or mobile device versions. These systems often lack modern security patches and become easy entry points.</p>
<p><strong>c) Unsecured IoT devices on site</strong></p>
<p>Internet of Things (IoT or Smart Devices) devices are increasingly used to monitor equipment, track workers, manage environmental conditions, control machinery and secure site access. But many IoT systems lack encryption, authentication or secure configuration, leaving them open to exploitation.</p>
<p><strong>d) Human error &amp; social engineering</strong></p>
<p>Insurance industry cyber claims highlight that more than 80% of breaches begin with a human mistake, not a technical failure. Phishing emails, invoice fraud, fake subcontractor communications and compromised file-sharing links are rampant in the industry.</p>
<p><strong>e) Compromised cloud services</strong></p>
<p>Cloud collaboration tools are essential for modern construction. But poor access controls, shared logins, dark web data breaches or unsecured mobile devices create vulnerabilities that attackers regularly exploit.</p>
<h2>The Consequences Hit Far Beyond IT</h2>
<p>Cyber incidents in construction not only expose data, they disrupt entire project ecosystems. According to industry reports, successful attacks lead to:</p>
<p><strong>a) Project Delays &amp; Operational Shutdowns</strong></p>
<p>Ransomware can freeze project schedules, site access systems, procurement and logistics, design files and BIM models and communication tools. In major projects, every day of delay can cost millions.</p>
<p><strong>b) Cost Overruns</strong></p>
<p>Cyber incidents often cause emergency IT recovery costs, ransom payments, penalty payments for delays, rework due to corrupted files, unplanned labour and overtime, and forensic and legal expenses.</p>
<p><strong>c) Loss of Contracts and Trust</strong></p>
<p>Contracts, especially in government and critical infrastructure, may be revoked if contractors suffer significant cyber breaches and trust in their systems is lost.</p>
<p><strong>d) Legal, Insurance &amp; Compliance Exposure</strong></p>
<p>With increasing regulatory attention and mandatory breach notification laws, construction firms may face regulatory scrutiny, investigations, and litigation.</p>
<h2>Prevention Against Cyber Threats is More Effective Than Remediation</h2>
<p>According to research, the cost of proactive cyber protection is a fraction of the cost of responding to a major breach.</p>
<p>The most effective strategy is early detection. Identifying vulnerabilities (such as weak subcontractor connections, exposed cloud storage, unpatched devices, or poor security protocols) before attackers exploit them is the key to resilience.</p>
<p>The following strategies can identify vulnerabilities early and significantly reduce both the likelihood and impact of an attack:</p>
<ul>
<li>regular cyber risk assessments</li>
<li>security awareness training for staff and subcontractors</li>
<li>improved authentication policies</li>
<li>patch management</li>
<li>reviewing access controls</li>
<li>incident response planning</li>
</ul>
<h2>Why a Tailored Cybersecurity Approach is Needed in Construction</h2>
<p>Construction is unlike any other sector. With multiple sites, dispersed teams, diverse hardware/software, and complex supply chains, a generic cyber security solution simply does not work. Tailored strategies must consider:</p>
<p><strong>a) Multi-site environments</strong></p>
<p>Each site has unique requirements, equipment, connectivity and contractor access.</p>
<p><strong>b) Distributed workforce</strong></p>
<p>Engineers, project managers, site supervisors and subcontractors work across different locations and systems with varying sensitivity.</p>
<p><strong>c) High subcontractor dependency</strong></p>
<p>Each subcontractor introduces a new set of potential vulnerabilities.</p>
<p><strong>d) Operational technology (OT) &amp; IoT complexities</strong></p>
<p>Integrating physical equipment with digital systems increases risk.</p>
<p><strong>e) Hybrid digital ecosystems</strong></p>
<p>On-premise systems, cloud apps and mobile devices must all be secured cohesively.</p>
<p>Clearly, construction demands a layered, customised cyber security model, one that addresses human, technical, and supply-chain vulnerabilities holistically.</p>
<h2>What Construction Cyber Threats Indicate</h2>
<p>Australia’s construction industry continues to move quickly into a digital future, but with that progress comes real, business-critical cyber risk.</p>
<p>Cyber-attacks are no longer hypothetical. They are happening every week across the sector, impacting builders, contractors, engineers, architects and suppliers. The consequences are far-reaching: financial loss, project disruption, safety risks and reputational damage.</p>
<p>The message is clear: Construction firms must treat cyber security as seriously as physical site safety, quality control and project governance.</p>
<p>The most resilient organisations will be those that:</p>
<ul>
<li>recognise cyber risk as a genuine operational threat</li>
<li>assess their vulnerabilities early</li>
<li>strengthen subcontractor and supply-chain security</li>
<li>build a culture of cyber awareness</li>
<li>invest in tailored, layered protection</li>
</ul>
<p>In a landscape where every project is interconnected, a firms cyber security controls are only as strong as its weakest link. Now is the time for construction companies to act before a cyber incident becomes the next major project delay or business interruption.</p>
<h2>Can We Help?</h2>
<p>We are here to help strengthen cyber resilience. Our cyber risk management capabilities include designing and developing a cyber risk management framework and a wide range of response plans to enhance your cyber resilience capabilities. Our <a href="https://inconsult.com.au/services/cyber-resilience/">cyber risk</a> management services include:</p>
<ul>
<li><a href="https://inconsult.com.au/construction/">Vulnerability scanning</a></li>
<li>Cyber Security Gap Analysis against Essential Eight and ISO 27001</li>
<li>Regulation compliance advice</li>
<li>Cyber Risk Governance Framework Reviews</li>
<li>Cyber Risk Governance Framework Development</li>
<li>Third-Party Vendor Review and Cyber Risk Analysis</li>
<li>Cyber Risk Awareness Training and Internal Campaigns</li>
<li>Post-Cyber Incident Review</li>
<li>Email Phishing Campaigns</li>
<li>Cyber Incident Response</li>
<li>Crisis Team Familiarisation Training</li>
<li>Artificial Intelligence (AI) Risk Governance</li>
</ul>
<p>Be more resilient to a wide range of cyber risks and get relevant insight into how to protect your systems by <a href="https://inconsult.com.au/contact-us/">contacting us</a> to discuss how we can help strengthen your cyber resilience framework.</p>
<div class='printomatic pom-default ' id='id7547'  data-print_target='body'></div>The post <a href="https://inconsult.com.au/publication/construction-cyber-threats-when-hackers-hit-the-jobsite/">Construction Cyber Threats: When Hackers Hit the Jobsite</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ASX Takes Control of Corporate Governance</title>
		<link>https://inconsult.com.au/publication/asx-takes-control-of-corporate-governance/</link>
		
		<dc:creator><![CDATA[Tony Harb]]></dc:creator>
		<pubDate>Tue, 21 Oct 2025 04:15:29 +0000</pubDate>
				<guid isPermaLink="false">https://inconsult.com.au/?post_type=publication&#038;p=13185</guid>

					<description><![CDATA[<p>ASX Takes Control of Corporate Governance Principles The structure of corporate governance in Australia is undergoing a fundamental change. The system for establishing the Corporate Governance Principles and Recommendations (CGPR), which guide all ASX Listed Entities, is being overhauled after 23 years. The catalyst for this shift was the collapse of negotiations for the proposed [&#8230;]</p>
The post <a href="https://inconsult.com.au/publication/asx-takes-control-of-corporate-governance/">ASX Takes Control of Corporate Governance</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></description>
										<content:encoded><![CDATA[<h1>ASX Takes Control of Corporate Governance Principles</h1>
<p>The structure of corporate governance in Australia is undergoing a fundamental change. The system for establishing the Corporate Governance Principles and Recommendations (CGPR), which guide all ASX Listed Entities, is being overhauled after 23 years.</p>
<p>The catalyst for this shift was the collapse of negotiations for the proposed 5th Edition of the CGPR earlier this year. The 19-member ASX Corporate Governance Council (CGC), a body designed to achieve consensus among diverse industry groups, found itself in gridlock.</p>
<p>This friction prompted the ASX to commission an independent &#8220;Review Panel&#8221; in June 2025 to recommend a more effective path forward.</p>
<h2>The Six Key Recommendations Shaping the Future of CGPR</h2>
<p>In September 2025, the Review Panel released a <a href="https://www.asx.com.au/content/dam/asx/about/media-releases/2025/16-oct-asx-to-implement-recommendations-from-independent-panel-review-on-the-process-for-develop.pdf" target="_blank" rel="noopener">report</a> with sweeping recommendations, which the ASX formally committed to adopting in October 2025. This marks a definitive transition from a broadly representative model to a more centralised and expert-driven approach.</p>
<p>The core recommendations are:</p>
<ol>
<li><strong>Shift Ultimate Responsibility</strong>: The sole authority for developing, approving, and issuing the CGPR will move from the CGC to the ASX.</li>
<li><strong>Establish a New Expert Advisory Group</strong>: The ASX will be supported by a small, new Advisory Group of 6-10 members (half the size of the former council), led by an independent Chair.</li>
<li><strong>The Philosophical Shift</strong>: Members of the new Advisory Group will be appointed in their individual expert capacity. They will be expected to act in the interests of the entire market, moving away from representing specific industry groups or constituencies.</li>
<li><strong>Retain the &#8220;If Not, Why Not&#8221; Rule</strong>: The existing flexible disclosure approach will remain central to the Principles. This cornerstone of Australian governance gives boards flexibility while maintaining transparency.</li>
<li><strong>Simplify and Streamline</strong>: Future Principles will be simplified to avoid overlap with matters already covered in the Corporations Act and other legal/regulatory requirements.</li>
<li><strong>Set a Fixed Renewal Cycle</strong>: A 4-year renewal cycle will be implemented to ensure the CGPR remains current and can quickly address evolving risks like ESG, cyber security, and corporate culture.</li>
</ol>
<h2>What This Means for ASX Listed Entities</h2>
<p>The ASX&#8217;s commitment to these changes signals a move toward a more agile and efficient system for maintaining world-class corporate governance standards in Australia. While the 4th Edition of the Principles remains in effect for now, boards should anticipate quicker responses to global governance trends and a renewed focus on core principles over overly prescriptive rules in the next edition.</p>
<h2>Can We Help?</h2>
<p>We understand the importance of good governance for Australian listed entities.  Since 2001, we have assisted listed entities strengthen their risk management framework to align with better practice and the Corporate Governance Principles and Recommendations (CGPR).</p>
<p>Our services are designed to help boards quickly translate the Principles into actionable compliance and disclosure practices, enabling listed entities to meet the higher standards expected.</p>
<p>For small to medium listed entities, we offer bespoke services that include:</p>
<ul>
<li><strong>Virtual Risk Officer</strong>: We offer expert guidance in establishing formal risk frameworks and conduct independent reviews to assess framework maturity. Additionally, we conduct risk workshops, risk culture assessments, and provide specialised services in areas like business continuity, crisis management, fraud control, modern slavery, and climate change risk.</li>
<li><strong>Virtual Chief Information Security Officer (vCISO)</strong>: We provide fractional or on-demand cyber security leadership to help you meet the evolving cyber risk landscape, without the cost of a full-time executive.</li>
<li><strong>Internal Audit Services</strong>: We provide outsourced or co-sourced internal audit functions, ensuring independent assurance on your controls and operational efficiency, which is vital for maintaining board and stakeholder confidence.</li>
</ul>
<p>Take risk management to the next level and <a href="https://inconsult.com.au/contact-us/" target="_blank" rel="noopener noreferrer">contact us</a> to discuss your risk and resilience needs.</p>
<div class='printomatic pom-default ' id='id6427'  data-print_target='body'></div>The post <a href="https://inconsult.com.au/publication/asx-takes-control-of-corporate-governance/">ASX Takes Control of Corporate Governance</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GRC Capability vs Technology: The Differences</title>
		<link>https://inconsult.com.au/publication/grc-capability-vs-technology-the-differences/</link>
		
