{"id":6167,"date":"2018-07-13T05:16:25","date_gmt":"2018-07-13T05:16:25","guid":{"rendered":"http:\/\/9bafcab3-9c70-4642-b567-a69a0ce81bfb"},"modified":"2018-07-13T05:16:25","modified_gmt":"2018-07-13T05:16:25","slug":"asd-corporate-plan-leads-with-people-and-culture","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/","title":{"rendered":"ASD corporate plan leads with people and culture"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2018\/03\/21\/eb546a6f-f0aa-4c87-a2d4-d647b35965b7\/thumbnail\/770x578\/e3ecd793cd7648b00fd76be364553946\/istock-902080886.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>The newly restructured Australian Signals Directorate (ASD) faces <a href=\"https:\/\/www.zdnet.com\/article\/asd-restructure-trouble-at-t-cyber-mill\/\">cultural and structural challenges<\/a>, but its new director-general Mike Burgess has hit the ground running with the agency&#8217;s <a href=\"https:\/\/asd.gov.au\/publications\/plans\/corporate-plan-2018.htm\">Corporate Plan 2018-19<\/a>.<\/p>\n<p>&#8220;People and culture&#8221; heads the list of priorities, the others being technology, tradecraft, partnerships, and governance and risk.<\/p>\n<p>A new corporate division will implement &#8220;a strategic workforce plan, a diversity and inclusion strategy, and an enterprise-wide learning and development plan&#8221;.<\/p>\n<p>&#8220;These plans form part of ASD&#8217;s broader cultural change program. We are implementing this cultural change program to make ASD the type of organisation that people aspire to join, and to foster a culture of excellence and inclusion in ASD,&#8221; the plan says. &#8220;This program is key to ensuring the smooth integration of the new elements of ASD&#8217;s workforce, especially those joining the ACSC [Australian Cyber Security Centre].&#8221;<\/p>\n<p>The ACSC now has the extended role of providing cybersecurity advice and assistance not just to Australian governments, but also to &#8220;businesses and individuals&#8221;, requiring the agency to be far more open with its communication than ever before.<\/p>\n<p>The <a href=\"https:\/\/www.pmc.gov.au\/national-security\/2017-independent-intelligence-review\">2017 Independent Intelligence Review<\/a> had noted the intelligence community&#8217;s difficulties with recruiting and retaining specialist staff, with some being &#8220;put off by salary levels&#8221; that were lower than the private sector. As a statutory authority, the ASD&#8217;s staffing now falls under the Intelligence Services Act 2001 rather than the Public Service Act 1999, offering greater flexibility.<\/p>\n<p>&#8220;ASD will therefore use its transition to a statutory agency as a chance to design new career pathways and employment opportunities that better reflect the kind of work that ASD does, so that it can better recruit, retain, train, and develop its specialist staff,&#8221; Burgess wrote in his introduction to the plan.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The ASD also plans to speed up its technology implementation cycle.<\/p>\n<p>&#8220;Rapid technological change makes imposing long-term strategies and plans over a four-year horizon less optimal for our technology capability. Instead, our adaptive posture must enable agile decision-making, so we can consciously pivot into new and upcoming technologies as the enterprise requirement arises.&#8221;<\/p>\n<p>In April, Burgess had said that his operational <a href=\"https:\/\/www.zdnet.com\/article\/asd-to-review-australias-cybersecurity-and-drive-out-known-problems\/\">priorities for year one<\/a> included a national assessment of the nation&#8217;s cybersecurity, focusing initially on critical infrastructure; collaboration with major internet service providers and critical infrastructure providers to &#8220;drive out known problems, and equally important, identify and first see new threats&#8221;; executing counter-cybercrime campaigns; and outreach and influence.<\/p>\n<p>&#8220;My expectations for the centre [ACSC] include comprehensively understanding the cyber threat to Australia, providing timely proactive advice and assistance that makes a real difference across the community, businesses, and government. The centre&#8217;s work must lead to an improvement in the identification and management of the cybersecurity risk to all Australians,&#8221; he said.<\/p>\n<p>The ACSC revealed that it is establishing a <a href=\"https:\/\/www.zdnet.com\/article\/caught-short-by-notpetya-australia-to-establish-247-cyber-newsroom\/\">24\/7 cyber newsroom<\/a>, and had already had <a href=\"https:\/\/www.zdnet.com\/article\/its-time-for-cyber-weather-and-traffic-bulletins\/\">informal discussions<\/a> with the Australian Bureau of Meteorology (BoM) on how to build effective relationships with the media.<\/p>\n<p>&#8220;This is the most significant change to the organisation since the Defence Signals Bureau was established seventy-one years ago, in the aftermath of the Second World War,&#8221; Burgess wrote in the plan.<\/p>\n<p>&#8220;With such an historic change occurring, this Corporate Plan provides a new opportunity for ASD to articulate its purpose and set a baseline for how we will measure success against that purpose.&#8221;<\/p>\n<h3>Related Coverage<\/h3>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/asd-restructure-trouble-at-t-cyber-mill\/\">ASD restructure: Trouble at t&#8217; cyber mill?<\/a><\/strong><\/p>\n<p>Differing views within the recently restructured Australian Signals Directorate, described in one media report as an &#8216;internal brawl&#8217; and &#8216;internal frictions&#8217;, could highlight a deeper, more challenging division.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/committee-recommends-mandating-asds-essential-eight-mitigation-strategies\/\">Committee recommends mandating ASD&#8217;s &#8216;Essential Eight&#8217; mitigation strategies<\/a><\/strong><\/p>\n<p>The Joint Committee of Public Accounts and Audit wants the government to include the additional four steps in its list of mandatory infosec strategies.