top of page

Readiness

The time to prepare for an emergency is not during one. We help your organisation prepare to defend against cyber attacks before they occur. Scroll down to learn how.

tusik-only-yOd-gjE7D68-unsplash.jpg

POPULAR SERVICES

Image by John Cameron

Crown Jewels Assessments

"We need to understand what's critical and how it's exposed"

 

To protect what's most important to your organisation, it's essential to identify critical assets, the threats they face, and the controls required to manage those risks.

Our people are experienced in undertaking crown jewels assessments to help public and private sector organisations understand their critical assets, the risks they're exposed to, and how to best manage them. We complement these services with data breach exposure assessments to identify if your critical assets have already been breached online.

"We need a plan to respond

to a cyber crisis"

 

Cyber attacks will happen, which is why most organisations already have an incident response plan in place. Incident response plans and playbooks should help your organisation detect, analyse, contain, eradicate and recover from cyber attacks. 

Our people are experienced in developing tailored incident response, disaster recovery, and business conitunity plans and playbooks for government agencies, global businesses and small organisations. Our plan and playbooks are tailored to help your organisation respond to cyber threats including ransomware, data breaches and account compromise.

A Man and a Woman working together

Plans

Business congress

Exercises

"We need to know we'll respond correctly to a cyber crisis"

 

High quality exercises must be well-planned, realistic and engaging.

 

Our people have facilitated statewide and nationwide IT, Disaster Recovery and Cyber Crisis exercises for large governments, global conglomerates, and private and public organisations and their suppliers.

 

We can deliver:

  • Tabletop exercises for decision-makers

  • Technical 'drills' for technical practitioners

  • 'Basement-to-Boardroom' exercises for the entire organisation, and everything in between.

READINESS SERVICES

Assesments

Assessments

We identify your organisation's most critical information assets, identify the threats and risks they're exposed to, and understand how best to manage them in alignment with best practice.

  • Identify critical information assets 

  • Uses your enterprise risk structure

  • Identifies crown jewels risk exposure

  • Translates technical to business risk

  • Identify most likely cyber threats

  • Profile adversaries targeting you

  • Understand their tactics & techniques

  • Define controls to defend against them

Crown Jewels Assessment

We also complement crown jewels assessments with a Data Breach Exposure assessment. This assessment scans billions of data points in the clear and dark web to identify if any of your critical information assets (including usernames and passwords) have been compromised in known breaches online.

Plans

Plans

We design tailored and bespoke plans and playbooks to help your organisation respond to and recover from cyber attacks, across technical and business layers. These include:

Plans

  • Cyber Security Incident Response Plans

  • IT Disaster Recovery Plans

  • Cyber Crisis Management Plans

  • IT Business Continuity Plans

Playbooks

  • Ransomware and Malware Outbreaks

  • Data Breaches (including Notifiable Data Breaches)

  • Phishing and Account Compromise

  • DDoS and Digital Forensics Incidents

We also build tailored Executive Ransomware Response Guidelines, to assist Boards and C-Suites to rapidly understand how to respond to ransomware crises (including how to manage ransom demands in alignment to Australian law and better practice guidance).

Exercises

We fully design, deliver and report on highly engaging, realistic, tailored cyber exercises, from end-to-end. Whether you're seeking to test technical response, rehearse executive cyber crisis decision-making or both; we leverage our best-practice Cyber Exercise methodology to delivery industry-leading, high quality exercises.

Functional Exercises

  • Tests & upskills technical teams

  • Technically simulate realistic hacker activity

  • Tailored to your systems & assets

Tabletop Exercises

  • Educates executives on cyber crisis decision-making

  • Dynamic scenarios change depending on responses

  • Establishes a 'no-mistakes' learning environment

We also design, deliver and report on tailored 'Hybrid Exercises', which provide a holistic 'basement to Boardroom' learning experience. Hybrid exercises engage both technical teams and executive leadership in an engaging scenario which requires coordinated response from all desired levels of decision-making.

bottom of page