Delivering leading, disciplined,
and calculated knowledge.

Closing the skill gap

With our professional and highly skilled people, we aim to address the skill gap between cyber security and Australian businesses both government and private.

By upholding the defence values and the values of those companies we represent, we strive to deliver leading, disciplined and calculated knowledge to the Australian Government and private entities.

Our clients

Cyber GRC Services

The system security plan provides a description of a system and includes an annex that describes the controls that have been identified for the system.

A Security Risk Management Plan (SRMP) is a foundation document which communicates the issues that are important to an organisation from a security risk management perspective and to address the issues. Understanding risks is pertinent to achieving business goals.

At the conclusion of a security assessment for a system, a security assessment report should be produced by the assessor. This will assist the system owner in performing any initial remediation actions as well as guiding the development of the system’s plan of action and milestones.

The Essential Eight is a series of baseline mitigation strategies taken from the Strategies to Mitigate Cyber Security Incidents recommended for organisations. Implementing these strategies as a minimum makes it much harder for adversaries to compromise systems.

Having an incident response plan ensures that when a cyber security incident occurs, a plan is in place to respond appropriately to the situation. In most situations, the aim of the response will be to prevent the cyber security incident from escalating, restore any impacted system or data, and preserve any evidence.

At the conclusion of a security assessment for a system, and after the production of a security assessment report by the assessor, a plan of action and milestones should be produced by the system owner. This will assist with tracking any of the system’s identified weaknesses and recommended remediation actions identified during the security assessment.

A continuous monitoring plan can assist an organisation in proactively identifying, prioritising and responding to security vulnerabilities. Measures to monitor and manage security vulnerabilities in systems can also provide an organisation with a wealth of valuable information about their exposure to cyber threats, as well as assisting them to determine security risks associated with the operation of their systems. Undertaking continuous monitoring activities is important as cyber threats and the effectiveness of controls will change over time.

We work in various environments.

Defence
Defence.
Government
Government.
Government
Private.

We are a proud supporter of veterans' employment.