Our unique methodology takes into consideration the fact that effective cyber security must involve people, process and technology and not just one of these elements. We start with the premise that we’re wrong, and find what works for you based on your unique requirements.

We do this by helping organisations implement a cyber and information security management system (ISMS). Our approach aligns very closely with regulations and industry standards making it easier to demonstrate compliance to standards and frameworks such as:

  1. Industry standard for Information Security Management System (ISO/IEC 27001)
  2. The NIST Cyber Security Framework
  3. Australian state government standards including the Victorian Protective Data Security Standards (VPDSS)
  4. Australian government standards including the Information Security Manual (ISM)
  5. Australian Prudential Regulatory Authority (APRA) Prudential Standard CPS 234 for Information Security
  6. Australian Privacy Principles (Privacy Act 1988)

Our methodology, and the TrustyGate software platform, are built around the following four tenants:

  1. Identifying your sensitive information assets
  2. Assessing and treating critical security risks
  3. Communicating guidance including policies
  4. Managing performance over time

We empower customers using our platform to self-service their own needs by giving you initial content to consider, and we’re partnering with an increasing number of consulting organisations so you can get more targeted insights when you need them.

Contact TrustyGate

Get in touch to arrange a demonstration, discuss complex requirements or provide feedback.

(03) 9036 9963
hello@trustygate.com
Suite 1613, 33 Rose Lane, Melbourne VIC 3000, Australia