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/asd-looking-beyond-list-compliance-approach-to-security\/\">ASD and ACSC looking beyond list compliance approach to security<\/a><\/strong><\/p>\n<p>The National Audit Office can make adverse findings against departments, but ASD head Mike Burgess is satisfied agencies are taking security seriously.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/asd-refuses-to-take-backward-step-in-wake-of-dta-cloud-strategy\/\">ASD refuses to take backward step in wake of DTA cloud strategy<\/a><\/strong><\/p>\n<p>When you have most of the cyber talent in the public service, why should you defer to an agency without a cybersecurity team?<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/who-leaked-the-idea-of-asd-spying-on-australians-and-why\/\">Who leaked the idea of ASD spying on Australians, and why?<\/a><\/strong><\/p>\n<p>Mike Pezzullo&#8217;s apparent thought bubble on domestic digital surveillance has been burst, but it foreshadows tense times ahead for Australia&#8217;s new domestic security arrangements.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/video\/microsoft-gains-protected-level-cloud-classification-from-asd\/\">Microsoft gains protected-level cloud classification from ASD<\/a><\/strong><\/p>\n<p>Microsoft has received accreditation from the Australian Signals Directorate, allowing it to store highly classified government information up to &#8216;protected&#8217; level on its Office 365 platform and specific Azure services.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/asd-corporate-plan-leads-with-people-and-culture\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Australian Signals Directorate hopes its &#8216;broader cultural change program&#8217; will make the agency &#8216;the type of organisation that people aspire to join&#8217;.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":6168,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-6167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ASD corporate plan leads with people and culture 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ASD corporate plan leads with people and culture 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-13T05:16:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/asd-corporate-plan-leads-with-people-and-culture.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/asd-corporate-plan-leads-with-people-and-culture\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/asd-corporate-plan-leads-with-people-and-culture\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"ASD corporate plan leads with people and culture\",\"datePublished\":\"2018-07-13T05:16:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/asd-corporate-plan-leads-with-people-and-culture\\\/\"},\"wordCount\":767,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/asd-corporate-plan-leads-with-people-and-culture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/asd-corporate-plan-leads-with-people-and-culture.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/asd-corporate-plan-leads-with-people-and-culture\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/asd-corporate-plan-leads-with-people-and-culture\\\/\",\"name\":\"ASD corporate plan leads with people and culture 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/asd-corporate-plan-leads-with-people-and-culture\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/asd-corporate-plan-leads-with-people-and-culture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/asd-corporate-plan-leads-with-people-and-culture.jpg\",\"datePublished\":\"2018-07-13T05:16:25+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/asd-corporate-plan-leads-with-people-and-culture\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/asd-corporate-plan-leads-with-people-and-culture\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/asd-corporate-plan-leads-with-people-and-culture\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/asd-corporate-plan-leads-with-people-and-culture.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/asd-corporate-plan-leads-with-people-and-culture.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/asd-corporate-plan-leads-with-people-and-culture\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ASD corporate plan leads with people and culture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ASD corporate plan leads with people and culture 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/","og_locale":"en_US","og_type":"article","og_title":"ASD corporate plan leads with people and culture 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-13T05:16:25+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/asd-corporate-plan-leads-with-people-and-culture.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"ASD corporate plan leads with people and culture","datePublished":"2018-07-13T05:16:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/"},"wordCount":767,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/asd-corporate-plan-leads-with-people-and-culture.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/","url":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/","name":"ASD corporate plan leads with people and culture 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/asd-corporate-plan-leads-with-people-and-culture.jpg","datePublished":"2018-07-13T05:16:25+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/asd-corporate-plan-leads-with-people-and-culture.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/asd-corporate-plan-leads-with-people-and-culture.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/asd-corporate-plan-leads-with-people-and-culture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"ASD corporate plan leads with people and culture"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/6167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=6167"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/6167\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/6168"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=6167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=6167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=6167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}