Are you a DISP member looking to uplift to E8 Maturity Level 2?

View Our Essential 8 Assessment and Uplift Services

  • Careers
  • Resources
  • Support
  • Contact
  • Incident support
  • Solutions
    • Our Solutions
    • Security Advisory
    • Research, Architecture and Development
    • Technical Assurance & Testing
    • 24x7 Cybersecurity Operations Centre (SOC)
    • Cloud Services
    • Managed Solutions for Cloud, Infrastructure and Your People
    • Critical Product Controls
    • Data & Analytics
    • Explore All Solutions
    • Security Advisory
    • SOCI Act for Critical Infrastructure Resilience
    • Governance and Risk
    • Third-Party Risk Management Services
    • Essential 8 Services
    • Strategy and Planning
    • Compliance, Audit and Certification
    • ISO 27001 Services - Audits & Compliance
    • PCI DSS Services
    • Operation Technology Advisory
    • Security Control Design and Development
    • Business Continuity Cybersecurity Management
    • Incident Response Readiness
    • SWIFT (CSCF) Assessment
    • Security Awareness Programs and Training
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • OT Security Under the CISO’s Watch: Why Operational Technology Needs to Be a Priority OT Security Under the CISO’s Watch: Why Operational Technology Needs to Be a Priority
      Read article
    • Research, Architecture and Development
    • Customer Identity and Access Management (CIAM)
    • Workforce Identity and Access Management (WIAM)
    • Security Control Design and Development
    • Privileged Access Management (PAM)
    • Secure Software Development
    • Related Insights
    • Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared
      Read article
    • Client Story: DevOps Framework Client Story: DevOps Framework
      Read article
    • Technical Assurance & Testing
    • Penetration Testing
    • Adversary Simulation
    • Physical Testing & Social Engineering
    • WiFi Testing
    • Application Penetration Testing
    • Cybersecurity Training
    • Related Insights
    • Unveiling Security Flaws in Nuclias Connect Unveiling Security Flaws in Nuclias Connect
      Read article
    • Client Story: Security Architecture Client Story: Security Architecture
      Read article
    • 24x7 Cybersecurity Operations Centre (SOC)
    • Managed Security Services
    • Managed Detection & Response
    • Vulnerability Management Service
    • Extended Detection and Response (XDR)
    • Incident Response Retainer
    • Cyber Threat Intelligence Services and Monitoring
    • Operations Centre Locations
    • Melbourne
    • Sydney
    • Related Insights
    • Unveiling Security Flaws in Nuclias Connect Unveiling Security Flaws in Nuclias Connect
      Read article
    • Key Updates in the November 2023 Australian Signals Directorate's Essential Eight Maturity Model Key Updates in the November 2023 Australian Signals Directorate's Essential Eight Maturity Model

      The November 2023 update of the Australian Signals Directorate's (ASD) Essential Eight Maturity Model brings significant changes aimed at bolstering cybersecurity measures. In this blog post, we'll delve into the key modifications and explore how organisations can navigate these updates for a more robust security posture.

      Read article
    • Cloud Services
    • AWS Cloud Services
    • Azure Cloud Services
    • Thales Cyber Services ANZ Secure Private Cloud
    • Workplace Modernisation with Microsoft 365
    • Secure Multi Cloud Connectivity
    • Related Insights
    • Open-Source Generative AI in the Enterprise: Are we there yet? Open-Source Generative AI in the Enterprise: Are we there yet?

      Large Language Models (LLMs) are the latest trend in artificial intelligence (AI), offering unprecedented capabilities to generate realistic and creative text and images. Many businesses are eager to adopt LLMs to enhance their productivity, communication, and innovation. This is partly driven by the increased rate of adoption amongst the workforce. For example, a recent Mckinsey report found that up to 21% of professionals regularly use Generative AI for work.

      Read article
    • Addressing challenges associated with cloud adoption Addressing challenges associated with cloud adoption

      In this article, Thales Cyber Services ANZ explores the challenges that arise when businesses step into the world of cloud adoption and provides insight for organisations to assist in navigating through the complexities of their cloud enablement strategy.