		<dc:creator><![CDATA[Tony Harb]]></dc:creator>
		<pubDate>Fri, 10 Oct 2025 03:18:02 +0000</pubDate>
				<guid isPermaLink="false">https://inconsult.com.au/?post_type=publication&#038;p=13127</guid>

					<description><![CDATA[<p>GRC Technology vs. GRC Capability: Understanding the Difference The term GRC (Governance, Risk and Compliance) was first used in the early/mid 2000s, gaining prominence after major corporate scandals such as Enron and WorldCom led to the introduction of regulatory reforms like the Sarbanes-Oxley Act (2002) in the United States. These events highlighted the need for [&#8230;]</p>
The post <a href="https://inconsult.com.au/publication/grc-capability-vs-technology-the-differences/">GRC Capability vs Technology: The Differences</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></description>
										<content:encoded><![CDATA[<h1>GRC Technology vs. GRC Capability: Understanding the Difference</h1>
<p>The term GRC (Governance, Risk and Compliance) was first used in the early/mid 2000s, gaining prominence after major corporate scandals such as <a href="https://www.investopedia.com/updates/enron-scandal-summary/" target="_blank" rel="noopener">Enron</a> and WorldCom led to the introduction of regulatory reforms like the Sarbanes-Oxley Act (2002) in the United States. These events highlighted the need for stronger governance structures, integrated risk management, and regulatory accountability — giving rise to what we now recognise as GRC.</p>
<p>Many organisations believe that purchasing a GRC platform equals GRC maturity. The reality? Software alone does not create good governance.</p>
<p>True GRC is a capability that is built on policy, people, processes, and culture that is enabled by technology.</p>
<p>When these elements are misaligned, even the most expensive tools fail. This article helps leaders recognise that GRC is an organisational discipline, not an IT project or stand alone system.</p>
<h2><strong>Why GRC Is More Than Just Software</strong></h2>
<p>Buying a tool without clear governance structures, decision rights, and accountabilities creates confusion rather than clarity. GRC capability starts with purpose and policy — then aligns responsibility, process, and technology.</p>
<p><strong>Risk: </strong>Organisations that rush into technology miss foundational elements, resulting in &#8220;shelfware&#8221;, low adoption and inconsistent practices.</p>
<p><strong>Risk mitigation actions:</strong></p>
<ul>
<li>Align technology with policy and governance frameworks.</li>
<li>Define ownership (risk, compliance, audit) before automation.</li>
<li>Assess your maturity before tool selection.</li>
</ul>
<h2><strong>People and Culture &#8211; The Real Engine of GRC Capability</strong></h2>
<p>Even the best system won&#8217;t fix a weak risk culture, broken processes or disengaged users. If leadership, risk owners or frontline staff don’t understand their role, GRC becomes a compliance chore rather than a value practice.</p>
<p><strong>Risk: </strong>Without role clarity and engagement, risk data becomes unreliable, workflows stall, and decisions are made blind.</p>
<p><strong>Risk mitigation actions:</strong></p>
<ul>
<li>Deliver role-based GRC training and cultural embedding.</li>
<li>Establish governance committees and escalation protocols.</li>
<li>Strengthen three lines of accountability.</li>
</ul>
<h2><strong>Processes &#8211; The Hidden Weak Link in GRC Implementation</strong></h2>
<p>GRC tools can only automate what already works. If risk assessments, incident workflows, or policy lifecycles are unclear, the system simply digitises chaos.</p>
<p><strong>Risk:</strong> Broken processes lead to inconsistent risk reporting, duplicate registers, and poor audit traceability.</p>
<p><strong>Risk mitigation actions:</strong></p>
<ul>
<li>Map and optimise risk, compliance and incident workflows.</li>
<li>Standardise process libraries before automation.</li>
<li>Establish data taxonomy and control hierarchies.</li>
</ul>
<h2><strong>Technology as an Enabler &#8211; Not the Hero</strong></h2>
<p>Software should enable integration, not dictate the GRC model. Over-customisation or ‘bending’ the tool to broken processes often results in complexity and user frustration.</p>
<p><strong>Risk: </strong>Technology misalignment creates resistance, workarounds and shadow systems (spreadsheets, emails, manual logs).</p>
<p><strong>Risk mitigation actions:</strong></p>
<ul>
<li>Conduct GRC tool health checks and utilisation audits.</li>
<li>Simplify configuration in line with process reality.</li>
<li>Introduce optimisation roadmaps post-implementation.</li>
</ul>
<h2><strong>Key Takeaway</strong></h2>
<p>Successful GRC is a journey, not a go-live event.</p>
<p>Ultimately, organisations that view GRC as a true enterprise capability &#8211; built on strong governance, clear ownership, aligned processes and engaged people &#8211; are the ones that extract real value from their technology investment.</p>
<p>A platform alone cannot create maturity; it must sit on a foundation of purpose, process and accountability.</p>
<p>By strengthening capability first and using technology as an enabler, organisations move beyond compliance to create a system that supports confident decision-making, resilience and long-term trust.</p>
<h2><strong>How InConsult Bridges the GRC Gap</strong></h2>
<p>You don’t build GRC maturity by installing software. You build it by developing capabilit and technology follows.</p>
<p>InConsult helps organisations shift from tool reliance to capability growth. Discover InConsult’s GRC Assurance and Optimisation services.</p>
<p>As risk, governance, compliance, and audit practitioners, InConsult specialises in GRC Post-Implementation Reviews. We help organisations identify red flags, assess system effectiveness, and implement improvement plans. Our independent guidance ensures your GRC system becomes a reliable tool for decision-making, risk oversight, and regulatory compliance — quickly turning underperformance into opportunity.</p>
<p>Bring people, systems and processes together to better manage risk and compliance, <a title="Contact Us" href="https://inconsult.com.au/contact-us/">contact us</a> to discuss your GRC needs.</p>
<p>&nbsp;</p>
<div class='printomatic pom-default ' id='id4141'  data-print_target='body'></div>
<p>&nbsp;</p>The post <a href="https://inconsult.com.au/publication/grc-capability-vs-technology-the-differences/">GRC Capability vs Technology: The Differences</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New GRC system: Fix Post Go-Live Issues Early</title>
		<link>https://inconsult.com.au/publication/new-grc-system-fix-post-go-live-issues-early/</link>
		
		<dc:creator><![CDATA[Tony Harb]]></dc:creator>
		<pubDate>Fri, 10 Oct 2025 00:05:10 +0000</pubDate>
				<guid isPermaLink="false">https://inconsult.com.au/?post_type=publication&#038;p=13112</guid>

