What's Happening?
Cleanaway Waste Management, an Australian company specializing in waste, recycling, and resource recovery services, is streamlining its cybersecurity tools in response to a changing threat environment. According to James Court, Cleanaway's chief security officer,
the company's global expansion has increased its exposure to threats, necessitating a reevaluation of its security measures. The company is consolidating its cybersecurity stack from over 20 suppliers to five strategic vendors, aiming for cost efficiency while maintaining a robust defense. Cleanaway is also 18 months into a Zero Trust transformation, focusing on identity and access management (IAM) and SD-WAN connectivity. This approach is crucial for managing endpoint threats, especially in a complex environment with over 15,000 assets, including corporate IT, mobile devices, and operational technology.
Why It's Important?
The consolidation of cybersecurity tools by Cleanaway highlights the growing need for efficient and effective security measures in the face of evolving cyber threats. As companies expand globally, their exposure to cyber risks increases, necessitating a strategic approach to cybersecurity. Cleanaway's focus on a Zero Trust model and IAM underscores the importance of identity management in protecting endpoints, which are often vulnerable to attacks. This move is significant for industries involved in complex supply chains, such as healthcare, where third-party risks are prevalent. By streamlining its cybersecurity vendors, Cleanaway aims to enhance its security posture while managing costs, a critical consideration for businesses facing budget constraints.
What's Next?
Cleanaway's ongoing Zero Trust transformation and vendor consolidation are expected to continue as the company adapts to the changing threat landscape. The focus will likely remain on integrating identity management with endpoint security to address potential blind spots. As Cleanaway navigates its expansion into new regions like New Zealand and the Middle East, it will need to ensure that its security measures are scalable and adaptable to different regulatory environments. The company's commitment to defense in depth suggests that it will continue to evaluate and adjust its security strategies to protect its diverse range of assets effectively.