      Read article
    • Managed Solutions for Cloud, Infrastructure and Your People
    • Workplace Modernisation and End User Transformation and Support
    • Managed Networks & SDWAN
    • Managed Data Protection & Cloud Disaster Recovery
    • Managed Services for Cloud & DC IT Infrastructure
    • Related Insights
    • Addressing challenges associated with cloud adoption Addressing challenges associated with cloud adoption

      In this article, Thales Cyber Services ANZ explores the challenges that arise when businesses step into the world of cloud adoption and provides insight for organisations to assist in navigating through the complexities of their cloud enablement strategy.

      Read article
    • Client Story: Health Check Transformation Client Story: Health Check Transformation
      Read article
    • Critical Product Controls
    • Computing Asset Controls
    • Communication Channel Controls
    • Third Party Controls
    • Related Insights
    • Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared
      Read article
    • Defending against Insider Threats through proactive SOC monitoring Defending against Insider Threats through proactive SOC monitoring

      Proactive monitoring is essential to guard against damage caused by realised insider threats.

      View our SOC Services such as our Managed Detection and Response (MDR) service or contact our security specialists to start enhancing your security posture against insider threats.

      Read article
    • Data & Analytics
    • IT Security Monitoring
    • ICS Security Monitoring
    • Data Management
    • Related Insights
    • Ensuring Peak Performance: Thales Cyber Services ANZ's Comprehensive Support for Splunk Environments Ensuring Peak Performance: Thales Cyber Services ANZ's Comprehensive Support for Splunk Environments
      Read article
    • Closing the Splunk Skills Gap with Thales Cyber Services ANZ: An Urgent Need for Data-Driven Growth Closing the Splunk Skills Gap with Thales Cyber Services ANZ: An Urgent Need for Data-Driven Growth
      Read article
  • Industries
    • Our Industries
    • Critical Infrastructure (Utilities, Transport & Logistics)
    • Education
    • Financial Services
    • Health
    • Manufacturing, Mining and Construction
    • Not For Profit
    • Professional Services
    • Public Sector
    • Retail
    • Technology & Telco
    • Explore All Industries
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Key Updates in the November 2023 Australian Signals Directorate's Essential Eight Maturity Model Key Updates in the November 2023 Australian Signals Directorate's Essential Eight Maturity Model

      The November 2023 update of the Australian Signals Directorate's (ASD) Essential Eight Maturity Model brings significant changes aimed at bolstering cybersecurity measures. In this blog post, we'll delve into the key modifications and explore how organisations can navigate these updates for a more robust security posture.

      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Client Story: PROTECTED Cloud Uplift Roadmap Client Story: PROTECTED Cloud Uplift Roadmap



      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Unveiling the challenges: APRA Stocktake Exposes 6 Major Gaps to meet CPS234 Compliance Unveiling the challenges: APRA Stocktake Exposes 6 Major Gaps to meet CPS234 Compliance

      Part of APRA's 2020-2024 Cyber Security Strategy included a CPS234 tripartite cyber assessment program. This assessment program is the largest study of its kind and involves a compliance assessment of more than 300 banks, insurers, and superannuation trustees by the end of 2023.

      The CPS234 tripartite assessment, following a successful pilot completed in mid-2021 has continued through 2022-23. A summary of the first round of findings from the initial assessments have been released and they show consistent gaps throughout the industry.

      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Client Story: Security Accreditation Documentation Client Story: Security Accreditation Documentation
      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared
      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Thales Cyber Services ANZ boosts Benetas capability to detect and block email attacks Thales Cyber Services ANZ boosts Benetas capability to detect and block email attacks

      Mr Arpi Cseh, Head of Technology at Benetas, has been working with the team at Thales Cyber Services ANZ for over nine years. With the organisation's data security as one of his key responsibilities, Mr Cseh partners with Thales Cyber Services ANZ to ensure leading experts in cybersecurity are working to strengthen Benetas’ defences against cyber attacks.