					<description><![CDATA[<p>Post Go-Live Reality: Early Warning Signs Your GRC System Is Underperforming Implementing a GRC system is a major investment in technology, processes, and culture. Yet many organisations discover that, a few months after go-live, the system isn’t delivering the expected value. The consequences aren’t just financial – as compliance gaps could lead to increased regulatory [&#8230;]</p>
The post <a href="https://inconsult.com.au/publication/new-grc-system-fix-post-go-live-issues-early/">New GRC system: Fix Post Go-Live Issues Early</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></description>
										<content:encoded><![CDATA[<h1>Post Go-Live Reality: Early Warning Signs Your GRC System Is Underperforming</h1>
<p>Implementing a GRC system is a major investment in technology, processes, and culture. Yet many organisations discover that, a few months after go-live, the system isn’t delivering the expected value. The consequences aren’t just financial – as compliance gaps could lead to increased regulatory scrutiny:</p>
<ul>
<li>Under CPS 220 and CPS 230, APRA expects robust Risk Management Information Systems (RMIS) that support timely and accurate reporting.</li>
</ul>
<p>This isn’t just confined to the Prudential Regulator, as multiple regulators across other jurisdictions continue to demand more from Risk &amp; Compliance teams:</p>
<ul>
<li>ASIC requires robust compliance and conduct controls</li>
<li>AUSTRAC expects systems for financial crime, AML/CTF monitoring, and reporting</li>
<li>Global bodies like the SEC (U.S.), FCA (UK), and EBA (Europe) enforce integrated risk management, operational resilience, and reporting obligations</li>
<li>Sector-specific regulators such as the TGA (health), AEMO/AER (energy), and prudential authorities in finance also demand evidence of controlled, auditable processes</li>
</ul>
<p>This non-exhaustive list highlights the regulatory challenge that modern day organisations face and reinforce the need for mature GRC platforms. So when your GRC system underperforms – it is important to identify issues early and ensure your GRC platform performs from day 1.</p>
<p>Here are some early warning signs to look out for:</p>
<h2><strong>1. Low User Adoption and Engagement</strong></h2>
<p>Even the most advanced GRC platform fails if users don’t engage with it consistently. Low adoption can manifest as minimal logins, incomplete workflows, or continued reliance on spreadsheets and emails.</p>
<p>User engagement is a critical predictor of system success. Poor adoption leads to gaps in risk reporting, incomplete audit trails, and misalignment between business and technology.</p>
<p><strong>Actions:</strong></p>
<ol>
<li>Conduct targeted user training sessions and refresher workshops.</li>
<li>Implement a communication plan highlighting benefits and quick wins.</li>
<li>Introduce dashboards and KPIs to show users how their input drives decision-making.</li>
</ol>
<h2><strong>2. Clunky GRC interface or Inefficient Workflows</strong></h2>
<p>GRC systems are intended to streamline processes, but poorly configured workflows or overly complex approval steps can frustrate users and slow operations.</p>
<p>Inefficient workflows increase errors, reduce efficiency, and discourage use. When workflows don’t align with how the business actually operates, staff may bypass the system or duplicate work, undermining the platform’s value.</p>
<p><strong>Actions:</strong></p>
<ol>
<li>Review and map existing business processes against system workflows.</li>
<li>Simplify approval chains and automate repetitive tasks.</li>
<li>Engage key users to test revised workflows before full rollout.</li>
</ol>
<h2><strong>3. Poor Data Quality and Reporting</strong></h2>
<p>A GRC system is only as effective as the data it contains. Inconsistent data entry, missing fields, or errors in migrated data can lead to inaccurate dashboards and misleading reports.</p>
<p>Decision-makers rely on GRC systems for insight into enterprise risks. Poor data quality compromises board reporting, regulatory compliance, and risk visibility.</p>
<p><strong>Actions:</strong></p>
<ol>
<li>Perform a data cleansing and standardisation exercise.</li>
<li>Implement mandatory fields, validation rules, and automation to reduce errors.</li>
<li>Schedule regular audits and monitoring of data quality metrics.</li>
</ol>
<h2><strong>4. Integration and GRC System Performance Issues</strong></h2>
<p>Post-go-live, integration with existing systems such as HR, incident management, and policy libraries may be incomplete or unstable. System slowdowns or errors can frustrate users and reduce confidence.</p>
<p>Seamless integration is essential for a single source of truth across governance, risk, and compliance functions. Poor integration reduces visibility, introduces duplicate data, and increases operational risk.</p>
<p><strong>Actions:</strong></p>
<ol>
<li data-start="3173" data-end="3239">Conduct a full integration review to identify gaps or conflicts.</li>
<li data-start="3243" data-end="3320">Optimise data flow between systems and implement automation where possible.</li>
<li data-start="3324" data-end="3389">Monitor performance and error logs to proactively resolve issues.</li>
</ol>
<h2><strong>5. Misalignment with Risk and Compliance Objectives</strong></h2>
<p>Sometimes, the system delivers outputs, but they don’t align with the organisation’s risk frameworks, reporting requirements, or regulatory expectations. Misalignment leads to wasted investment, reporting gaps, and potential non-compliance.</p>
<p>Actions:</p>
<ol>
<li>Reassess system configuration against risk and compliance frameworks.</li>
<li>Adjust reporting templates and dashboards to align with board and regulator needs.</li>
<li>Conduct workshops with key stakeholders to ensure outputs meet operational and strategic objectives.</li>
</ol>
<h2><strong>Key Takeaway</strong></h2>
<p>Post-go-live issues are common but preventable if organisations proactively monitor adoption, workflows, data quality, integration, and alignment. Addressing these early ensures the GRC system delivers real insights, strengthens governance, and meets regulatory expectations. An early Post-Implementation Review identifies misalignments and provides actionable recommendations.</p>
<h2><strong>How InConsult Bridges the GRC Gap</strong></h2>
<p>Want your GRC system to deliver real value? Discover InConsult’s GRC Assurance and Optimisation services.</p>
<p>As risk, governance, compliance, and audit practitioners, InConsult specialises in GRC Post-Implementation Reviews. We help organisations identify red flags, assess system effectiveness, and implement improvement plans. Our independent guidance ensures your GRC system becomes a reliable tool for decision-making, risk oversight, and regulatory compliance — quickly turning underperformance into opportunity.</p>
<p>Bring people, systems and processes together to better manage risk and compliance, <a title="Contact Us" href="https://inconsult.com.au/contact-us/">contact us</a> to discuss your GRC needs.</p>
<p>&nbsp;</p>
<div class='printomatic pom-default ' id='id7405'  data-print_target='body'></div>
<p>&nbsp;</p>The post <a href="https://inconsult.com.au/publication/new-grc-system-fix-post-go-live-issues-early/">New GRC system: Fix Post Go-Live Issues Early</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GRC System Readiness Assessment: 5 Key Questions</title>
		<link>https://inconsult.com.au/publication/grc-system-readiness-assessment-5-key-questions/</link>
		
		<dc:creator><![CDATA[Tony Harb]]></dc:creator>
		<pubDate>Thu, 09 Oct 2025 21:53:46 +0000</pubDate>
				<guid isPermaLink="false">https://inconsult.com.au/?post_type=publication&#038;p=13103</guid>

