Under attack? Call 1300 112 313
Case Studies · Technology

Cybersecurity work in technology.

Anonymised examples of the assessments, implementations, and operating model improvements we have delivered for technology organisations.

Compliance

ISO 27001 readiness sprint for a SaaS platform

A B2B SaaS company with 120 staff needed ISO 27001 certification to satisfy enterprise customer requirements. We ran a readiness sprint covering ISMS design, risk assessment, Statement of Applicability, and evidence preparation.

Outcome

Certification-ready in 8 weeks. Audit completed with 2 minor non-conformities, both resolved same week. ISO 27001 certificate issued, unlocking access to government and financial services procurement.

Cloud Security

Cloud security posture review for a scale-up

A rapidly growing technology company had accumulated cloud sprawl across AWS and Azure. We reviewed IAM, public exposure, secrets management, logging, and segmentation across both environments.

Outcome

Found 22 findings including exposed API keys in code repositories, 4 publicly accessible storage containers, and no centralised logging. Remediation plan delivered with severity ratings and owner assignments.

Operations

EDR operating model for a product engineering team

A software company deployed CrowdStrike Falcon but had no triage workflow, escalation logic, or response playbooks. Alerts were being ignored or closed without investigation.

Outcome

Built alert triage workflow, severity matrix, escalation paths, and 6 response playbooks. Mean time to triage improved from 48 hours to under 2 hours. False positive rate reduced by 40% through tuning.

Work with us

Facing similar challenges?

Book a briefing to discuss your technology security requirements.

Book a Briefing