Experiencing an Incident?

It's your call. We're ready - 1300 403 170

It's daunting to face a cyber attack. Don't panic.

You may know the extent of the attack, or maybe you're just beginning to see impact to your business. Don't panic. Our team works with organisations to guide them through the process of crisis management, recovering from the attack, post-breach investigation, and preparing a response plan.

Start with these four steps.


If your organisation has an incident response plan, engage the cyber security team to begin running their incident response playbooks.


As soon as possible gather executive leadership and those in key positions within the company. Their input will be crucial.


Confirm your business continuity plan and status of current disaster recovery options. You will need to make informed decisions based on the state of your environment.


Engage an incident response team. A third-party may provide advice, processes, and actionable steps to perform to help your organisation through this event.

Prepare for Incidents

Don't wait for a breach before building your incident response strategy

Go beyond blind adoption of best-practice frameworks

Our team will help identify the challenges you have in each area of the incident lifecycle and draw on best-practice frameworks intelligently to build a structured response to those challenges.

This will result in a scalable and systematic incident management program relevant to your organisation.

Track, analyse, and review results of incident response regularly

Without a comprehensive understanding of incident trends and patterns, you may be susceptible to recurring incidents that increase in damage over time.

Our highly skilled team will help integrate incident response activities into regular IT lifecycles.

Recurring incidents happen; build runbooks for a consistent approach

Incidents should follow a standard process, but each will have its own escalation process.

We improve your organisation's response time to incidents and reduce confusion by developing specific incident use cases.