Launching our Sovereign and Protected SOC in Canberra

  • Careers
  • Resources
  • Support
  • Contact
  • Incident support
  • Solutions
    • Our Solutions
    • Security Advisory
    • Research, Architecture and Development
    • Technical Assurance & Testing
    • 24x7 Cybersecurity Operations Centre (SOC)
    • Cloud Services
    • Managed Solutions for Cloud, Infrastructure and Your People
    • Critical Product Controls
    • Data & Analytics
    • Converged / Physical Security
    • Explore All Solutions
    • Security Advisory
    • Governance and Risk
    • Strategy and Planning
    • Compliance, Audit and Certification
    • ISO 27001 Services
    • PCI DSS Services
    • Essential 8 Services
    • Security Control Design and Development
    • Operational Technology Advisory
    • Business Continuity Management
    • Incident Response Management
    • Security Awareness Programs and Training
    • Related Insights
    • Key Updates in the November 2023 Australian Signals Directorate's Essential Eight Maturity Model Key Updates in the November 2023 Australian Signals Directorate's Essential Eight Maturity Model

      The November 2023 update of the Australian Signals Directorate's (ASD) Essential Eight Maturity Model brings significant changes aimed at bolstering cybersecurity measures. In this blog post, we'll delve into the key modifications and explore how organisations can navigate these updates for a more robust security posture.

      Read article
    • Defending against Insider Threats through proactive SOC monitoring Defending against Insider Threats through proactive SOC monitoring

      Proactive monitoring is essential to guard against damage caused by realised insider threats.

      View our SOC Services such as our Managed Detection and Response (MDR) service or contact our security specialists to start enhancing your security posture against insider threats.

      Read article
    • Research, Architecture and Development
    • Customer Identity and Access Management (CIAM)
    • Workforce Identity and Access Management (WIAM)
    • Security Control Design and Development
    • Privileged Access Management (PAM)
    • Secure Software Development
    • Technical Assurance & Testing
    • Penetration Testing
    • Adversary Services
    • Physical Testing & Social Engineering
    • WiFi Testing
    • Application Penetration Testing
    • Cyber Threat Intelligence Services and Monitoring
    • Cybersecurity Training
    • Related Insights
    • Unveiling the challenges: APRA Stocktake Exposes 6 Major Gaps to meet CPS234 Compliance Unveiling the challenges: APRA Stocktake Exposes 6 Major Gaps to meet CPS234 Compliance

      Part of APRA's 2020-2024 Cyber Security Strategy included a CPS234 tripartite cyber assessment program. This assessment program is the largest study of its kind and involves a compliance assessment of more than 300 banks, insurers, and superannuation trustees by the end of 2023.

      The CPS234 tripartite assessment, following a successful pilot completed in mid-2021 has continued through 2022-23. A summary of the first round of findings from the initial assessments have been released and they show consistent gaps throughout the industry.

      Read article
    • Client Story: Security Architecture Client Story: Security Architecture
      Read article
    • 24x7 Cybersecurity Operations Centre (SOC)
    • Managed Detection & Response
    • Related Insights
    • Key Updates in the November 2023 Australian Signals Directorate's Essential Eight Maturity Model Key Updates in the November 2023 Australian Signals Directorate's Essential Eight Maturity Model

      The November 2023 update of the Australian Signals Directorate's (ASD) Essential Eight Maturity Model brings significant changes aimed at bolstering cybersecurity measures. In this blog post, we'll delve into the key modifications and explore how organisations can navigate these updates for a more robust security posture.

      Read article
    • Defending against Insider Threats through proactive SOC monitoring Defending against Insider Threats through proactive SOC monitoring

      Proactive monitoring is essential to guard against damage caused by realised insider threats.

      View our SOC Services such as our Managed Detection and Response (MDR) service or contact our security specialists to start enhancing your security posture against insider threats.

      Read article
    • Cloud Services
    • Azure Cloud Services
    • Thales Cyber Services ANZ Secure Private Cloud
    • Workplace Modernisation with Microsoft 365
    • Secure Multi Cloud Connectivity
    • Related Insights
    • Open-Source Generative AI in the Enterprise: Are we there yet? Open-Source Generative AI in the Enterprise: Are we there yet?

      Large Language Models (LLMs) are the latest trend in artificial intelligence (AI), offering unprecedented capabilities to generate realistic and creative text and images. Many businesses are eager to adopt LLMs to enhance their productivity, communication, and innovation. This is partly driven by the increased rate of adoption amongst the workforce. For example, a recent Mckinsey report found that up to 21% of professionals regularly use Generative AI for work.