					<description><![CDATA[<p>GRC Readiness – The 5 Questions Every Organisation Must Ask Before Selecting a Platform Before investing in a Governance, Risk, and Compliance (GRC) platform, organisations need to pause and evaluate their readiness. Regulators such as APRA, under CPS 220 and CPS 230, expect organisations to maintain reliable Risk Management Information Systems (RMIS). However, technology alone [&#8230;]</p>
The post <a href="https://inconsult.com.au/publication/grc-system-readiness-assessment-5-key-questions/">GRC System Readiness Assessment: 5 Key Questions</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></description>
										<content:encoded><![CDATA[<h1>GRC Readiness – The 5 Questions Every Organisation Must Ask Before Selecting a Platform</h1>
<p>Before investing in a Governance, Risk, and Compliance (GRC) platform, organisations need to pause and evaluate their readiness.</p>
<p>Regulators such as <a href="https://www.apra.gov.au/">APRA</a>, under CPS 220 and CPS 230, expect organisations to maintain reliable Risk Management Information Systems (RMIS). However, technology alone does not guarantee better risk oversight. A platform implemented without assessing readiness, risks under-delivering, wasting investment, and creating compliance gaps.</p>
<p>A GRC Readiness Assessment helps organisations align their operating model, ownership structures, integration needs, and change capability before committing to a system — maximising return on investment and strengthening decision-making.  Here are our top 5 questions to ask before you invest in a GRC system.</p>
<h2><strong>1. What Problem Are We Actually Trying to Solve?</strong></h2>
<p>Many organisations invest in GRC platforms without a clear understanding of the problem they are trying to solve. Is the priority regulatory reporting, audit efficiency, enterprise risk visibility, or incident management?</p>
<p>Providing GRC vendors with a list of your requirements is not defining the problem you are trying to solve. Yes it will help &#8211; but the &#8216;functional requirements&#8217; are the results of an in depth needs analysis.</p>
<p><strong>Why it matters:</strong></p>
<p>Without clarity, organisations often purchase overly complex systems with features they don’t need, or they fail to solve core gaps. This leads to underused technology, frustrated users, and poor adoption. By defining the problem upfront, organisations can target match-fit solutions that truly add value.</p>
<h2><strong>2. Are Our Processes, Governance, and Data GRC Ready?</strong></h2>
<p>A GRC platform amplifies the strengths and weaknesses of existing processes and governance structures. If workflows are inconsistent, controls are poorly defined, or data quality is unreliable, automation will not fix the underlying problems.</p>
<ul>
<li>The risk and compliance framework should be robust and have an operating rhythm.</li>
<li>People should understand the fundamentals of risk management.</li>
<li>The risk culture must be alive and well.</li>
</ul>
<p><strong>Why it matters:</strong></p>
<p>Platforms rely on accurate, standardised data to provide insights. Investing in technology without process and data readiness can produce misleading reports, compliance gaps, and lost trust with regulators and boards. A readiness assessment ensures that your frameworks, controls, and data are fit-for-purpose, giving the platform a foundation to deliver measurable business value.</p>
<h2><strong>3. Who Will Own and Sustain the GRC Platform?</strong></h2>
<p>Ownership is critical for long-term GRC success. We&#8217;ve seen ownership range from the company secretary to the risk officer to the IT manager. Assigning responsibility solely to IT or a single department risks poor adoption, missed updates, and fragmented oversight. GRC itself aims to breakdown silos.  A clearly defined governance model ensures accountability for system administration, workflow management, and user support.</p>
<p><strong>Why it matters:</strong></p>
<p>Without business ownership, the platform becomes a compliance checkbox rather than a decision-making tool. Identifying owners across risk, compliance, and audit functions ensures ongoing maintenance, process alignment, and active use &#8211; enabling the system to deliver insights consistently and reliably.</p>
<h2><strong>4. How Will the GRC Platform Integrate with Existing Systems?</strong></h2>
<p>Organisations often have multiple tools: HR systems, incident management platforms, policy libraries, and reporting tools. A GRC platform that cannot integrate with these systems creates silos and duplicate work. Sure, some organisations don&#8217;t need full integration, but if you do, integration and security becomes a big issue.</p>
<p><strong>Why it matters:</strong></p>
<p>Integration is essential for real-time visibility and accurate reporting. By mapping existing systems and defining integration points upfront, organisations can streamline workflows, reduce manual work, and provide the board with a single source of truth for governance, risk, and compliance information.</p>
<h2><strong>5. Are We Ready for Change?</strong></h2>
<p>Even the best platform will fail if users are resistant to change. Implementing a GRC system often requires a cultural shift &#8211; from manual reporting and siloed ownership to automated workflows, shared accountability, and transparent reporting.</p>
<p><strong>Why it matters:</strong></p>
<p>Without leadership support and a change management strategy, adoption will be slow, processes inconsistent, and the system underused. Assessing organisational readiness for change ensures that training, communication, and engagement strategies are in place to make adoption smooth, sustainable, and effective.</p>
<h2><strong>Key Takeaway</strong></h2>
<p>In practice, organisation will have more questions to answer, but this is our recommended starting point.</p>
<p>A GRC platform is only as effective as the organisation using it. Readiness assessment prevents wasted investment, poor adoption, and regulatory gaps. Organisations that answer these questions before selecting a platform position themselves for real value creation — aligning people, processes, and technology.</p>
<h2><strong>How InConsult Bridges the Gap</strong></h2>
<p>Want your GRC system to deliver real value? Discover InConsult’s GRC Assurance and Optimisation services.</p>
<p>Our GRC Readiness assessment prevents wasted investment, poor adoption, and regulatory gaps. Organisations that answer these questions before selecting a platform position themselves for real value creation.</p>
<p>Bring people, systems and processes together to better manage risk and compliance, <a title="Contact Us" href="https://inconsult.com.au/contact-us/">contact us</a> to discuss your GRC needs.</p>
<p>&nbsp;</p>
<div class='printomatic pom-default ' id='id8410'  data-print_target='body'></div>
<p>&nbsp;</p>The post <a href="https://inconsult.com.au/publication/grc-system-readiness-assessment-5-key-questions/">GRC System Readiness Assessment: 5 Key Questions</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why GRC Systems Fail &#038; How to Unlock Real Value</title>
		<link>https://inconsult.com.au/publication/why-grc-systems-fail-how-to-unlock-real-value/</link>
		
		<dc:creator><![CDATA[Tony Harb]]></dc:creator>
		<pubDate>Thu, 09 Oct 2025 20:20:12 +0000</pubDate>
				<guid isPermaLink="false">https://inconsult.com.au/?post_type=publication&#038;p=13087</guid>

					<description><![CDATA[<p>Why GRC Systems Fail &#38; How to Unlock Real Value Many organisations invest heavily in GRC platforms expecting instant transformation and a strategic engine – only to find they’ve just gained a static reporting tool. With regulators like APRA explicitly requiring organisations to maintain robust risk management information systems through   CPS 220 (Risk Management) and [&#8230;]</p>
The post <a href="https://inconsult.com.au/publication/why-grc-systems-fail-how-to-unlock-real-value/">Why GRC Systems Fail & How to Unlock Real Value</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></description>
										<content:encoded><![CDATA[<h1>Why GRC Systems Fail &amp; How to Unlock Real Value</h1>
<p>Many organisations invest heavily in GRC platforms expecting instant transformation and a strategic engine – only to find they’ve just gained a static reporting tool.</p>
<p>With regulators like APRA explicitly requiring organisations to maintain robust risk management information systems through   <a href="https://www.apra.gov.au/">CPS 220</a> (Risk Management) and CPS 230 (Operational Risk Management), it is no longer enough to just own a system.</p>
<p>GRC systems must be implemented effectively, governed properly and capable of supporting real risk insight and decision-making.</p>
<h2><strong>Common GRC System Pitfalls</strong></h2>
<p>Many GRC systems fail not because of the software, but because of the environment they’re dropped into. Why the gap between expectation and reality?</p>
<h4>1. No Clear Problem Definition</h4>
<p>Organisations often implement a GRC system without clearly defining the core problem. Is it risk visibility? Compliance tracking? Audit management? Incident management? All the above?</p>
<p>Without clarity, the system becomes a catch-all tool with no meaningful impact.</p>
<h4>2. Immature or Inconsistent Processes</h4>
<p>Automating broken processes doesn’t fix them; it simply institutionalises inefficiency. If risk assessments, incident reporting or compliance workflows are inconsistent or manual, the system will mirror confusion rather than deliver control.</p>
<h4>3. Poor Data Foundations</h4>
<p>Garbage in, garbage out!</p>
<p>GRC systems are only as strong as the data they consume. Inconsistent risk registers, outdated policies, and fragmented reporting produce dashboards that look impressive but lack accuracy or trustworthiness.</p>
<h4>4. Lack of Change Management &amp; User Engagement</h4>
<p>A common but fatal error, teams assume users will “figure it out”. Without proper training, stakeholder buy-in, and ongoing governance, adoption stalls and the system is underused or abandoned.</p>
<p>This problem is further exacerbated when key staff leave.</p>
<h2><strong>Technology Alone Isn’t GRC</strong></h2>
<p>To function properly, a GRC system requires solid foundations that include:</p>
<ul>
<li>Clear Governance – Who owns risk? Who approves controls and exceptions?</li>
<li>Defined Processes – How do we escalate issues? Track actions? Monitor compliance?</li>
<li>People &amp; Roles – Do executives trust the outputs? Do users understand their responsibilities?</li>
<li>Culture &amp; Accountability – Are teams using the system, or still operating in spreadsheets?</li>
</ul>
<p>Without these components, even the most powerful and expensive GRC platform becomes nothing more than a database with reporting features — not a decision-making engine.</p>
<h2><strong>What GRC Success Looks Like</strong></h2>
<p>A successful GRC implementation goes far beyond configuration. It transforms how decisions are made. High-performing GRC systems deliver:</p>
<ul>
<li>Trustworthy Data &amp; Insights – Executives and Boards rely on it for governance, reporting, and assurance.</li>
<li>True Integration – Risk, compliance, audit, incidents and actions linked in one ecosystem.</li>
<li>Active Adoption &amp; Engagement – Staff use it daily because it simplifies their work.</li>
<li>Continuous Improvement – Dashboards and workflows evolve with the organisation, not remain static after go-live.</li>
</ul>
<p>In short, the GRC system moves from being a reporting database to a strategic platform for governance, risk and compliance intelligence,</p>
<h2><strong>How InConsult Bridges the Gap</strong></h2>
<p>Want your GRC system to deliver real value? Discover InConsult’s GRC Assurance and Optimisation services. As experienced risk, compliance and audit practitioners, we:</p>
<ul>
<li>Assess readiness before selection.</li>
<li>Align processes and frameworks before configuration.</li>
<li>Support user adoption and data integrity.</li>
<li>Review performance post-implementation to ensure ongoing value.</li>
</ul>
<p>Bring people, systems and processes together to better manage risk and compliance, <a title="Contact Us" href="https://inconsult.com.au/contact-us/">contact us</a> to discuss your GRC needs.</p>
<p>&nbsp;</p>
<div class='printomatic pom-default ' id='id964'  data-print_target='body'></div>
<p>&nbsp;</p>The post <a href="https://inconsult.com.au/publication/why-grc-systems-fail-how-to-unlock-real-value/">Why GRC Systems Fail & How to Unlock Real Value</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New Third Party Requirements Reshaping Australia</title>
		<link>https://inconsult.com.au/publication/third-party-audits-reshaping-organisations/</link>
		
		<dc:creator><![CDATA[William Makdessi]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 05:18:22 +0000</pubDate>
				<guid isPermaLink="false">https://inconsult.com.au/?post_type=publication&#038;p=12710</guid>

