Are you a DISP member looking to uplift to E8 Maturity Level 2?

View Our Essential 8 Assessment and Uplift Services

Tesserent Group
  • Solutions
    • Our Solutions
    • Security Advisory
    • Research, Architecture and Development
    • Technical Assurance & Testing
    • 24x7 Cybersecurity Operations Centre (SOC)
    • Cloud Services
    • Managed Solutions for Cloud, Infrastructure and Your People
    • Critical Product Controls
    • Data & Analytics
    • Explore All Solutions
    •  
    • Security Advisory
    • SOCI Act for Critical Infrastructure Resilience
    • Governance and Risk
    • Third-Party Risk Management Services
    • Essential 8 Services
    • Strategy and Planning
    • Compliance, Audit and Certification
    • ISO 27001 Services - Audits & Compliance
    • PCI DSS Services
    • Operation Technology Advisory
    • Security Control Design and Development
    • Business Continuity Cybersecurity Management
    • Incident Response Readiness
    • SWIFT (CSCF) Assessment
    • Security Awareness Programs and Training
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
    • OT Security Under the CISO’s Watch: Why Operational Technology Needs to Be a Priority
    • Navigating the Challenges of IT/OT Convergence: The Path to Operational Excellence
    •  
    • Research, Architecture and Development
    • Customer Identity and Access Management (CIAM)
    • Workforce Identity and Access Management (WIAM)
    • Security Control Design and Development
    • Privileged Access Management (PAM)
    • Secure Software Development
    • Related Insights
    • Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared
    • Client Story: DevOps Framework
    • The Critical Infrastructure Bill – which orgs will be affected
    •  
    • Technical Assurance & Testing
    • Penetration Testing
    • Adversary Simulation
    • Physical Testing & Social Engineering
    • WiFi Testing
    • Application Penetration Testing
    • Cybersecurity Training
    • Related Insights
    • Unveiling Security Flaws in Nuclias Connect Unveiling Security Flaws in Nuclias Connect
    • Client Story: Security Architecture
    • Client Story: Penetration Testing
    •  
    • 24x7 Cybersecurity Operations Centre (SOC)
    • Managed Security Services
    • Managed Detection & Response
    • Vulnerability Management Service
    • Extended Detection and Response (XDR)
    • Incident Response Retainer
    • Cyber Threat Intelligence Services and Monitoring
    • Operations Centre Locations
    • Melbourne
    • Sydney
    • Related Insights
    • Unveiling Security Flaws in Nuclias Connect Unveiling Security Flaws in Nuclias Connect
    • Key Updates in the November 2023 Australian Signals Directorate's Essential Eight Maturity Model
    • Defending against Insider Threats through proactive SOC monitoring
    •  
    • Cloud Services
    • AWS Cloud Services
    • Azure Cloud Services
    • Tesserent Secure Private Cloud
    • Workplace Modernisation with Microsoft 365
    • Secure Multi Cloud Connectivity
    • Related Insights
    • Open-Source Generative AI in the Enterprise: Are we there yet? Open-Source Generative AI in the Enterprise: Are we there yet?
    • Addressing challenges associated with cloud adoption
    • The Evolution of Cybersecurity: NIST Releases Draft of Cybersecurity Framework 2.0
    •  
    • Managed Solutions for Cloud, Infrastructure and Your People
    • Workplace Modernisation and End User Transformation and Support
    • Managed Networks & SDWAN
    • Managed Data Protection & Cloud Disaster Recovery
    • Managed Services for Cloud & DC IT Infrastructure
    • Related Insights
    • Addressing challenges associated with cloud adoption Addressing challenges associated with cloud adoption
    • Client Story: Health Check Transformation
    • Client Story: Service Integration and Management
    •  
    • Critical Product Controls
    • Computing Asset Controls
    • Communication Channel Controls
    • Third Party Controls
    • Related Insights
    • Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared
    • Defending against Insider Threats through proactive SOC monitoring
    • Tesserent boosts Benetas capability to detect and block email attacks
    •  
    • Data & Analytics
    • IT Security Monitoring
    • ICS Security Monitoring
    • Data Management
    • Related Insights
    • Ensuring Peak Performance: Tesserent's Comprehensive Support for Splunk Environments Ensuring Peak Performance: Tesserent's Comprehensive Support for Splunk Environments
    • Closing the Splunk Skills Gap with Tesserent: An Urgent Need for Data-Driven Growth
    • Boost Splunk Performance: Tesserent’s Solutions for Seamless Implementation
  • Industries
    • Our Industries
    • Critical Infrastructure (Utilities, Transport & Logistics)
    • Education
    • Financial Services
    • Health
    • Manufacturing, Mining and Construction
    • Not For Profit
    • Professional Services
    • Public Sector
    • Retail
    • Technology & Telco
    • Explore All Industries
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
    • Key Updates in the November 2023 Australian Signals Directorate's Essential Eight Maturity Model
    • Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
    • Client Story: PROTECTED Cloud Uplift Roadmap
    • Client Story: Penetration Testing
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
    • Unveiling the challenges: APRA Stocktake Exposes 6 Major Gaps to meet CPS234 Compliance
    • Client Story: Security Architecture
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
    • Client Story: Security Accreditation Documentation
    • Client Story: Penetration Testing
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
    • Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared
    • Whitepaper: Food & Beverage - Cybersecurity Insights
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
    • Tesserent boosts Benetas capability to detect and block email attacks
    • Designing a hybrid cloud strategy for The State Library of NSW
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
    • Top 5 recommendations for the Victorian State Parliament to improve response against cyberattacks
    • Client Story: DevOps Framework
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
    • OT Security Under the CISO’s Watch: Why Operational Technology Needs to Be a Priority
    • Navigating the Challenges of IT/OT Convergence: The Path to Operational Excellence
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
    • Client Story: Achieving the Essential 8
    • Client Story: Business Continuity Planning
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
    • Client Story: Penetration Testing
    • Q&A Series: Converged Security
  • Insights
    • Our Insights
    • Brochures
    • Whitepaper
    • Case Study
    • Blog
    • Explore All Insights
    • Related Insights
    • Whitepaper: Food & Beverage - Cybersecurity Insights Whitepaper: Food & Beverage - Cybersecurity Insights
    • Whitepaper: Microsoft 365 Backup
    • Related Insights
    • Client Story: PROTECTED Cloud Uplift Roadmap Client Story: PROTECTED Cloud Uplift Roadmap
    • Client Story: Security Accreditation Documentation
    • Client Story: Achieving the Essential 8
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
    • OT Security Under the CISO’s Watch: Why Operational Technology Needs to Be a Priority
    • Navigating the Challenges of IT/OT Convergence: The Path to Operational Excellence
  • Resources
  • About Us
  • Careers
    • Our Careers
    • Graduate Careers
    • Explore All Careers
  • Support
  • Incident Support
  • Contact
search
  • Solutions
  • Industries
  • Insights
  • Resources
  • About Us
  • Careers
  • Support
  • Contact