      Read article
    • Addressing challenges associated with cloud adoption Addressing challenges associated with cloud adoption

      In this article, Thales Cyber Services ANZ explores the challenges that arise when businesses step into the world of cloud adoption and provides insight for organisations to assist in navigating through the complexities of their cloud enablement strategy.

      Read article
    • Managed Solutions for Cloud, Infrastructure and Your People
    • Workplace Modernisation and End User Transformation and Support
    • Managed Networks & SDWAN
    • Managed Data Protection & Disaster Recovery
    • Managed Services for Cloud & DC IT Infrastructure
    • Related Insights
    • Addressing challenges associated with cloud adoption Addressing challenges associated with cloud adoption

      In this article, Thales Cyber Services ANZ explores the challenges that arise when businesses step into the world of cloud adoption and provides insight for organisations to assist in navigating through the complexities of their cloud enablement strategy.

      Read article
    • Client Story: Health Check Transformation Client Story: Health Check Transformation
      Read article
    • Critical Product Controls
    • Computing Asset Controls
    • Communication Channel Controls
    • Human Protection Controls
    • Third Party Controls
    • Related Insights
    • Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared Critical Infrastructure and Cyber Physical Systems: Importance of Being Prepared
      Read article
    • Defending against Insider Threats through proactive SOC monitoring Defending against Insider Threats through proactive SOC monitoring

      Proactive monitoring is essential to guard against damage caused by realised insider threats.

      View our SOC Services such as our Managed Detection and Response (MDR) service or contact our security specialists to start enhancing your security posture against insider threats.

      Read article
    • Data & Analytics
    • IT Security Monitoring
    • ICS Security Monitoring
    • Data Management
    • Related Insights
    • Ensuring Peak Performance: Thales Cyber Services ANZ's Comprehensive Support for Splunk Environments Ensuring Peak Performance: Thales Cyber Services ANZ's Comprehensive Support for Splunk Environments
      Read article
    • Closing the Splunk Skills Gap with Thales Cyber Services ANZ: An Urgent Need for Data-Driven Growth Closing the Splunk Skills Gap with Thales Cyber Services ANZ: An Urgent Need for Data-Driven Growth
      Read article
    • Converged / Physical Security
    • Read more...
    • Related Insights
    • Q&A Series: Converged Security Q&A Series: Converged Security
      Read article
    • Q&A Series: Managed Security Services Q&A Series: Managed Security Services
      Read article
  • Industries
    • Our Industries
    • Critical Infrastructure (Utilities, Transport & Logistics)
    • Education
    • Financial Services
    • Health
    • Manufacturing, Mining and Construction
    • Not For Profit
    • Professional Services
    • Public Sector
    • Retail
    • Technology & Telco
    • Explore All Industries
    • Related Insights
    • Thales Australia opens sovereign cyber Security Operations Centre in nation’s capital to protect Government and Critical Infrastructure clients Thales Australia opens sovereign cyber Security Operations Centre in nation’s capital to protect Government and Critical Infrastructure clients
      Read article
    • Secure By Demand Secure By Demand

      Australia stands at the intersection of unprecedented technological progress and growing systemic risk. As artificial intelligence, quantum computing, and interconnected operational technologies reshape the national landscape, the resilience of critical infrastructure has never been more important. The challenge lies not only in embracing innovation but in ensuring that security and trust are embedded into every layer of our technological ecosystem.

      Read article
    • Related Insights
    • Thales Australia opens sovereign cyber Security Operations Centre in nation’s capital to protect Government and Critical Infrastructure clients Thales Australia opens sovereign cyber Security Operations Centre in nation’s capital to protect Government and Critical Infrastructure clients
      Read article
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Related Insights
    • Thales Australia opens sovereign cyber Security Operations Centre in nation’s capital to protect Government and Critical Infrastructure clients Thales Australia opens sovereign cyber Security Operations Centre in nation’s capital to protect Government and Critical Infrastructure clients
      Read article
    • Secure By Demand Secure By Demand

      Australia stands at the intersection of unprecedented technological progress and growing systemic risk. As artificial intelligence, quantum computing, and interconnected operational technologies reshape the national landscape, the resilience of critical infrastructure has never been more important. The challenge lies not only in embracing innovation but in ensuring that security and trust are embedded into every layer of our technological ecosystem.

