A Dangerous Knowledge Gap

Unfortunately, not having someone oversee your company’s cyber security can leave a knowledge gap relating to both mandatory compliance regulations as well as security holes in your business.

With such a gap, the company and its director(s) can be left open to liability putting both your businesses information and reputation, as well as valuable client data at risk being accessible to cyber-criminals.

An Affordable Alternative

Red Piranha’s contracted virtual CISO provides an affordable, reliable service to Australian companies.

We have fully qualified in-house, expert Chief Information Security Officers who can be contracted to review your company’s security needs. Identifying gaps within your infrastructure and implementing the necessary changes to help bring your organisation into compliance to align with the complex regulatory environment resulting from recent legislation.

If your business has an annual turnover in excess of $3million AUD laws such as the ‘Australian Privacy Principles (APP) amendments to the Privacy Act 1988’ are applicable and must be met.

Enterprise Directors Are Liable

Ultimately the liability for compliance in relation to all data protection, security and privacy acts sits with company directors and increasingly they are being held accountable.

Red Piranha can help bring your business into compliance.

We conduct comprehensive reviews of your security, advise directors and board members about potential liabilities and weaknesses in the current system and provide solutions to bring the organisation into regulatory compliance. We can also assist with any staff training and education that may be required.

Security Incidents

The real benefits of our contracted CISO services come into full-effect when a security incident is suspected.

Whether internal employee misconduct, sabotage, intrusions, breaches to security by cyber-criminals, hostage situations with ransomware or other crisis handling needs – we can intervene and manage the situation ensuring minimal damage and maximum security.

Achieve Compliance with CISO Services

Businesses are under increasing pressure to meet a range of compliance requirements including ISO/IEC 27001, PCI and HIPAA. By establishing the right foundation with our CISO services, you can be better equipped to stay on top of your evolving compliance needs.


eCISO™

Our electronic CISO service is an integrated offering which utilises human-machine teaming to bring together a mix of people, process and technology to deliver a range of compliance outcomes. It is supported by remote consulting services from our village of cybersecurity professionals to deliver a range of critical tasks and help Crystal Eye customers develop and maintain a comprehensive information security program.


vCISO

Our virtual CISO solution gives you on-site and remote access to our pool of highly-experienced security experts to build and roll-out your security program and meet your reporting requirements. It is mostly targeted at customers who aren't using our Crystal Eye platform.


DeliverableseCISO®vCISO
Security Policy Document Templates - ISO27000 Series
Annual Cyber Security Review (CSR)
Dedicated Qualified Risk Officer
Annual Board MeetingRemoteOn-Site (AU)
AGM ISMS Executive Statement
Quarterly Board Risk Reporting
ISMS Risk Meetings (11 Hrs of Remote Cadence Meetings)
ISMS Risk Treatment and Data Processing (11 hours)
ISMS Incident Response & Escalation (10 hours offsite)
Staff Cyber Security Awareness Training (CSAT) 50 staff
Vulnerability Management Framework & Quarterly Scanning CE Scan*(External)

* Delivered through the Crystal Eye platform

The frequency and scope of these deliverables can be adjusted and priced based on your required level of assurance.


CISO Roles

CISO Services & Roles​


Resource Utilisation

With an eCISO™ or vCISO shouldering your security planning and reporting responsibilities, you and your team are free to focus on more strategic activities instead of putting out fires. Our CISO resources can recruit, train and mentor members of your IT and compliance teams to ensure proper security principles are being implemented and maintained across your organisation.

An eCISO™ or vCISO can also help set security strategies, procure solutions, remediate incidents, and put foundations in place for your compliance needs. They may also assist with bring-your-own-device (BYOD) policy and enforcement as well as managing your board-level responsibilities.