Customers

Customers

ISD Cyber clients are empowered with smarter ways to use their Cyber budgets in order to create:

  • Business value for all stakeholders
  • More effectiveness and efficiencies when managing risks
  • Measurable improvement in their Security Posture

Healthcare
Assurance across public and private healthcare enables growth and innovation.

ISD Cyber has worked across many healthcare organisations and sectors. Clients trust our capabilities to protect medical data and patient health. Time and again our people have managed to support customers who have developed new innovative systems, high risk web-based applications, or have required operational security.

Protecting medical data is the same as protecting lives for many patients. The fact that our team are continuously engaged in healthcare cyber security and business continuity strategies speaks volumes of our capabilities to deliver.

Healthcare imperatives ISD Cyber delivers:

  • Assurance programs against ISO 27001, ISM, Essential Eight, GDPR and the Privacy Act.
  • Refine cyber security and business continuity strategies
  • Validation of controls through penetration tests and audits
  • Enabling innovation programs to deliver essential services

Training & Skills Development
Rapidly removing ISO27001 certification as a roadblock to business development.

To engage with a large government department, our client had to achieve ISO 27001 certification to comply the Risk Fit for Risk (RFFR) initiative. The timeframe was aggressive because everyday without compliance were opportunities missed.

Within six months a full ISMS was delivered, enabling the client to successfully achieve their ISO 27001 certificate in time for the RFFR reporting deadlines.

Integration with internal IT and Risk teams for streamlined delivery:

  • Management review and gap analysis
  • Roadmap for certification
  • Management and implementation of Information Security Management System (ISMS) ready for ISO 27001 certification
  • Setup of mandatory documentation and records
  • Implementation of the Annex A control requirements based on risk