					<description><![CDATA[<p>On September 15th 2025, the Institute of Internal Auditors (IIA) issued the new Topical Requirements focused on strengthening consistency and quality of auditing the high-risk area of Third Party Management. As a new mandatory element of the IIA International Professional Practices Framework (IPPF), these new requirements will reshape the way in which third party risk [&#8230;]</p>
The post <a href="https://inconsult.com.au/publication/third-party-audits-reshaping-organisations/">New Third Party Requirements Reshaping Australia</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></description>
										<content:encoded><![CDATA[<p>On September 15<sup>th</sup> 2025, the Institute of Internal Auditors (IIA) issued the new <a href="https://www.theiia.org/en/standards/2024-standards/topical-requirements/third-party/?_cldee=KBu2L3NKbLi8FP4uHxMEPIah70AaZTmZN8PzqkD5_pOlgSZ92yQyaCVBEczJG6Kv&amp;recipientid=contact-e29ef4b95c06ee118f6e000d3ae0178a-36d2b4c7686b4f84b7678164d3a1a0c7&amp;esid=1821b916-a592-f011-b4cb-7ced8d32ddf0">Topical Requirements</a> focused on strengthening consistency and quality of auditing the high-risk area of Third Party Management. As a new mandatory element of the IIA International Professional Practices Framework (IPPF), these new requirements will reshape the way in which third party risk management and assurance auditing is facilitated in Australia.</p>
<p>The new Topical Requirements, set to be effective September 15<sup>th</sup> 2026, will raise the bar and provide a number of benefits including:</p>
<ul>
<li>Defining a consistent baseline for evaluating third party risk across all industries.</li>
<li>Increase confidence in assurance and auditing for leadership and key stakeholders with respect to third party risk profiles.</li>
<li>Inherently strengthen the resilience of organisations with respect to third party failures, ethical breaches, cyber incidents and more.</li>
</ul>
<h3><strong>Third Party Challenges Organisations Will Face</strong></h3>
<p>Despite the benefits, the introduction of the requirements also brings with it new challenges that will have to be faced uniquely by organisations of different size, complexity and industry. As they say there is more than one way to skin a cat, and it is up to organisations to determine the right way.</p>
<h4>1. Increases in documentation and evidence</h4>
<p>Auditors will be expected to document evidence of assessment of formally structured frameworks and their supporting procedures. The relationship between these frameworks and how they tie into the organisation&#8217;s risk management is an additional requirement that expects a level of maturity that is not commonly in place in typical Australian organisations. Even if these frameworks are in place, a lack of cohesion across the different methodologies means evidence collection will be a slow process. In the <a href="https://www.aicd.com.au/corporate-governance-sectors/not-for-profit/studies/not-for-profit-governance-and-performance-study-2025.html">AICD 2024-25 NFP Governance &amp; Performance Study</a>, 53% of directors said they spent more time on duties than the prior year, reflecting a rise in compliance and assurance demands typical to director roles.</p>
<p>The quality of evidence also plays a key role. ASA 530 for Attribute Testing requires auditors to document a confidence of 90-95% or higher when ensuring controls are adequate. For key controls, i.e. anything relating to key vendors and processes, any deviation from the requirements must be as low as between <strong>0-5%</strong>. This leaves very little room for exceptions and drives the outcome of any review.</p>
<h4>2. Governance gaps in oversight</h4>
<p>The new requirements mandate clear board oversight to ensure third party relationships are well managed. In reality, most organisations in Australia delegate the ownership and oversight of all third party risk activities to Procurement and/or IT. Being able to prove involvement by leadership will be difficult, and in some cases, require adjustment to the responsibilities of leadership roles.</p>
<p>Consistently, we have observed either a lack of resource to dedicate to third party management or delegation to IT roles such as a Cyber Security Lead. The latter introduces implementation concerns as Cyber Security Lead roles tend to lack the required Risk Management knowledge required to undertake third party management.</p>
<h4>3. Consistent Risk Management throughout the Third Party lifecycle</h4>
<p>To successfully apply a structured and repeatable method to assessing risk throughout the third party lifecycle, organisations must have a formal enterprise risk management that is clear, functional and communicated to all staff involved in the process. The risk assessment process must consistently address selection, onboarding, monitoring, and offboarding.</p>
<p>Private and unlisted companies such as IT service providers, SMEs, NFPs and Charities have no legal obligation to implement a risk management framework with the only exception being an ad-hoc approach for Work Health and Safety. Many third parties that would be used for IT services, marketing, legal services, etc. have no obligation to do so, increasing the risk of poor or no risk management across third party management. The Vero Insurance SME Insurance Index 2024/2025 reported that <strong data-start="1304" data-end="1312">~90%</strong> of Australian businesses lack a formal risk management process with 81–82% <strong>never or rarely</strong> conducting risk analyses when required.</p>
<h4>4. Ongoing monitoring just got harder</h4>
<p>Ongoing monitoring following onboarding is a process that is often not performed successfully or at all by that vast majority of organisations in Australia. The old habits of &#8220;set and forget&#8221; contracts are not good enough. Even multi-year contracts that address all requirements over the lifespan of the contract will require performance, compliance and cyber control assessment to ensure expectations are being met. Naturally, this will also lean on the risk management framework to determine if any such failures to meet expectations result in risks that are outside of the organisation&#8217;s appetite.</p>
<p>The <a href="https://www.mcgrathnicol.com/insight/the-changing-landscape-of-business-risk/">McGrathNicol/YouGov study</a> from August 2024 concluded that <strong>82%</strong> of Australian companies do not extend risk assessments beyond Tier-1 suppliers, and <strong>71% </strong>of companies that do assess third parties, do not include security practices in their assessment.</p>
<h4>5. Aligning to increasing regulatory pressures</h4>
<p>The requirements explicitly reference compliance with local, national, and international regulations. For Australian organisations, that could mean at minimum the Privacy Act. However, certain industries are also affected by the Australian Prudential Regulation Authority (APRA) Prudential Standards CPS 230 Operational Risk Management and CPS 234 Information Security. For larger critical providers, the Security of Critical Infrastructure (SOCI) Act and Modern Slavery are just some additional considerations. Achieving consistency across various different regulations and standards increases complexity.</p>
<p>With the delay of requirements under APRA CPS 230 relating to pre-existing contracts to July 2026 for non-Significant Financial Institutions (SFIs), we can expect a natural increase in pressure as the date approaches. If the activities of APRA CPS 234 from 2019 are also an example of what is to come, we can expect at the very least a thematic review. APRA has already committed to conducting targeted reviews of SFIs as part of their 2025-2026 Corporate Plan.</p>
<h4>6. Strain on smaller organisations and public entities</h4>
<p>Large corporations and enterprises will easily absorb these changes, especially multinationals, as these requirements are not new. For Local Government councils, NFPs, small businesses and providers, these new requirements will demand a new focus on audit and compliance. This new focus will come two-fold as it not only requires additional investment and resource, it could also expose gaps that previously avoided the spotlight.</p>
<h4>7. Cultural resistance and a lack of Third Party strategy</h4>
<p>As with any uplift of requirements and increased complexity, cultural resistance is an expected reality. Australian organisations will fail unless they can overcome the outdated concept that third party management is a procurement-only task. Overcoming this requires the understanding that third party management is not only operational but also strategic. Our dependency on third parties can be improved by better managing the entire process, resulting in cost savings, efficiencies, lower insurance premiums, greater coverage, new client opportunities and much more.</p>
<p>In May 2024, the Australian Privacy Commissioner highlighted third-party providers as a “weak spot” in privacy and security postures of organisations, reinforcing the need for enterprise-level third party management strategy beyond only procurement or IT.</p>
<h3><strong>Why These Challenges Matter</strong></h3>
<p>Ultimately, these challenges are worth facing. The requirements encourage stronger governance, better risk management discipline, and greater transparency across leadership into third party relationships. For Australian organisations, this means better preparedness for cyber incidents, supply chain disruptions, reputational crises, and regulatory scrutiny.</p>
<p>Third parties are already the bread and butter of many critical functions within Australian organisations. We cannot expect adequate operations, security and assurance without expecting a level of quality that matches that of our own internal processes.</p>
<h3><strong>Where To Start with Third Party Management</strong></h3>
<p>In Part 2 of our Third Party Management publication we will go over some key steps to consider and to help you succeed in third party management.</p>
<h3><strong>How We Can Help You Build Organisational Resilience</strong></h3>
<p>We are here to help strengthen your organisational resilience, systems and processes. Our third party risk management capabilities include:</p>
<ul>
<li>In-house developed comprehensives vulnerability scanning of third parties.</li>
<li>Comprehensive third party risk management assessments to provide independent assurance.</li>
<li>Helping organisations take their first steps towards implementing a formal and proactive third party management framework.</li>
<li>Performing an independent review or health check of your existing third party management framework to identify gaps and level of maturity.</li>
<li>Conducting third party risk and cyber risk awareness workshops covering strategic, operational and project risks.</li>
<li>Conducting third party penetration tests and comprehensive audits.</li>
<li>Supporting you across a range of third party services including governance, business continuity, crisis management, cyber risk, third party monitoring and more.</li>
</ul>
<p>Take risk management to the next level and <a title="Contact Us" href="https://inconsult.com.au/contact-us/">contact us</a> to discuss your needs.</p>
<p>&nbsp;</p>
<div class='printomatic pom-default ' id='id3717'  data-print_target='body'></div>
<p>&nbsp;</p>The post <a href="https://inconsult.com.au/publication/third-party-audits-reshaping-organisations/">New Third Party Requirements Reshaping Australia</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The 4 Chief Risk Officer Archetypes For Success</title>
		<link>https://inconsult.com.au/publication/the-4-chief-risk-officer-archetypes-for-success/</link>
		
		<dc:creator><![CDATA[Tony Harb]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 06:11:38 +0000</pubDate>
				<guid isPermaLink="false">https://inconsult.com.au/?post_type=publication&#038;p=12682</guid>

