It’s like a CYBER SECURITY TEAM in your back pocket

WORK SMARTER.     NOT HARDER.

Security Colony was established in 2015 to fundamentally change the way information security professional services are provided and consumed in Australia and the US.

Today’s approach to cyber-security is “every person for themselves,” which is illogical in the threat environment we are facing. We believe “community driven security” is the future of information security management.

Through “community driven security,” we are making available the highest quality security advisory and assurance services at a fraction of the previous cost.

Big or small – your problem has been faced before. Our solution: solve once, then share.We take millions of dollars worth of solutions already developed to cyber security problems that businesses face and share it with others for a fraction of the cost, saving you thousands of dollars in time and consulting fees.

Security Colony can even solve compliance and governance problems for your organisation before you realise you have them: addressing “policy and procedural zero days”.

SOLUTIONS

Save tens of thousands of dollars and months of effort

A library of resources including an entire ISO27001 ISMS, incident response guidelines and playbooks, awareness training strategies and presentations and more to help implement information security in your organization.

All of it has been developed for real clients, through real projects, with millions of dollars of investment.
New material is uploaded on a weekly basis from our consulting business.

DON’T BE BLIND-SIDED!

The Vendor Risk Assessment monitors your internet facing domains and those of selected vendors, for misconfiguration and vulnerabilities, and for malicious activity in those domains.

Gain better visibility of your suppliers, and track the risk associated with those suppliers over time.

REALISTIC AND ACTIONABLE GUIDANCE

Completing our NIST CSF-based Security Maturity Assessment will direct you to the security projects and documents that will help with your continuous improvement strategy.

Use the documents and score to justify the budgets for your next important security projects. Show your internal and external stakeholders how your security program is progressing.