Ransomware Preparedness – Tabletop and Red Team Exercises

The Imperative of Ransomware Preparedness: Tabletop and Red Team Exercises Introduction Ransomware attacks are a global menace, but their impact on Australian businesses and institutions has been particularly alarming. According to the Australian Cyber Security Centre (ACSC), there was a 13% increase in ransomware attacks reported in the last financial year. With high-profile incidents like…

Incident Response Planning – Testing your ransomware readiness

The Imperative of Testing Ransomware Incident Response Across Organizational Hierarchies In an era where cyber threats have been elevated from IT nuisances to existential business risks, the significance of a well-coordinated and effective ransomware incident response cannot be overstated. Ransomware attacks are not just a potential hazard; they are an almost certain eventuality, with ramifications…

Using Tanium to deliver Continuous Compliance for Essential 8 Maturity Level 3

Tanium: Delivering Continuous Compliance for Essential 8 Maturity Level 3 Introduction In the complex world of cybersecurity, achieving Essential 8 maturity level 3 is a significant milestone. Tanium, with its unique endpoint management capabilities, has emerged as a crucial tool in this journey. Let’s explore how Tanium delivers continuous compliance for Essential 8 maturity level…

Achieving Rapid Cyber Uplift through an Experienced Virtual CISO

Introduction In an era where cyber threats are constantly evolving, organizations are seeking efficient ways to enhance their cyber security posture. One compelling solution is engaging an experienced contract virtual Chief Information Security Officer (CISO). This approach provides immediate access to high-level expertise and can be a rapid pathway to achieving substantial cyber uplift. Why…

Looking to build out an Essential 8-centric Cyber Uplift program?

There’s so many facets around building an Essential 8-centric cyber uplift program these days.  Many organisations are still struggling to find a balance between top-down, bottom-up cyber program design. And many more are struggling to break their program down to manageable workstreams. Here’s an example of how you might break-up a cyber uplift program’s workstreams…