centium-logo

Cyber Security & Information Management

Cyber security and IT continuity are critical priorities for every organisation.  Effective governance, risk management, assurance and expert advice enables organisations to get on with the business of doing business.

Our team of IT professionals has been selected for their experience, flexibility and passion for client service. We are committed to exceeding our clients’ expectations in all aspects of our services.

We continually train our people to have the courage to think and act differently and challenge the status quo. We encourage our team to be curious, to remain up-to-date and to search for alternative methods and innovative solutions.  Our team go beyond the norm in managing our clients’ information management and cyber security requirements.

Centium offers an independent perspective.  One of our key differentiators is our approach to IT and cyber security engagements.  We listen and take the time to translate seemingly complex technical concepts into practical solutions.

centium-orange-box

Cyber & IT Risk Management

Centium has extensive experience partnering with clients to raise cyber security awareness, identify and manage cyber and IT risks, and build resilience.  Our team members are highly skilled at translating technical concepts into practical plans and procedures.  We also have a proven track record facilitating scenario tests that enable organisations to quickly realise and address gaps in existing planning documents.

How we can help:

  • Cyber Security Framework Development
  • Business & IT Security Risk Management
  • Vendor / Supplier Risk Assessments
  • Cyber Incident Response Planning
  • Business Continuity Planning
  • IT Disaster Recovery Planning
  • Cyber Awareness Training

IT & Cyber Assurance

Centium’s Lead Auditors and Cyber Specialists work closely with our clients to provide independent and objective assurance that improve IT operations and outcomes. We do this by identifying and evaluating risks, controls, governance processes and opportunities for improvement.   Our team members are experienced, professionally qualified, and hold a range of certifications against recognised standards.  We also undertaken numerous assessments against Government cyber security requirements and the Australian Cyber Security Centre’s Essential Eight.

Our audit and assurance offerings include:

  • IT Governance audits
  • Cyber Security audits
  • ISO 27001 internal and external audits
  • IT Project audits (pre, during, post-evaluation)
  • NSW Cyber Security Policy (NSW CSP)
  • Victorian Protective Data Security Framework
  • CPS234 – Information Security
  • CPS231 – Outsourcing
  • CPS232 – Business Continuity
  • Payment Card Industry Data Security Standards (PCI DSS)
  • Cybersecurity Capability Maturity Model (C2M2) Assessments
  • Electricity Distribution Network Operator License Conditions (IPART)

IT Advisory & Capacity Building

We are Cyber and IT Specialists with a breadth of experience across the public, private and not-for-profit sectors.  We partner with better practice organisations and are passionate about sharing our knowledge and experience to build capacity amongst our clients.  Our team are adept at supporting clients to develop frameworks, plans, documentation and roadmaps that are aligned with relevant industry standards.  We are also available to assist clients with “mock audits” prior to external validation and can arrange to be “on hand” during external audits to provide technical support.

How we can help:

  • CISO, CIO & CTO Placements
  • Cyber Security Frameworks, Strategies & Roadmaps
  • Payment Card Industry Consulting & Support
  • ISO 27001 Implementation
  • IT Security Policies & Procedures
  • NSW Cyber Security Policy & Essential Eight Advisory
  • Victorian Protective Data Security Framework Advisory
  • Cybersecurity Capability Maturity Model (C2M2)

Technical Assurance and Vulnerability Assessment

We are experts in undertaking vulnerability scans and penetration tests of networks, systems, web applications, cloud deployments and more.

Our service offerings include:

  • Phishing Campaigns
  • Vulnerability Assessments
  • Web Application Penetration Testing
  • External Penetration Testing
  • Internal Penetration Testing
  • Wireless (WIFI) Testing
  • Red Teaming
  • SCADA Penetration Testing
  • Secure Code Review
  • Physical Testing and Social Engineering

Information & Privacy Management

Organisations and agencies have a legal, ethical and reputational obligation to preserve the confidentiality, integrity and availability of the personal information that they hold.  All organisations are responsible for protecting client information and maintaining secure records of their operations and decisions.  Apart from doing the right thing by their clients, it’s simply good business for agencies to ensure appropriate information management systems and controls are in place and regularly tested.

How we can help:

  • Privacy Risk Assessments
  • Privacy Management Planning
  • User Access Controls
  • Data integrity and Quality reviews
  • Privacy Impact Assessments (e.g. Privacy Act, NSW PPIP Act, NSW HRIP Act).

 

Centium money

Discover More

We would be happy to discuss your needs and requirements. Please get in touch.
CONTACT US
Top