Get started now

Our services

Our consultants have years of experience advising and consulting with Australian businesses to successfully manage and mitigate cyber risk.

Strategy and planning

We utilise a risk-based approach to prioritise the planning and resourcing of all cyber security aspects for organisations of all sizes, to alleviate foreseeable governance, risk and compliance roadblocks.

What does this address?

We can assist in creating disaster recovery plans, business continuity plans, data breach response plans, as well as create testing cycles to ensure consistent performance of security controls. We will help you identify your regulatory obligations and assist in creating a strategy towards compliance.

Vendor risk management

Monitor your vendors 24/7 and track their security performance overtime and against industry. Use a risk dashboard to prioritise risks, track remediation, and ensure risks are resolved quickly with an audit trail.

Get deeper insight into your vendors security posture using our security questionnaire library, automate your workflows, and scale your security team by 10x.

What does this address?

Our vendor management solutions can automate your organisation’s vendor onboarding process, saving time & money as well as achieving compliance through on-going assessment and monitoring of your suppliers.

Vendor risk management

Monitor your vendors 24/7 and track their security performance overtime and against industry. Use a risk dashboard to prioritise risks, track remediation, and ensure risks are resolved quickly with an audit trail.

Get deeper insight into your vendors security posture using our security questionnaire library, automate your workflows, and scale your security team by 10x.

What does this address?

Our vendor management solutions can automate your organisation’s vendor onboarding process, saving time & money as well as achieving compliance through on-going assessment and monitoring of your suppliers.

Policy and standards development

We create policies which cover security controls and procedures. These policies are not about specific technologies, but rather the measures and intentions that will enable members of the organisation to protect important assets.

Rather than risking uncertainty and having members make the decisions for themselves, these documents serve as a guide, informing them what behaviors and devices are considered acceptable and unacceptable.

What does this address?

We can create data security policies, procedures, and various information security related documents such as:

  • Data protection/privacy policy
  • Password policy
  • Acceptable use policy
  • Incident response plan
  • Asset registers
  • Crisis communication plan
Cyber monitoring

Our monitoring solutions allow you to monitor your business's digital assets, at any level, to identify vulnerabilities and security gaps, prioritise risks, and track remediation.  

What does this address?

This provides you with surface level attack surface monitoring of public facing assets through to infrastructure and network monitoring, and allows us to identify any potential gaps that could lead to network intrusion.

Risk assessments

Our risk assessment illuminates an organisation’s risk status including progress on key risk mitigations. This in turn helps the organisation to focus resources on risks and activities that impact business continuity and generate shareholder value.

What does this address?

By performing a risk assessment, you become aware of any claims, circumstances, privacy breaches, viruses, DoS/DDoS, or other cyber incidents which have impacted or could adversely impact your business.

Breach detection

We automatically scour the web for known third-party data breaches. That data is then fed into our platform to process to check whether any of your employees' credentials were exposed. This allows you to get on top of leaked credentials before they are used to launch a cyber-attack or gain unauthorised access to your organisation.

What does this address?

The identity breach module searches for third-party data/privacy breaches on the open, deep, and dark web and shows you where an employee's credentials have been exposed. This can also be used as part of an IDPS (intrusion detection &prevention system) solution.

Audit and compliance

We will oversee the execution of cybersecurity and privacy controls to create appropriate evidence of due care and due diligence, demonstrating compliance with all applicable legal and regulatory obligations.

What does this address?

We can assist in reviewing an existing, or creating, a governance framework, as well as perform compliance gap analysis against any regulation such as APRA, PCI DSS, HIPAA, and more.

Common Questions

Not quite convinced?

Send any questions to cyber@theprojectlab.com
How do I know if I'm at risk?
Despite the significance of cyber security risk, an astounding 73% of companies aren’t prepared for a cyber attack. Whether it be customer data, confidential or sensitive documents, or your brand's reputation, everyone has something to protect, which puts a target on your back and heightens the potential risk of a cyber event impacting your business.
Why do I need to solve this?
A cyber security breach doesn’t just have an effect or impact the bottom line, it also deeply impacts customer trust. Between the crippling financial impact and the effect on your reputation, cyber security attacks can devastate a business. 60 percent of small companies that suffer a cyber attack are out of business within 6 months.
Is it all or nothing?
We'll help you put together a plan and prioritise the actions needed to be taken to remediate high risk issues.
Why act now?
We’re fighting a 21st-century problem with a 20th-century mindset. The longer your business is unprotected, the more significant the consequences. The threats are always advancing, let us help you stay ahead of the game.

Get our free Take 5 Cybersecurity Info booklet.

Just fill in your details below and we'll be in touch.
Thanks for subscribing!
Download your copy now
Oops! Something went wrong while submitting the form.