Under attack? Call 1300 112 313
Services

Productised cybersecurity engagements with practical deliverables.

Choose a focused package or combine services into a broader programme. Each engagement is designed to produce decisions, evidence, implementation progress and an operating model.

01

Cyber Health Check

A practical baseline review for organisations that need to understand current risk and prioritise uplift.

Typical focus

  • Identity and access
  • Endpoint and email controls
  • Cloud exposure
  • Backup and recovery posture
  • Logging and monitoring
  • Incident readiness

Deliverables

  • Executive summary
  • Risk-ranked findings
  • Prioritised remediation roadmap
  • Control owner mapping
  • Evidence and reporting recommendations
View full details
02

Essential Eight Readiness Review

A structured maturity review for organisations using Essential Eight as a baseline control model.

Typical focus

  • Application control
  • Patch management
  • Microsoft Office hardening
  • Restricting administrative privileges
  • MFA
  • Backups

Deliverables

  • Maturity gap report
  • Evidence requirements
  • Remediation priorities
  • Owner and action register
  • Leadership briefing pack
View full details
03

ISO 27001 / SOC 2 Readiness Sprint

Prepare your governance, evidence and control operation for certification, customer assurance or board-level reporting.

Typical focus

  • ISMS and control ownership
  • Risk treatment
  • Statement of Applicability support
  • Audit evidence
  • Supplier and access governance

Deliverables

  • Readiness gap assessment
  • Evidence matrix
  • Policy and procedure uplift list
  • Audit preparation roadmap
  • Executive status report
View full details
04

EDR Operating Model Review

Improve the value of Microsoft Defender, CrowdStrike or similar EDR platforms by fixing the operating model around the tool.

Typical focus

  • Alert triage workflow
  • Severity and escalation logic
  • Containment authority
  • Detection tuning
  • Evidence capture
  • Handover runbooks

Deliverables

  • Alert workflow map
  • Tuning recommendations
  • Escalation matrix
  • Response playbooks
  • Operational metrics
View full details
05

Cloud Security Review

Assess and improve common cloud risk across AWS, Microsoft cloud and hybrid environments.

Typical focus

  • IAM and privileged access
  • Public exposure
  • Cloud logging
  • Encryption and secrets
  • Network segmentation
  • Backup and recovery

Deliverables

  • Cloud risk register
  • Control gap report
  • Priority remediation plan
  • Logging and evidence recommendations
  • Architecture improvement notes
View full details
06

Security Advisory Retainer

Ongoing senior security advice, implementation support and assurance guidance without needing a full-time internal specialist.

Typical focus

  • Security roadmap ownership
  • Executive and board reporting
  • Vendor and architecture review
  • Policy and evidence guidance
  • Risk decisions and exceptions

Deliverables

  • Monthly advisory sessions
  • Risk and roadmap register
  • Architecture review notes
  • Executive briefing material
  • Priority action tracking
View full details
Service Outcomes

Every engagement should leave behind something usable.

Reduce attack frequency

Harden identity, endpoint, email, cloud and administrative pathways to reduce common intrusion opportunities.

Reduce attack severity

Improve containment, segmentation, backup confidence, escalation and response authority so incidents do less damage.

Improve assurance

Make controls easier to evidence through ownership maps, evidence matrices, reports, runbooks and repeatable review cycles.