					<description><![CDATA[<p>Beyond the risk registers, the quantitative risk analysis, decision support tools and compliance checklists, the true art of risk management lies within you &#8211; the chief risk officer. It&#8217;s not just about what you know, but who you are. The most effective chief risk officers don&#8217;t just see threats, they see themselves. They understand that their [&#8230;]</p>
The post <a href="https://inconsult.com.au/publication/the-4-chief-risk-officer-archetypes-for-success/">The 4 Chief Risk Officer Archetypes For Success</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></description>
										<content:encoded><![CDATA[<p>Beyond the risk registers, the quantitative risk analysis, decision support tools and compliance checklists, the true art of risk management lies within you &#8211; the chief risk officer. It&#8217;s not just about what you know, but who you are.</p>
<p>The most effective chief risk officers don&#8217;t just see threats, they see themselves. They understand that their character, their style, and their approach to people are as critical as any technical skill. This is where the power of chief risk officer archetypes comes into play.</p>
<p>By exploring these universal models of leadership, you can unlock another level of self-awareness allowing you to not only understand your natural strengths but also strategically adapt your approach to master the ever-evolving landscape of risk.</p>
<h3><strong>What is an Archetype?</strong></h3>
<p>An archetype is a universal model or pattern. Think of an archetype as a basic blueprint for a character, idea, or behaviour that appears again and again across different cultures and stories.</p>
<p>In business, archetypes are often applied to <a href="https://marchbranding.com/design-insight/brand-archetypes" target="_blank" rel="noopener">brands</a> to help companies define their identity, guide strategy, and connect with customers on a deeper, more emotional level. They serve as psychological shortcuts that make complex ideas more relatable and memorable.  For example, &#8220;The Hero&#8221; archetype is used for brands that empower customers to be their best. Think of Nike and its &#8220;Just Do It&#8221; slogan. Another example is &#8220;The Outlaw&#8221; archetype that is used for brands that challenge the status quo and empower rebellion. Harley-Davidson and Virgin are well-known for this.</p>
<p>Archetypes can also be used to understand and categorise <a href="https://hbr.org/2013/12/the-eight-archetypes-of-leadership" target="_blank" rel="noopener">leadership styles</a> and professional roles. This helps in talent management, team building, personal development and recruiting the &#8220;right&#8221; person.</p>
<p>For example, when recruiting a new Chief Executive Officer (CEO), archetypes help identify which leader fits the company&#8217;s current stage of growth. The Fix-It Leader, or Change-Catalyst, is a specialised archetype used for company turnarounds. This leader is not a builder or innovator. They are a turnaround expert whose main goal is to diagnose problems, make difficult decisions and start the changes to restore a company&#8217;s health.</p>
<h3><strong>Using Chief Risk Officer Archetypes</strong></h3>
<p>By categorising risk leaders into archetypes, it may help the board and  CEO understand what kind of expertise and risk leadership is required to manage complex challenges. This approach allows for a more intentional and strategic approach to talent management and organisational design within the C-suite.</p>
<p>Warning, archetypes are not static &#8220;personality types&#8221; as we see in the <a href="https://www.themyersbriggs.com/en-US/Products-and-Services/Myers-Briggs" target="_blank" rel="noopener">The Myers-Briggs Type Indicator</a> (MBTI) tool for understanding personality. The MBTI&#8217;s goal is to sort people into one of 16 distinct, static &#8220;personality types&#8221; (like INTJ or ESFP) based on their preferences in four dichotomous categories. In contrast, archetypes are more dynamic and symbolic. An individual may be influenced by several archetypes at different times and in different ways.</p>
<h3><strong>The 4 Chief Risk Officer Archetypes</strong></h3>
<p>From our literary review, there are a handful of chief risk officer archetypes already identified mainly from large and credible consulting firms.  Most of these models have presented three archetypes for risk leadership.</p>
<p>Deeper research into these models and a reflection from our real-world experience that include our assessment of various risk management frameworks, risk leadership, risk culture, risk maturity and risk capability across public and private sector organisations has revealed a fourth, distinct profile. In total, we have identified four chief risk officer archetypes that serve as strategic blueprints for how a risk leader operates within an organisation. And remember, a risk leader may be influenced by several archetypes at different times and in different ways.</p>
<p><img decoding="async" class=" wp-image-12687 aligncenter" src="https://inconsult.com.au/wp-content/uploads/2025/09/Chief-Risk-Officer-Archetypes_InConsult-300x175.png" alt="Chief Risk Officer Archetypes" width="524" height="306" srcset="https://inconsult.com.au/wp-content/uploads/2025/09/Chief-Risk-Officer-Archetypes_InConsult-300x175.png 300w, https://inconsult.com.au/wp-content/uploads/2025/09/Chief-Risk-Officer-Archetypes_InConsult-768x449.png 768w, https://inconsult.com.au/wp-content/uploads/2025/09/Chief-Risk-Officer-Archetypes_InConsult.png 1131w" sizes="(max-width: 524px) 100vw, 524px" /></p>
<p>These archetypes aren&#8217;t about a person&#8217;s personality type. They describe a leader&#8217;s primary focus, motivation, and style. Leaders can tailor these approaches to a company&#8217;s specific needs at different stages of its risk maturity.</p>
<h4>1. The Innovator</h4>
<p>The Innovator is a risk leader who see risk as strategic tool for growth and competitive advantage, not a barrier.</p>
<p>They are not just managing risk but actively using it to drive the business forward.  They are forward-looking, visionary, and a strong partner to the business.</p>
<p>Innovators work hand-in-hand with the business to help drive growth and capture new opportunities. Instead of focusing solely on protection, they are visionaries who use advanced technology, risk models and a higher risk appetite to help the C-suite build new business models, launch ventures, and expand into new markets.</p>
<p>They have a higher tolerance for risk and focus on identifying opportunities within higher levels of uncertainty and complexity.   Operating in higher levels of uncertainty is their comfort zone.</p>
<p>Their key questions are &#8220;How can we use risk to our advantage?&#8221; and &#8220;What&#8217;s the best way to take a calculated risk?&#8221;</p>
<p>As their core motivation is value creation, Innovators are ideal for high-growth companies, start-ups, new product launches, market expansion, M&amp;A projects or supporting innovation within a larger corporation.</p>
<h4>2. The Guardian</h4>
<p>The Guardians are risk leaders who prioritise building a resilient and sustainable organisation. They see themselves as the ultimate protectors of the organisation.</p>
<p>Their primary focus is on long-term protection, sustainability and resilience &#8211; not just short-term problem solving. They typically create strong and stable foundations to withstand future shocks.</p>
<p>Guardians methodically structure their work and focus heavily on risk governance. They build robust frameworks, embed a strong risk culture, and ensure compliance with regulations. Their main concern is with what could go wrong and how to prevent it.</p>
<p>In essence, the Guardians&#8217; mission is to safeguard the organisation from the ground up, thereby making sure it can weather any storm and any emerging risk.</p>
<p>They often ask, &#8220;Are we prepared for the future?&#8221; and &#8220;What safeguards do we need?&#8221;</p>
<p>Guardians thrive in established, risk-averse, and highly regulated organisations. In these environments, long-term stability and resilience matter more than aggressive growth. Consequently, the Guardian&#8217;s methodical and protective nature perfectly suits sectors where failure is costly and compliance is mandatory. This is why Guardians are prominent in financial services, healthcare, and public sector agencies.</p>
<h4>3. The Operator</h4>
<p>The Operators are the risk leaders who excel at the practical, day-to-day management of risk. They are pragmatic problem-solvers who excel at managing the day-to-day realities of risk. They are very hands-on and focus on efficiency, crisis management, and immediate results.</p>
<p>Operators thrive in situations demanding efficiency, decisive action, and stability.</p>
<p>They are action-oriented and decisive, with a strong focus on the present. For this reason, they are often brought in to help stabilise a business, resolve a crisis, or streamline operations. Furthermore, they prioritise getting the fundamentals right and aren&#8217;t afraid to make tough, unpopular decisions. Ultimately, Operators are all about managing immediate challenges, whether they&#8217;re navigating a crisis or ensuring smooth, efficient operations by de-risking them.</p>
<p>Their key questions are &#8220;How can we fix this right now?&#8221; and &#8220;What is the most efficient way to manage this?&#8221;</p>
<p>Their value lies in their ability to handle real-world challenges with speed and precision, ensuring the company remains stable and on course.</p>
<p>Operators are ideal for organisations facing a range of immediate risks and resilience challenges, undergoing restructuring, or those that prioritise efficiency and stability over radical growth. They excel in environments where direct problem-solving is a top priority. Operators thrive in organisations with known risk management issues, companies in crisis, and highly regulated industries. Their pragmatic, action-oriented approach helps them solve problems directly.</p>
<h4>4. The Influencer</h4>
<p>The Influencers are risk leaders who rely on collaboration and communication to achieve their goals. Instead of using a top-down, command-and-control approach, they use soft power to build consensus and unite disparate teams. In other words, they don&#8217;t lead through authority, but through collaboration and persuasion.</p>
<p>Influencers are catalysts for change, focusing on uniting people and building a shared understanding of risk across the entire organisation.</p>
<p>They are collaborative, communicative, and empathetic. They build strong networks, facilitate cross-functional dialogue, and empower others to take ownership of risk.</p>
<p>Their primary question is &#8220;How can we get everyone on the same page?&#8221; and &#8220;How do we build trust?&#8221;</p>
<p>Therefore, they are natural facilitators who create open dialogue and a common language around risk, ensuring that risk management becomes a collective responsibility rather than a siloed function.</p>
<p>The Influencer archetype is ideal for organisations that need to foster a collaborative risk culture, break down silos, or manage complex transformations where buy-in from multiple stakeholders is critical. Their strength lies in their ability to unite disparate teams and build consensus. Influencers thrive in large, complex organisations, companies undergoing major transformations, and industries where collaboration, project-based work, and teamwork are critical to success.</p>
<h3><strong>Final Thoughts</strong></h3>
<p>These four archetypes provide a powerful lens for understanding different styles, moving beyond a one-size-fits-all approach to risk leadership.</p>
<p>It is possible for a chief risk officer to possess elements of all four archetypes, but it&#8217;s highly unlikely they will master them all equally. Most individuals have a dominant, natural style they rely on, with secondary styles they can develop and use when a situation calls for it.</p>
<p>Ultimately, by recognising if you&#8217;re predominantly an Innovator, Guardian, Operator, or Influencer, you can leverage your natural strengths and identify your blind spots. In turn, this allows you to intentionally adapt your approach to fit your organisation&#8217;s specific needs.</p>
<p>These archetypes transform the abstract idea of a &#8220;risk personality&#8221; into a practical framework for self-awareness and professional growth. This lets you do more than just manage risk. It also helps you engage better with key stakeholders and master your role in shaping a resilient, successful future.</p>
<p>The goal isn&#8217;t to be all four at once, but to understand which style a given situation demands and to be flexible enough to apply it.</p>
<h3><strong>How We Can Help You Take Better Risks</strong></h3>
<p>We are here to help strengthen your risk management capabilities, systems and processes.  Our risk management capabilities include:</p>
<ul>
<li>Providing an interim Chief Risk Officer to backfill a vacancy.</li>
<li>Providing a dedicated Risk Officer on demand through our Virtual Risk Officer service.</li>
<li>Helping organisations take their first steps towards implementing a formal and proactive enterprise-wide risk management framework.</li>
<li>Performing an independent review or health check of your existing risk management framework to identify gaps and level of maturity.</li>
<li>Conducting risk workshops covering strategic, operational and project risks.</li>
<li>Conducting risk culture assessments.</li>
<li><a href="https://inconsult.com.au/services/risk-management-transformation/" target="_blank" rel="noopener">Risk management transformation</a>.</li>
<li>Supporting you across a range of risk management services including business continuity, crisis management, cyber risk, climate change risk, third party risk and fraud risk.</li>
</ul>
<p>Take risk management to the next level and <a title="Contact Us" href="https://inconsult.com.au/contact-us/">contact us</a> to discuss your needs.</p>
<p>&nbsp;</p>
<div class='printomatic pom-default ' id='id1859'  data-print_target='body'></div>
<p>&nbsp;</p>The post <a href="https://inconsult.com.au/publication/the-4-chief-risk-officer-archetypes-for-success/">The 4 Chief Risk Officer Archetypes For Success</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your First 90 Days as a New Risk Officer</title>
		<link>https://inconsult.com.au/publication/your-first-90-days-as-a-new-risk-officer/</link>
		