      Read article
    • Related Insights
    • Thales Australia opens sovereign cyber Security Operations Centre in nation’s capital to protect Government and Critical Infrastructure clients Thales Australia opens sovereign cyber Security Operations Centre in nation’s capital to protect Government and Critical Infrastructure clients
      Read article
    • Secure By Demand Secure By Demand

      Australia stands at the intersection of unprecedented technological progress and growing systemic risk. As artificial intelligence, quantum computing, and interconnected operational technologies reshape the national landscape, the resilience of critical infrastructure has never been more important. The challenge lies not only in embracing innovation but in ensuring that security and trust are embedded into every layer of our technological ecosystem.

      Read article
    • Related Insights
    • Secure By Demand Secure By Demand

      Australia stands at the intersection of unprecedented technological progress and growing systemic risk. As artificial intelligence, quantum computing, and interconnected operational technologies reshape the national landscape, the resilience of critical infrastructure has never been more important. The challenge lies not only in embracing innovation but in ensuring that security and trust are embedded into every layer of our technological ecosystem.

      Read article
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Thales Cyber Services ANZ boosts Benetas capability to detect and block email attacks Thales Cyber Services ANZ boosts Benetas capability to detect and block email attacks

      Mr Arpi Cseh, Head of Technology at Benetas, has been working with the team at Thales Cyber Services ANZ for over nine years. With the organisation's data security as one of his key responsibilities, Mr Cseh partners with Thales Cyber Services ANZ to ensure leading experts in cybersecurity are working to strengthen Benetas’ defences against cyber attacks.

      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Top 5 recommendations for the Victorian State Parliament to improve response against cyberattacks Top 5 recommendations for the Victorian State Parliament to improve response against cyberattacks

      In a recent report tabled in the Victorian state parliament, the Victorian Auditor-General’s Office has highlighted a concerning rise in cyberattacks targeting government agencies. The report reveals that 90% of Victorian government agencies fell victim to cyberattacks last year, putting critical services at risk of disruption. The implications of these attacks extend beyond data breaches, potentially leading to disrupted communication networks, compromised personal information, and the shutdown of vital facilities including water, health, and emergency services.

      Read article
    • Related Insights
    • Thales Australia opens sovereign cyber Security Operations Centre in nation’s capital to protect Government and Critical Infrastructure clients Thales Australia opens sovereign cyber Security Operations Centre in nation’s capital to protect Government and Critical Infrastructure clients
      Read article
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Client Story: Achieving the Essential 8 Client Story: Achieving the Essential 8
      Read article
    • Related Insights
    • Common Vulnerabilities and Exposures in Cybersecurity Common Vulnerabilities and Exposures in Cybersecurity
      Read article
    • Client Story: Penetration Testing Client Story: Penetration Testing
      Read article
  • Insights
    • Our Insights
    • Client Story
    • Blog
    • Whitepaper
    • Video
    • In The Media
    • Explore All Insights
    • Related Insights
    • Client Story: PROTECTED Cloud Uplift Roadmap Client Story: PROTECTED Cloud Uplift Roadmap



      Read article
    • Client Story: Security Accreditation Documentation Client Story: Security Accreditation Documentation
      Read article
    • Related Insights
    • Secure By Demand Secure By Demand

      Australia stands at the intersection of unprecedented technological progress and growing systemic risk. As artificial intelligence, quantum computing, and interconnected operational technologies reshape the national landscape, the resilience of critical infrastructure has never been more important. The challenge lies not only in embracing innovation but in ensuring that security and trust are embedded into every layer of our technological ecosystem.

      Read article
    • Understanding Supply Chains to Manage Risk Understanding Supply Chains to Manage Risk
      Read article
    • Related Insights
    • 72 Hours: Lifting the lid on the first days of a cyber incident response 72 Hours: Lifting the lid on the first days of a cyber incident response

      The first 72 hours after a cyber incident are decisive for business survival. Leadership, communication, and preparedness are essential. This executive summary highlights key lessons and actionable priorities for boards and CISOs, drawn from real-world incident response experience.

      Read article
    • Whitepaper: Food & Beverage - Cybersecurity Insights Whitepaper: Food & Beverage - Cybersecurity Insights

      The Food and Beverage industry is vulnerable to exploitation at each of the stages of production, distribution and storage, and at point of sale.

      Read article
    • Related Insights
    • Podcast: The evolving role of the CISO- a chat with Mark Jones and Daltrey Podcast: The evolving role of the CISO- a chat with Mark Jones and Daltrey

      Mark Jones, Consulting Partner at Thales Cyber Services ANZ, joins Daltrey to discuss the evolving role of the CISO – from the expectations and skills required, to the importance of communication and security culture.

      Read article
    • Thales Cyber Services ANZ Essential 8 Webinar for Local Governments Thales Cyber Services ANZ Essential 8 Webinar for Local Governments

      In this webinar, we discuss how Essential Eight can help reinforce your local government's cybersecurity.