⚠
Incident Response Assistance

Require urgent assistance due to a potential incident or security breach? You've found the right place.

Tesserent is a full-service cybersecurity and secure cloud services provider. We take an advisory role from the moment you contact us.

If you suspect an incident or are currently dealing with a breach, please complete the form or contact us directly:

You can also email our incident response team at dfir@tesserent.com

We're always here to help.

Individual Support
Our Digital forensic and incident response team supports all industries and all levels of government. If you are an individual contacting us about a personal cybersecurity incident, please visit the Australian Cyber Security Centre for assistance.

Organisation Support
If your organisation is having an incident or suspected that you have had a cyber breach. Please complete the form.

Note: If you are an existing client with Tesserent’s Incident Response Retainer Service, for the quickest response, please reach out to us using the dedicated escalation process outlined in your onboarding documentation.



Thales logo
Footer logo
LinkedIn Twitter

Get the latest updates
and news. Keep me informed.

Quick Links
  • About
  • Solutions
  • Careers
  • Contact
  • Support Portal
  • Cyber Solutions by Thales
Tesserent Companies: ACT, NZ and Recently Acquired
  • Lateral Security
  • Seer Security
  • Explore Our Capabilities
Incident Response
  • Get Support
  • Security Advisory
  • PCI SSC Audit Australia
  • PCI DSS Compliance
  • PCI DSS Compliance Certification
  • Essential 8 Assessment
  • Essential 8 Audit
  • Essential 8 Compliance
  • ISO 27001 Gap Analysis
  • ISO 27001 Certification
  • ISO 27001 Compliance
  • ISO 31000 Risk Management
  • ISO 31000 Risk Management Process
  • ISMS Audit
  • Cybersecurity
  • Cybersecurity Companies Australia
  • Cybersecurity Awareness Training
  • Cybersecurity Solutions
  • Cybersecurity Consulting
  • Penetration Testing
  • Application Penetration Testing
  • Infrastructure Penetration Testing
  • Managed SDWAN Providers
  • VMware Cloud Backup Solutions
  • Azure Cloud Backup Solutions
  • AWS Cloud Backup Solutions
  • Cloud Migration Services
  • Managed Cloud Services
  • Managed Security Services
  • Cybersecurity Melbourne
  • Cybersecurity Sydney
  • Cybersecurity Brisbane
  • Cybersecurity Canberra
  • Cybersecurity Adelaide
  • Cyber Threats
  • Cybersecurity Advisory Services
  • Dark Web Monitoring
  • Cyber Threat Intelligence
  • Cybersecurity Risk Assessment
  • Business Continuity Services
  • Adversary Simulation Services
  • Managed Detection and Response
  • XDR Extended Detection and Response
  • Vulnerability Management
  • Red Team Services
  • Purple Team Services
  • Resources
  • What is penetration testing?
  • What is external penetration testing?
  • What is PCI DSS?
  • What is red teaming?
  • What is ISO 27001?
  • What is physical pen testing?
  • What is MDR?
  • What is a SOC?
  • What is purple teaming?
  • What is a PCI PIN Assessment
  • What is ISO 27001?
  • What is physical penetration testing?
  • What is threat intelligence?
  • What is application security testing?
  • © 2025 Tesserent Cyber Solutions by Thales.Website by Spicy WebPrivacy & PoliciesThales Alert Line