		<dc:creator><![CDATA[Tony Harb]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 11:38:38 +0000</pubDate>
				<guid isPermaLink="false">https://inconsult.com.au/?post_type=publication&#038;p=12652</guid>

					<description><![CDATA[<p>Congratulations on taking the helm as the new Risk Officer. I&#8217;ve been in your shoes before, stepping into organisations where risk management was, shall we say, a bit of an afterthought. The first time I did it, I walked in with all the frameworks and theories, ready to deploy. I quickly learned that an Excel [&#8230;]</p>
The post <a href="https://inconsult.com.au/publication/your-first-90-days-as-a-new-risk-officer/">Your First 90 Days as a New Risk Officer</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></description>
										<content:encoded><![CDATA[<p>Congratulations on taking the helm as the new Risk Officer. I&#8217;ve been in your shoes before, stepping into organisations where risk management was, shall we say, a bit of an afterthought. The first time I did it, I walked in with all the frameworks and theories, ready to deploy. I quickly learned that an Excel spreadsheet won&#8217;t win any hearts and minds. But, with a structured 90-day plan, you can strategically navigate your initial months, build the foundations for a robust risk culture, and become an indispensable asset to your organisation.</p>
<p>It’s a marathon, not a sprint, and your first 90 days are less about implementing a grand new system and more about a strategic reconnaissance mission.</p>
<h3>Days 1-30: Listening &amp; Learning to Discover</h3>
<p>You’ve just landed a new role, you will bring a fresh perspective and a head full of ideas. But resist the &#8220;rookie error&#8221; of jumping straight into solutions. Your primary goal in the first 30 days is not to fix things immediately but to deeply understand the organisation’s current state of risk management, both formally and informally. This is your strategic reconnaissance mission.</p>
<p>So, your first 30 days are about building relationships, listening, and understanding the company&#8217;s culture. You&#8217;re connecting with people, their priorities, and their pain points.</p>
<h4>1. Understand the business &amp; its objectives</h4>
<p>Before you can help you organisation better manage its risks, you have to understand what it&#8217;s trying to achieve. Think of yourself as an archaeologist, piecing together the organisation’s strategic history and future.</p>
<p>Start by listening. In Stephen R. Covey&#8217;s <a href="https://www.amazon.com.au/Habits-Highly-Effective-People-Anniversary/dp/1760856827/ref=asc_df_1760856827?mcid=ec1ce501a0603a8f9cf957d6e813e4a5&amp;tag=googleshopdsk-22&amp;linkCode=df0&amp;hvadid=712378054319&amp;hvpos=&amp;hvnetw=g&amp;hvrand=9119838800735302010&amp;hvpone=&amp;hvptwo=&amp;hvqmt=&amp;hvdev=c&amp;hvdvcmdl=&amp;hvlocint=&amp;hvlocphy=9071874&amp;hvtargid=pla-912127216987&amp;psc=1&amp;gad_source=1" target="_blank" rel="noopener">The 7 Habits of Highly Effective People</a>, the fifth habit, &#8220;Seek First to Understand, Then to Be Understood,&#8221; is a cornerstone of effective management, emphasising that genuine listening is the key to building trust and solving problems.</p>
<p>Schedule one-on-one meetings with executive leaders, department heads, and key operational staff. But don&#8217;t lead with a pitch about risk. Instead, ask open-ended questions like, &#8220;What are your top three priorities for this quarter?&#8221; or &#8220;What&#8217;s the biggest challenge you&#8217;re facing right now?&#8221; Listen for the recurring themes and pain points. This approach will help you connect risk to their day-to-day reality, making you a key partner in their success, not just a compliance enforcer.</p>
<p>Understand the &#8220;why&#8221; behind the organisation&#8217;s existence and its key drivers. Review your organisations strategic plans, annual reports, and existing business unit performance reviews. Look for key performance indicators (KPIs) and business drivers. A financial services company, for example, might be driven by client acquisition and regulatory compliance, while a government agency might be focused on delivering services and managing public perception. Understanding this &#8220;why&#8221; behind the organisation&#8217;s existence will help you align your risk strategy with its core mission.</p>
<p>Listen more than you talk. Absorb as much information as possible before forming conclusions.</p>
<h4>2. Understand the culture &amp; key stakeholders</h4>
<p>Every organisation has an unwritten rulebook that dictates how things really get done. Your job is to read it and decipher it.</p>
<p>Pay close attention to how decisions are made. Is it a top-down process, or do teams have autonomy? How does information flow&#8230;through formal memos or quick chats in the hallway? Observe who people defer to in meetings, as these are often the informal leaders and key influencers you need to win over.</p>
<p>Find your allies by identifying the &#8220;risk champions&#8221; i.e. the people who already do risk management well, even if it&#8217;s not in their job description. These individuals are your most valuable allies. They might be a project manager who meticulously tracks potential roadblocks or a finance officer who instinctively thinks about fraud. Find them, build rapport, and learn from them. They will be crucial in helping you drive change.</p>
<p>You may be the new kid on the block, so find the people who have the &#8220;institutional knowledge&#8221;. Build relationships with long-serving staff and administrative personnel. They often hold a wealth of knowledge and understand the informal power structures better than anyone. They can give you invaluable context on why certain processes exist or why previous change initiatives failed.</p>
<p>Be a partner, not a police officer. Position yourself as an enabler of objectives, not a blocker.</p>
<h4>3. Assess the current state of risk management</h4>
<p>This is where you get into the nitty-gritty, but remember to stay in &#8220;assessment mode&#8221; not &#8220;judgment mode&#8221;.</p>
<p>Dig into the paper trail by looking into the existing documentation and reports. Do risk registers and risk assessments exist? If so, are they living documents or dusty relics? How are risky decisions escalated to leadership? Do conversations about risk even occur in meetings, and if so, how? Look for formal processes, but also observe if they’re actually being followed.</p>
<p>Conduct informal interviews with people to look beyond the official documents. Ask staff at all levels about their experiences with risk management. Ask questions like, &#8220;What works well when it comes to managing risks in your area?&#8221; and &#8220;What do you believe are the biggest threats to our team&#8217;s success&#8221;? Pay close attention to the &#8220;grapevine&#8221;  as sometimes, the most valuable insights come from informal conversations over coffee. It can reveal what people are truly worried about, regardless of what&#8217;s written in a report.</p>
<h3>Days 31-60: Confirming &amp; Benchmarking</h3>
<p>With a clearer picture of the organisation, culture, and existing frameworks, your focus now shifts. The second month is about solidifying key relationships, validating your initial observations, and beginning to outline potential areas for improvement. This phase is for bringing order to the chaos i.e. this is where you transition from an observer to a trusted partner.</p>
<h4>4. Cultivate key relationships &amp; build trust</h4>
<p>A month in, trust is the single most important currency you will have. Everything you do now should be in service of building it.</p>
<p>Show you&#8217;ve been listening by following up on your initial meetings. Send a brief email or schedule a quick chat to share a summary of what you heard. For example, &#8220;Thanks again for the chat. I heard your team is really focused on onboarding a new strategic vendor this quarter, and that their cybersecurity posture is a key concern. I&#8217;d love to explore how we can support you in that&#8221;. This simple act shows you were listening and value their input.</p>
<p>Identify some &#8220;quick wins&#8221; by looking for low-hanging fruit where you can offer immediate, tangible value. Maybe a manager is struggling with a clunky risk register or a risk reporting process. You could offer a workshop to review the risks or to streamline the report. Or perhaps a team is launching a new project and needs help thinking through the key risks. Offering to facilitate a short, informal risk brainstorming session can be a huge win. These small successes build goodwill and demonstrate that you are a resource, not a roadblock.</p>
<p>Maintain transparency by scheduling regular check-ins with your direct manager or sponsor. Be proactive in updating them on your progress, sharing your observations, and seeking their guidance. This ensures they&#8217;re never surprised and keeps them invested in your success.</p>
<p>Build credibility through action. Small, consistent successes speak louder than grand pronouncements.</p>
<h4>5: Benchmark against better practice</h4>
<p>Now that you have a sense of the organisation’s current state, you can subtly introduce new ideas about what&#8217;s possible. The key here is to do this without criticizing the past.</p>
