AMP 2019-2029

Electricity Asset Management Plan 2019-2029

228

Vector Limited://

PROPOSED INVESTMENT SUMMARY ($MILLION NOMINAL)

DESCRIPTION

FY20

FY21

FY22

FY23

FY24

FY25

FY26

FY27

FY28

FY29 TOTAL

End user compute and collaboration

2.96

3.60

1.82

1.96

1.96

1.96

2.32

2.32

1.96

2.32

23.18

Total CAPEX

2.96

3.60

1.82

1.96

1.96

1.96

2.32

2.32

1.96

2.32

23.18

CYBER SECURITY

NEEDS STATEMENT The increasing prevalence of connected devices, connected networks and consumer engagement is also rapidly increasing the threat profile for cyber security. Vector is heavily invested in a program of work focussed on improving our cyber security posture, and reflects security by design in everything we do. This investment category is primarily focussed on providing increased mobile device threat detection, and refreshing and upgrading all core cyber security capabilities to deliver against this increased threat profile. The nature of connected networks means Vector must continue to focus investment in cyber security over time, and implement regular updates, upgrades and ongoing optimisation of the security capabilities of the organisation to ensure we continue to deliver safe, secure and reliable connected services. We have partnered with leading cyber-security and threat response researchers and are proud to take a leading position in implementing security and delivering highly secure services to its customers. Alongside this, we are developing and implementing new privacy by design measures in all customer facing tools, systems and capabilities, and these further improve our ability to deliver safe and reliable services.

TARGETED OUTCOMES

CUSTOMER EXPERIENCE

SAFETY

RELIABILITY

RESILIENCE

OPERATIONAL EFFICIENCY

CYBER SECURITY AND PRIVACY

OPTIONS CONSIDERED Options to address the need identified above have been assessed and are summarised in the following table.

DESCRIPTION

DISCUSSION OF OPTION

ESTIMATED COST (NPV IF APPLICABLE)

STATUS

Option 1: Business as usual

Investment in cyber security is reactive and based on point solutions. Applications are run through end of life and minimum-security standards are met. Minimum security and privacy obligations are met, however there is no ongoing investment in capability to ensure all services are always delivered securely and safely to customers Continuous upgrade cycle of core assets associated with cyber security, including replacement of firewalls, replacement and optimisation of mobile device tracking and ongoing investment in security review, audit and penetration testing. Privacy and Security by design principles are embedded in all work completed.

Rejected

Option 2: Cyber Security

$7.6M Selected

PROPOSED INVESTMENT SUMMARY ($MILLION NOMINAL)

DESCRIPTION

FY20

FY21

FY22

FY23

FY24

FY25

FY26

FY27

FY28

FY29 TOTAL

Cyber Security

1.53

1.03

0.96

0.54

0.54

0.68

0.54

0.54

0.68

0.54

7.58

Total CAPEX

1.53

1.03

0.96

0.54

0.54

0.68

0.54

0.54

0.68

0.54

7.58

Made with FlippingBook - professional solution for displaying marketing and sales documents online