Contact Us
Menu
Contact Us

A Business Risk Approach to InfoSec

Security Centric understands Information Security, with a focus on business risk rather than technical possibilities. We have a proven track record securing Military, Government and Corporate ICT environments.

About Us

Stay Safe

With onshore data, onshore personnel, security clearances and approval to assess classified networks, Security Centric keeps your data safe.

Security Centric takes advantage of years of experience working within the highly demanding information security environment of the Department of Defence, the Intelligence community, and Federal Government agencies. With this involvement, Security Centric consultants have applied a comprehensive information security methodology to protect the systems, services and environments entrusted to them by the owners of valuable, sensitive and sometimes highly classified information.

Security Services

Maturity Assessment

More than merely a technical test, our maturity assessments encompass risk from people, processes and technology.
Learn More →

Vulnerability Awareness

Proactively monitor for, detect and remediate vulnerabilities that put your organisational assets at risk of compromise.
Learn More →

Penetration Testing

Using the tools and techniques of real attackers, understand how discovered vulnerabilities can be exploited, exposing your organisation.
Learn More →

Cloud Security

Cloud technical assessments can help identify deficiencies and misconfigurations in your cloud architecture.
Learn More →

Compliance

Achieve and maintain compliance for ISO 27001, PCI DSS, IRAP/ISM, Essential Eight, Privacy Act, APRA CPS 234 and NIST standards.
Learn More →

CISO as-a-service

Gain the credentials and experience of a senior executive to review and shape strategy and direction.
Learn More →

Simulated Phishing

Use real world phishing tactics to test your organisation and staff against business email compromises.
Learn More →

Security Awareness Training

Train staff to recognise phishing attempts, and follow best practice when it comes to information security.
Learn More →

Threat Detection/SIEM

Collate unstructured data across your organisation to build real-time, rule-based attack and threat detection alerts.
Learn More →

Our Services

The Ultimate Penetration Testing Checklist

Download our guide on the top 5 areas to focus on in your next penetration test.

Download
Checklist mockup Cropped

Assess Your O365 Security

An Office 365 security audits pre-emptively identifies  high-risk misconfigurations, providing remediation steps to harden your environment against cybercriminals.

Read More
o365-assessment-hero

Past Clients

Security Centric has worked with organisations from all sectors, of all sizes.

greyscale-logo-homepage-7
greyscale-logo-homepage-15
greyscale-logo-homepage-2
greyscale-logo-homepage-16
greyscale-logo-5-1
greyscale-logo-homepage-12
greyscale-logo-homepage-14
greyscale-logo-homepage-11
greyscale-logo-8-1
greyscale-logo-7-1
greyscale-logo-6-1
greyscale-logo-homepage-4