1. People Decisions vs. Technology Decisions What’s the best way to choose the right cyber security solution for your organisation? Start by considering your council’s maturity and how involved you want to be in daily security operations, such as monitoring, investigating anomalies, and incident response. Councils often gravitate toward two extremes: Building and managing an internal capability entirely in-house, or Outsourcing everything to a service provider. Choosing the first option can overwhelm internal teams, as they may struggle to keep up with the latest threats and updates. On the other hand, fully outsourcing risks over-dependence on external providers, limiting internal capability development. A common pitfall is selecting a solution based on technical requirements, without prioritising the people factor. This often leads to suboptimal outcomes, such as deploying a complex in-house solution through a third party that internal teams are not equipped to adequately support, and also cannot timely respond to occurring anomalies. The key is to find a balance by leveraging external expertise while actively engaging your team and building internal cyber security capacity.
2. Black Box vs. Open Box To effectively detect security threats, security events from your systems must be collected and analysed in a centralised data lake repository. How you handle and access this data determines whether you follow a black box or open box approach. A black box approach means your data is sent to your service provider, where it becomes mostly invisible to you, and you must fully rely on them to detect threats. If they miss something, you have limited options for addressing it. While this can simplify operations, it’s not always ideal—after all, no one knows your systems better than you. On the other hand, an open box approach gives you full access to your security data, but this often means your team is responsible for managing all threat detections. For most councils, this is unsustainable—keeping up with evolving threats and responding to anomalies around the clock places an overwhelming burden on in-house IT teams. A more effective strategy is a hybrid approach, where you leverage the expertise of service providers while maintaining full access to your security events repository. This allows you to monitor your data and stay involved when a breach or investigation occurs, combining the best of both worlds.
3. Attack Surface Coverage and Visibility Councils manage complex ICT environments that encompass diverse systems, critical infrastructure and legacy technologies. These interconnected environments create an extensive attack surface, which refers to all potential entry points where an unauthorised user can attempt to access or extract data from a system. A larger attack surface increases vulnerability, especially when dealing with outdated or poorly integrated systems. In this context, visibility—the ability to monitor all assets and endpoints across your environment—is crucial for identifying threats and anomalies in real-time. We often see councils deploying solutions that provide only partial coverage, leaving critical gaps and increasing risk. Councils should not compromise on attack surface coverage and visibility. Without full visibility, security teams are blind to potential threats, making it difficult to respond swiftly and effectively. By ensuring comprehensive coverage, councils can better protect their critical infrastructure, reduce risks, and strengthen their overall cyber resilience.
4. Time to Deploy and Time to Value Some cyber security solutions can take months to deploy, with complex integrations and configurations delaying their effectiveness. We often see councils opting to build complex SIEM environments from scratch, deploying all detections and integrations in-house, which can extend the time to value over several months or even years. When evaluating cyber security solutions, it’s essential to consider both the time to deploy and the time to value. Not all investments in cyber security need to require large, resource-intensive efforts, and councils should prioritise solutions that deliver quick returns on their investment.
5. Predictable Commercial Outcomes We often see councils struggling with the commercial complexities of cyber security solutions. Many vendors and providers use pricing models based on log volumes, which can be difficult to manage in practice. Volume-based pricing often benefits vendors who sell licences according to these metrics, but it rarely works in favour of the customer. Additionally, many features come with separate licences, making it challenging to determine what’s needed and often resulting in escalating costs over time. Councils should seek solutions with predictable costs. Ask for a free proof of value to understand exactly which features you need and avoid unexpected expenses.
“ ThreatDefence bridged the visibility and resource capability gap within our existing cyber security controls, resources and technology. We consume the complete Cyber Security as a Service offering from TD and the included products / services are excellent value for money for most budget conscious Council teams (like ours). The TD team truly operates as an extension to the in-house ICT team. The uplift in our cyber security posture means my team and I can sleep better in the current climate of persistent threats. Ari Aich Head of Technology, Campbelltown City Council
“ Although we already had mature controls, we needed another layer of security to get visibility into what is happening in our environment from the cyber security operations perspective. ThreatDefence included everything the Council needed for a comprehensive security operations function with several integrated tools and sensors. It was effortless to deploy and did not require a major investment or an implementation project from our side. Stewart Littleford Manager Information Services, Ballina Shire Council