top of page

Our Services

Services

It starts with building a tailored threat model. This combines our knowledge of the most common adversary tactics, techniques and procedures likely to target your organisation and your business capabilities and priorities to effectively prioritise your defensive measures.

Assess

We can help you assess your existing tooling and practices for coverage of this threat model, including:​

  • Log sources and enrichment

  • SIEM detections and rules

  • Deception technologies 

  • Incident response procedures

  • Playbook development

  • Threat hunting tooling & processes

  • Vulnerability management tooling & processes

Assure

Our approach provides assurance of the effectiveness of your defences and readiness through customised breach and attack simulation, tabletop exercises, and controls assessments. Let us help you determine not just whether your defences are present - but whether they are effective against real-world adversaries.

Optimise

We are here to ensure you get the best from your security operations centre, from support with go to market, service transition, and service optimisation including:

  • Developing requirements, scope and context for RFP​

  • Evaluating and interviewing suppliers

  • Service transition and optimisation

While we are passionate about the benefits the M3TID threat-informed approach can bring to our customers, we also provide general cybersecurity consulting with experience in helping organisations align to a range of standards. These include lightweight baselines such as the ASD Essentials Eight all the way to fully mature frameworks such as NIST, CIS, and the NZISM. 

​

For a discussion on how we can help you more effectively prioritise your cybersecurity spend, please Contact Us.

bottom of page