      Read article
    • Related Insights
    • Thales Australia opens sovereign cyber Security Operations Centre in nation’s capital to protect Government and Critical Infrastructure clients Thales Australia opens sovereign cyber Security Operations Centre in nation’s capital to protect Government and Critical Infrastructure clients
      Read article
    • Security a shared responsibility in successful cloud migration Security a shared responsibility in successful cloud migration

      Digital transformation and transitioning systems and applications to the cloud have been major business initiatives over the last few years.

      Read article
  • About Us
  • Careers
  • Support
  • Contact us
  • Solutions

    Solutions

    • Security Advisory
      • Governance and Risk
      • Strategy and Planning
      • Compliance, Audit and Certification
      • ISO 27001 Services
      • PCI DSS Services
      • Essential 8 Services
      • Security Control Design and Development
      • Operational Technology Advisory
      • Business Continuity Management
      • Incident Response Management
      • Security Awareness Programs and Training
    • Research, Architecture and Development
      • Customer Identity and Access Management (CIAM)
      • Workforce Identity and Access Management (WIAM)
      • Security Control Design and Development
      • Privileged Access Management (PAM)
      • Secure Software Development
    • Technical Assurance & Testing
      • Penetration Testing
      • Adversary Services
      • Physical Testing & Social Engineering
      • WiFi Testing
      • Application Penetration Testing
      • Cyber Threat Intelligence Services and Monitoring
      • Cybersecurity Training
    • 24x7 Cybersecurity Operations Centre (SOC)
      • Managed Detection & Response
    • Cloud Services
      • Azure Cloud Services
      • Thales Cyber Services ANZ Secure Private Cloud
      • Workplace Modernisation with Microsoft 365
      • Secure Multi Cloud Connectivity
    • Managed Solutions for Cloud, Infrastructure and Your People
      • Workplace Modernisation and End User Transformation and Support
      • Managed Networks & SDWAN
      • Managed Data Protection & Disaster Recovery
      • Managed Services for Cloud & DC IT Infrastructure
    • Critical Product Controls
      • Computing Asset Controls
      • Communication Channel Controls
      • Human Protection Controls
      • Third Party Controls
    • Data & Analytics
      • IT Security Monitoring
      • ICS Security Monitoring
      • Data Management
    • Converged / Physical Security
      • Read more...
    • Explore All Solutions
  • Industries

    Industries

    • Critical Infrastructure (Utilities, Transport & Logistics)
    • Education
    • Financial Services
    • Health
    • Manufacturing, Mining and Construction
    • Not For Profit
    • Professional Services
    • Public Sector
    • Retail
    • Technology & Telco
    • Explore All Industries
  • Insights

    Insights

    • Client Story
    • Blog
    • Whitepaper
    • Video
    • In The Media
    • Explore All Insights
  • About Us
  • Careers
  • Support
  • Careers
  • Resources
  • Support
Get the latest updates
and news. Keep me informed.
Quick Links
  • About
  • Solutions
  • Careers
  • Contact
  • Investors
  • Support Portal
Thales Cyber Services ANZ Companies: ACT, NZ and Recently Acquired
  • Explore Our Capabilities
Incident Response
  • Get Support
  • Security Advisory
  • PCI SSC Audit New Zealand
  • PCI DSS Audit New Zealand
  • PCI DSS Compliance Certification
  • Essential 8 Assessment
  • Essential 8 Audit
  • Essential 8 Compliance
  • ISO 27001 Gap Analysis
  • ISO 27001 Certification
  • ISO 27001 Compliance
  • ISO 31000 Risk Management
  • ISMS Audit
  • ISO 31000 Risk Management Process
  • Cybersecurity
  • Cybersecurity Companies New Zealand
  • Cybersecurity Awareness Training
  • Cybersecurity Consulting
  • Cloud Migration Services
  • Application Penetration Testing
  • Infrastructure Penetration Testing
  • Managed SDWAN Providers
  • Azure Cloud Backup Solutions
  • VMware Cloud Backup Solutions
  • Managed Cloud Services
  • AWS Cloud Backup Solutions
  • Cybersecurity Solutions
  • Cyber Threats
  • Dark Web Monitoring
  • Cyber Threat Intelligence
  • Cybersecurity Risk Assessment
  • Business Continuity Services
  • Adversary Simulation Services
  • Red Teams
  • Purple Teaming
  • Gold Teaming
  • © 2026 Thales Cyber Services ANZ (NZ).Website by Spicy WebPrivacy & PoliciesThales Alert Line