1800 996 001 info@privasec.com.au
Over the last decade, we have delivered cyber security solutions to Government, Financial Services, Retail, IT, Health, Entertainment and Not-for- Profit sectors across Australia.

Privasec are the security experts. We see the bigger picture and bridge the gap between the technical and business world to create meaningful business cases and strategies that make sense of risk management.

We believe in partnering with our customers and building long-lasting relationships, based on trust, integrity and care.

See our services below.

Prisec-guide-to-cyber-security-tile

Get the latest ‘Director’s Guide to Cyber Security’. Simply fill in your details below or call Guy Coles on 1800 996 001

 

 

12 + 11 =


Penetration Testing

  • Perimeter and Infrastructure Scanning
  • Web Application Penetration Testing
  • External Penetration Testing
  • PCI DSS Penetration Testing
  • Internal Penetration Testing
  • Cloud Penetration Testing
  • Mobile App Penetration Testing
  • Citrix/Remote Access Penetration Testing
  • OWSAP TOP10-only Penetration Testing
  • Wireless Penetration Testing
  • Social Engineering & Physical Penetration Testing

Compliance

  • PCI DSS Services
  • PCI DSS Scope & Gap Assessment
  • PCI DSS Remediation
  • PCI DSS Penetration Testing
  • PCI DSS Certification
  • PCI DSS Maintenance
  • ISO27001 ISMS Compliance
  • ISM/PSPF Compliance
  • I-RAP Assessments
  • Outsourcing & Vendor Contract Compliance
  • Contract Preparation & Review Services
  • Tender & Bid Security Input
  • Privacy Assessments
  • STAR CSA Compliance
  • APRA PPG 234 Compliance
  • NIST Compliance & Implementation
  • ITIL (ISO20000)
  • Integrated Management Systems (QMS, EMS, ISMS)

Governance & Risk Services

  • ITIL (ISO20000) Alignment & Maturity Services
  • ICT Governance Services
  • Outsourcing Strategy Definition
  • Vendor Governance Frameworks
  • Vendor Assessments & Audits
  • Risk Management Frameworks (ISO31000, ISO27005)
  • Information Security & Business Risk Assessment & Mitigation
  • Data Classification
  • Information Security policy
  • Security in Project Management
  • PMO Augmentation
  • Security Requirement Definition for Projects
  • Business Impact Assessments
  • Business Continuity