      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Top 5 recommendations for the Victorian State Parliament to improve response against cyberattacks Top 5 recommendations for the Victorian State Parliament to improve response against cyberattacks

      In a recent report tabled in the Victorian state parliament, the Victorian Auditor-General’s Office has highlighted a concerning rise in cyberattacks targeting government agencies. The report reveals that 90% of Victorian government agencies fell victim to cyberattacks last year, putting critical services at risk of disruption. The implications of these attacks extend beyond data breaches, potentially leading to disrupted communication networks, compromised personal information, and the shutdown of vital facilities including water, health, and emergency services.

      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • OT Security Under the CISO’s Watch: Why Operational Technology Needs to Be a Priority OT Security Under the CISO’s Watch: Why Operational Technology Needs to Be a Priority
      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Client Story: Achieving the Essential 8 Client Story: Achieving the Essential 8
      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Client Story: Penetration Testing Client Story: Penetration Testing
      Read article
  • Insights
    • Our Insights
    • Brochures
    • Whitepaper
    • Webinars
    • Case Study
    • Blog
    • Explore All Insights
    • Related Insights
    • Whitepaper: Food & Beverage - Cybersecurity Insights Whitepaper: Food & Beverage - Cybersecurity Insights

      The Food and Beverage industry is vulnerable to exploitation at each of the stages of production, distribution and storage, and at point of sale.

      Read article
    • Whitepaper: Microsoft 365 Backup Whitepaper: Microsoft 365 Backup

      With many organisations using Microsoft 365 as their central collaboration and communication platform, the Microsoft 365 platform hosts your business-critical data, configurations, and workflows that could cause significant impact on your organisation if lost or corrupted.

      Read article
    • Related Insights
    • Client Story: PROTECTED Cloud Uplift Roadmap Client Story: PROTECTED Cloud Uplift Roadmap



      Read article
    • Client Story: Security Accreditation Documentation Client Story: Security Accreditation Documentation
      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • OT Security Under the CISO’s Watch: Why Operational Technology Needs to Be a Priority OT Security Under the CISO’s Watch: Why Operational Technology Needs to Be a Priority
      Read article
  • About Us
  • Contact us
  • Solutions

    Solutions

    • Security Advisory
      • SOCI Act for Critical Infrastructure Resilience
      • Governance and Risk
      • Third-Party Risk Management Services
      • Essential 8 Services
      • Strategy and Planning
      • Compliance, Audit and Certification
      • ISO 27001 Services - Audits & Compliance
      • PCI DSS Services
      • Operation Technology Advisory
      • Security Control Design and Development
      • Business Continuity Cybersecurity Management
      • Incident Response Readiness
      • SWIFT (CSCF) Assessment
      • Security Awareness Programs and Training
    • Research, Architecture and Development
      • Customer Identity and Access Management (CIAM)
      • Workforce Identity and Access Management (WIAM)
      • Security Control Design and Development
      • Privileged Access Management (PAM)
      • Secure Software Development
    • Technical Assurance & Testing
      • Penetration Testing
      • Adversary Simulation
      • Physical Testing & Social Engineering
      • WiFi Testing
      • Application Penetration Testing
      • Cybersecurity Training
    • 24x7 Cybersecurity Operations Centre (SOC)
      • Managed Security Services
      • Managed Detection & Response
      • Vulnerability Management Service
      • Extended Detection and Response (XDR)
      • Incident Response Retainer
      • Cyber Threat Intelligence Services and Monitoring
      • Operations Centre Locations
      • Melbourne
      • Sydney
    • Cloud Services
      • AWS Cloud Services
      • Azure Cloud Services
      • Thales Cyber Services ANZ Secure Private Cloud
      • Workplace Modernisation with Microsoft 365
      • Secure Multi Cloud Connectivity
    • Managed Solutions for Cloud, Infrastructure and Your People
      • Workplace Modernisation and End User Transformation and Support
      • Managed Networks & SDWAN
      • Managed Data Protection & Cloud Disaster Recovery
      • Managed Services for Cloud & DC IT Infrastructure
    • Critical Product Controls
      • Computing Asset Controls
      • Communication Channel Controls
      • Third Party Controls
    • Data & Analytics
      • IT Security Monitoring
      • ICS Security Monitoring
      • Data Management
    • Explore All Solutions
  • Industries

