Customers

Customers

Energy and Exploration
Leveraging the value of technology in the energy sector.

This multi-billion dollar energy company could see the benefits in rolling out new technology to streamline their operations, gain more data and empower a remote workforce. To achieve this in the face of escalating cyber attacks in terms of frequency and sophistication, the Executive team worked closely with ISD Cyber.

The important lesson from this client was their determination to be leaders in innovation and cyber security. This mindset paved the way for a program that has been tested many times over.

Running into our 5th year of their cyber security program, we are proud to say that external audits have confirmed they are well ahead of the curve in ensuring compliance to the Critical Infrastructure Act.

Where our customer is ahead of the curve:

  • NIST CSF
  • NIST SP 800-53 r5
  • Australian Government ‘Essential 8’
  • South Australian Cyber Security Framework (SACSF)
  • Australian Government Critical Infrastructure Reporting Requirements
  • Australian Energy Market Operator (AEMO) cyber controls

Operational support provided by ISD Cyber:

  • Multiple risk assessments: application security assessments, third party risk evaluations
  • Designed and implemented staff training around phishing (including the design and facilitation of phishing campaigns and exercises)
  • Identity management
  • Third-party management
  • Project management support through SME advisory, risk evaluation, control validation, ensuring that designs and solutions are compliant to the requirements of the CSP.

Food Exporting
When the business model evolved into new opportunities, understanding risk was key to unlocking global prosperity.

Our review and findings improved the client’s approach to data protection and information security on a global scale when the business found new opportunities for e-commerce as a meat processor.

Now with direct interactions with consumers, the new business risks are managed confidently with information security and privacy strategies that comply with global and local regulations.

Where our customer is ahead of the curve:

  • The European General Data Protection Regulations (GDPR)
  • Australian Privacy Act 1988
  • Internet Security Law of the People’s Republic of China 2017
  • California Law – General
  • Privacy Laws
  • Pennsylvania’s Breach of Personal Information Notification Act, The Pennsylvania Inspection of Employment Records Law (Personnel Files Act)
  • Privacy of Social Security Numbers Act