<p>Subtly introduce new ideas and concepts.  But, instead of saying, &#8220;Your risk management process is broken&#8221;, try, &#8220;In other organisations I&#8217;ve worked with, we found that having a clear risk appetite statement helped us make faster decisions. Is that something we could explore here?&#8221; This frames the conversation around improvement and a shared benefit, not problems.</p>
<p>As you review documentation and speak with people, your will identify clear differences between the current state and a functional risk management framework. Start planting seeds for change.  For example, ask questions like, &#8220;Is there no clear accountability for key risks? Are risks only discussed reactively, after an incident has occurred?&#8221; Use these gaps as focal points for future conversations and improvement plans.</p>
<h4>6. Develop a preliminary assessment &amp; vision</h4>
<p>It&#8217;s now time to translate your findings into a clear, high-level narrative.</p>
<p>Begin to consolidate your observations into a concise assessment of the current risk management maturity. What are the top 3-5 challenges? Is it a lack of clear ownership? A culture of blame? Or simply a lack of effective tools? You should be able to articulate these challenges in a clear and compelling way, grounded in the conversations and documents from the results of your first 60 days.</p>
<p>Next, draft a preliminary vision for what improved risk management would look like. This isn&#8217;t a final plan, but a simple, compelling statement. For example, &#8220;Success would look like a culture where everyone feels empowered to identify risks, and we can make better, faster decisions as a result&#8221;. This serves as your guiding star, a simple vision you can keep coming back to as you navigate the next 90 days and beyond.</p>
<h3>Days 61-90: Catalysing Change &amp; Outlining the Path Forward</h3>
<p>You&#8217;ve now spent the last two months as an anthropologist and an analyst. You’ve listened, learned, and identified the pulse of the organisation. Now is the time to translate that knowledge into visible momentum and a clear strategic roadmap.</p>
<p>As a Risk Officer, you&#8217;re not just a manager; you&#8217;re a catalyst for change, driving early wins, and initiating the strategic plan that will accelerate the organisation&#8217;s risk maturity. This is where you demonstrate your value and secure buy-in for the future.</p>
<h4>7. Deliver an early tangible win or two</h4>
<p>Based on your observations and stakeholder feedback, you should have a solid idea of a quick win project. Now, execute it.</p>
<p>Choose a project that will have a real, visible impact on a key business unit or process. For example, if you discovered that a crucial department is struggling with fraud prevention, deliver a targeted workshop on common fraud indicators and best practices.</p>
<h4>8. Communicate success widely</h4>
<p>Once a quick win project is complete, ensure you publicise it. Write a brief memo or present a short update at a team meeting. Be sure to credit the individuals and teams who helped you. This shows you&#8217;re a team player and that your work translates into tangible benefits.</p>
<p>Communication helps to enhance stakeholder trust in your capabilities, makes you visible to key stakeholders. and builds momentum to demonstrate your value to the organisation.</p>
<p>Focus on value. Always articulate how risk management contributes to the organisation&#8217;s success. How a better risk process isn&#8217;t just about compliance; it&#8217;s about making better decisions, enhancing organisational resilience, and ultimately, achieving strategic objectives.</p>
<h4>9. Present your findings &amp; proposed roadmap</h4>
<p>You’ve built trust and delivered a quick win. Now is the time to formalise your observations and present your vision for the future of risk management.</p>
<p>Prepare a concise presentation for the leadership team and key stakeholders. Don&#8217;t start with a list of problems. Instead, begin with what you’ve &#8220;learned&#8221; from them. Talk about the strategic priorities you&#8217;ve heard and how you&#8217;ve observed risk impacting those goals. This positions you as an ally and team player.</p>
<p>Based on your findings, propose a high-level strategic roadmap for the next 12-18 months. Focus on 3-5 key priorities. This isn&#8217;t about creating a rigid plan, but a living document that can be refined with feedback. For example, your priorities might be to clarify ownership of top risks, integrate risk discussions into business planning sessions, or enhance fraud detection capabilities. For each priority, briefly outline the benefits and the first steps.</p>
<h4>10: Establish governance &amp; communication channels</h4>
<p>Your final goal for the 90-day mark is to set up the structures that will sustain momentum into the future.</p>
<p>Begin establishing or revitalising formal risk governance structures. This could involve creating a new risk committee or simply clarifying the responsibilities of key risk owners. This formalises the changes you&#8217;re introducing and gives them authority (e.g., a risk committee, clear responsibilities for risk owners).</p>
<p>Develop a communication plan for ongoing engagement. Outline how you will regularly communicate with stakeholders about risk. This might be a monthly email update, a standing agenda item in leadership meetings, or a quarterly risk report that is easy to understand. Consistent, clear communication is crucial for keeping risk top of mind and ensuring your efforts don&#8217;t fade into the background.</p>
<p>Be patient, but persistent.  Cultural change takes time, but consistent effort will yield results.</p>
<h3><strong>Final Thoughts</strong></h3>
<p>Your first 90 days as a new Risk Officer are about building trust and momentum. It&#8217;s a three-phase journey. You&#8217;ll spend the first month as an anthropologist, listening and learning to understand the business, its people, and its culture. The second month is for building bridges, validating your findings, and subtly introducing better risk management practices to prove your value as a partner. Finally, in the third month, you&#8217;ll deliver on your promises by executing a small, visible project, then presenting a strategic roadmap that is tied directly to the organisation&#8217;s business goals. Remember, your credibility comes from empathy and action, not from a checklist.</p>
<h3><strong>How We Can Help You Take Better Risks</strong></h3>
<p>We are here to help strengthen your risk management capabilities, systems and processes.  Our risk management capabilities include:</p>
<ul>
<li>Providing an interim Chief Risk Officer to backfill a vacancy.</li>
<li>Providing a dedicated Risk Officer on demand through our Virtual Risk Officer service.</li>
<li>Helping organisations take their first steps towards implementing a formal and proactive enterprise-wide risk management framework.</li>
<li>Performing an independent review or health check of your existing risk management framework to identify gaps and level of maturity.</li>
<li>Conducting risk workshops covering strategic, operational and project risks.</li>
<li>Conducting risk culture assessments.</li>
<li><a href="https://inconsult.com.au/services/risk-management-transformation/" target="_blank" rel="noopener">Risk management transformation</a>.</li>
<li>Supporting you across a range of risk management services including business continuity, crisis management, cyber risk, climate change risk, third party risk and fraud risk.</li>
</ul>
<p>Take risk management to the next level and <a title="Contact Us" href="https://inconsult.com.au/contact-us/">contact us</a> to discuss your needs.</p>
<table style="height: 103px;" width="680">
<tbody>
<tr>
<td width="246">
<h3>Download your free first 90 day checklist</h3>
<p>This first 90 day checklist gives you a clear roadmap for your critical first three months. It highlights the key priorities, actions, and conversations you need to focus on, helping you build momentum, establish credibility, and set yourself up for long-term risk management success.</p>
<p><a href="https://inconsult.com.au/download/12674/?tmstv=1756767790" target="_blank" rel="noopener"><img decoding="async" class="wp-image-12672 alignleft" src="https://inconsult.com.au/wp-content/uploads/2025/09/Download-Checklist-300x70.jpg" alt="" width="167" height="39" srcset="https://inconsult.com.au/wp-content/uploads/2025/09/Download-Checklist-300x70.jpg 300w, https://inconsult.com.au/wp-content/uploads/2025/09/Download-Checklist.jpg 568w" sizes="(max-width: 167px) 100vw, 167px" /></a></td>
<td width="64">&nbsp;</p>
<p><a href="https://inconsult.com.au/download/12674/?tmstv=1756767790" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-12679 size-thumbnail" src="https://inconsult.com.au/wp-content/uploads/2025/09/90-Day-Checklist-150x150.jpg" alt="" width="150" height="150" srcset="https://inconsult.com.au/wp-content/uploads/2025/09/90-Day-Checklist-150x150.jpg 150w, https://inconsult.com.au/wp-content/uploads/2025/09/90-Day-Checklist-640x640.jpg 640w" sizes="(max-width: 150px) 100vw, 150px" /></a></td>
</tr>
</tbody>
</table>
<div class='printomatic pom-default ' id='id8268'  data-print_target='body'></div>The post <a href="https://inconsult.com.au/publication/your-first-90-days-as-a-new-risk-officer/">Your First 90 Days as a New Risk Officer</a> first appeared on <a href="https://inconsult.com.au">InConsult</a>.]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
