The CyberOps Experience
CyberOps helps people meet their cyber compliance obligations by assisting them develop a series of checklists and action plans for their organisation. The legal requirements placed on companies are becoming more onerous year on year, so preparation is critical for success.
CyberOps can assess your entities current cybersecurity readiness at an architectural and implementation level. CyberOps can also carry out tests on your network resilience using tools from our R&D labs. By tailoring the approaches used by Government and large industries, we have organised our services to align with the small to medium market who still face the same risks of larger organisations, but with a fraction of the resources.
Though the basics of cybersecurity remain constant, the details such as attack vectors are rapidly changing. Through a series of publications and presentations CyberOps aims to keep its customers well informed about the critical events in the Cyber community.
CyberOps R&D Lab
CyberOps is planning to build a state of the art cyber lab in Australia for variety of purposes. More to come on this exciting venture in the future.
Governance, Risk & Business Advice
CyberOps specialises in services to bridge the gap between technical and executive domains. This can involve boardroom presentations and workshops with technical teams.
– Board advisory services
– Industry tailored security reporting and compliance assessments
– Security and risk consulting services
– Public presentations
Business Process & Architecture Consulting
CyberOps has experienced practitioners who provide expert consulting services on IT architectures and business processes with a focus on secure solutions.
– Enterprise & IT architecture services
– Creation and review of security and Defence process and procedures
– Security training and awareness
– Intelligence analysis and investigations
Security Design, Investigation, Review & Assessment
CyberOps delivers a wide range of technical security services, from reviewing existing processes and documentation, assessing the security of current environments, to the design of new secure IT systems to meet modern security requirements.
– Security operations review
– Security testing services
– Network, application and system security
– Endpoint, IOT, SCADA, and mobile device security
– Threat hunting and traffic anomaly investigation
A recent flaw disclosed by Google Project Zero has the potential to impact all major Central Processing Units (CPUs), including those from Intel, AMD and ARM, exposing almost all PCs, laptops, tablets, and smartphones, regardless of manufacturer or operating system to exploitation. This flaw has existed in many Intel CPU’s since 1995. These hardware related vulnerabilities have […]
Recently the CyberOps team presented at South Australian Law Society 2017 Conference in Adelaide. The session was very well attended and resulted in many question during the session and discussions afterwards. The team covered many topics including: What motivates a hacker The Cyber Security Landscape Is Changing Where Could Evidence Come From What is Driving Change The Internet […]
Many security and virus detection organisations track malicious attack activity and global system infections. The below list represents some of the more graphically interesting services. Trend Global BotNet Threat Activity Map Global Virus Map Kaspersky Lab Live Attack Map Norce Live Attack Map FireEye Cyber Threat Map IPew Attack Map OpenDNS Traffic Map Team Cymru […]
Many organisations are considering how to best utilise Cloud Computing to reduce operational costs, increase business efficiency and allowing staff to focus on core business outcomes, rather than running IT systems themselves. The CyberOps team have found that not all cloud services achieve the expected business outcome. If you are considering using Cloud services or […]
TOR was built to provide the ability to anonymise activity and to protect the privacy of online users. Like many technologies that can be used for good and evil, TOR is no exception. By providing a dynamic encrypted IP network, a covert hosting environment and the ability to obfuscate the IP addresses of users when accessing […]
Cyber Security can be challenging for many organisations. The CyberOps team is passionate about helping businesses in understanding the threats, vulnerabilities and attacks that can affect an organisations day to day operations. This presentation outlines some of the online tools and techniques used by malicious individuals to profile staff members and exposed technologies. Topics include: […]
When the CyberOps team assist Australian business who have been impacted or threatened by a Cyber-attack, we are often asked who needs to be notified? With the exception of specific industry and organisation requirements, we highly recommended notifying the following Law Enforcement and Government organisations. http://www.acorn.gov.au/ http://www.asd.gov.au/infosec/reportincident.htm https://www.cert.gov.au/incidents Contact us to find out more. […]