    Industries

    • Critical Infrastructure (Utilities, Transport & Logistics)
    • Education
    • Financial Services
    • Health
    • Manufacturing, Mining and Construction
    • Not For Profit
    • Professional Services
    • Public Sector
    • Retail
    • Technology & Telco
    • Explore All Industries
  • Insights

    Insights

    • Brochures
    • Whitepaper
    • Webinars
    • Case Study
    • Blog
    • Explore All Insights
  • About Us
  • Careers
  • Resources
  • Support

⚠
Incident Response Assistance

Require urgent assistance due to a potential incident or security breach? You've found the right place.

Thales Cyber Services ANZ is a full-service cybersecurity and secure cloud services provider. We take an advisory role from the moment you contact us.

If you suspect an incident or are currently dealing with a breach, please complete the form or contact us directly:

You can also email our incident response team at dfir@tesserent.com

We're always here to help.

Individual Support
Our Digital forensic and incident response team supports all industries and all levels of government. If you are an individual contacting us about a personal cybersecurity incident, please visit the Australian Cyber Security Centre for assistance.

Organisation Support
If your organisation is having an incident or suspected that you have had a cyber breach. Please complete the form.

Note: If you are an existing client with Thales Cyber Services ANZ’s Incident Response Retainer Service, for the quickest response, please reach out to us using the dedicated escalation process outlined in your onboarding documentation.



Get the latest updates
and news. Keep me informed.
Quick Links
  • About
  • Solutions
  • Careers
  • Contact
  • Support Portal
  • Cyber Solutions by Thales
Thales Cyber Services ANZ Companies: ACT, NZ and Recently Acquired
  • Lateral Security
  • Seer Security
  • Explore Our Capabilities
Incident Response
  • Get Support
  • Security Advisory
  • PCI SSC Audit Australia
  • PCI DSS Compliance
  • PCI DSS Compliance Certification
  • Essential 8 Assessment
  • Essential 8 Audit
  • Essential 8 Compliance
  • ISO 27001 Gap Analysis
  • ISO 27001 Certification
  • ISO 27001 Compliance
  • ISO 31000 Risk Management
  • ISO 31000 Risk Management Process
  • ISMS Audit
  • Cybersecurity
  • Cybersecurity Companies Australia
  • Cybersecurity Awareness Training
  • Cybersecurity Solutions
  • Cybersecurity Consulting
  • Penetration Testing
  • Application Penetration Testing
  • Infrastructure Penetration Testing
  • Managed SDWAN Providers
  • VMware Cloud Backup Solutions
  • Azure Cloud Backup Solutions
  • AWS Cloud Backup Solutions
  • Cloud Migration Services
  • Managed Cloud Services
  • Managed Security Services
  • Cybersecurity Melbourne
  • Cybersecurity Sydney
  • Cybersecurity Brisbane
  • Cybersecurity Canberra
  • Cybersecurity Adelaide
  • Cyber Threats
  • Cybersecurity Advisory Services
  • Dark Web Monitoring
  • Cyber Threat Intelligence
  • Cybersecurity Risk Assessment
  • Business Continuity Services
  • Adversary Simulation Services
  • Managed Detection and Response
  • XDR Extended Detection and Response
  • Vulnerability Management
  • Red Team Services
  • Purple Team Services
  • Resources
  • What is penetration testing?
  • What is external penetration testing?
  • What is PCI DSS?
  • What is red teaming?
  • What is ISO 27001?
  • What is physical pen testing?
  • What is MDR?
  • What is a SOC?
  • What is purple teaming?
  • What is a PCI PIN Assessment
  • What is ISO 27001?
  • What is physical penetration testing?
  • What is threat intelligence?
  • What is application security testing?
  • © 2025 Thales Cyber Services ANZ.Website by Spicy WebPrivacy & PoliciesThales Alert Line