← Cyber ServicesYour Journey

Most AU and NZ businesses follow one of five paths. Find yours.

Every security conversation starts with a trigger. The trigger shapes the path. These are the journeys we see most often β€” find the one that matches your situation and see the typical service sequence that follows.

1
πŸ›‘οΈ Insurance-driven

Your insurer is asking for evidence of controls

For businesses renewing cyber insurance, applying for the first time, or dealing with an insurer who has started asking questions you cannot easily answer.

  1. 1
    Security Health Check

    See what your insurer sees from the outside. An A–F scorecard of your internet-facing exposure with a clear fix list. Run quarterly or pre-renewal.

  2. 2
    Cyber Insurance Readiness Assessment

    Maps your controls against insurer requirements. Produces the evidence pack your broker needs and identifies the gaps that affect your premium or coverage.

  3. 3
    Policy & Procedures

    Insurers consistently ask for written policies. Cyber, acceptable use, BYOD, and incident response policies drafted for your context.

  4. 4
    Security Awareness Training

    Staff training is a standard insurer ask. Phishing simulations and a measurable awareness programme give you evidence of ongoing training.

  5. 5
    Annual Security Health Check

    Run annually (or quarterly) to support your renewal conversation and demonstrate ongoing security vigilance.

Typical timeframe
Insurer-ready in 6–8 weeks
Start with a Security Health Check
2
πŸ”— Supply chain pressure

A large client or tender is requiring you to demonstrate cyber maturity

For SMEs whose enterprise clients β€” banks, government agencies, large corporates β€” are pushing security requirements down their supply chains through questionnaires, audits, or certification requirements.

  1. 1
    Client-Ready Security

    Handle the immediate questionnaire or vendor audit. Fast turnaround β€” typically 2–3 weeks from engagement to completed response.

  2. 2
    Cyber Risk Snapshot

    Understand your broader security posture before the next questionnaire arrives. Identifies the gaps that will come up again.

  3. 3
    Essential Eight Implementation

    The framework enterprise clients and government agencies expect. Demonstrates systematic maturity, not ad-hoc controls.

  4. 4
    ISO 27001 Certification

    If the client or tender requires formal certification, ISO 27001 is the destination. Builds on everything from Step 3.

Typical timeframe
Questionnaire: 2–3 weeks
Full certification: 12–18 months
Handle my client questionnaire
3
🌱 Building foundations

You know you should do something about cyber but haven't started

For growing businesses that have been operating on goodwill and good luck. You've never had a breach β€” but you know the exposure is there and it's time to build proper foundations before something forces the issue.

  1. 1
    Security Health Check

    A low-cost, non-intrusive starting point. See what's exposed before committing to a larger programme. Gives you an honest picture of your external risk.

  2. 2
    Cyber Risk Snapshot

    Build the baseline documentation and close the priority gaps. Sets the agenda for everything that follows β€” no wasted spend on the wrong things.

  3. 3
    SMB1001 Certification

    The achievable first certification for Australian businesses. Demonstrates commitment, gives you something tangible, and sets the foundation for Essential Eight or ISO 27001 later.

  4. 4
    In a Box services (over 12 months)

    Add layers progressively: policies, incident response planning, awareness training, risk assessments. Build a mature programme without trying to do everything at once.

Typical timeframe
Health check + snapshot: first 8 weeks
SMB1001 achievable: within 6 months
Start with a Security Health Check
4
⭐ Defence & government

You want to bid on Australian defence or government contracts

For technology companies, professional services firms, and manufacturers seeking DISP accreditation, ASD panel access, or the right to handle government-sensitive information.

  1. 1
    Cyber Risk Snapshot

    Understand where you stand before starting the DISP process. DISP assessors will ask about your existing controls β€” the snapshot gives you honest answers.

  2. 2
    M365 Security

    DISP and government work requires a secure Microsoft 365 environment. Configuration review and ongoing drift monitoring β€” hands deliverables directly to your MSP.

  3. 3
    DISP Accreditation

    The gateway to defence work. CyberCraft guides the full accreditation process β€” policy development, control evidence, DISP assessment preparation.

  4. 4
    ISO 27001 Certification

    Required for higher-level defence contracts and ASD panels. Builds directly on the DISP work already completed.

  5. 5
    vCISO / Security Leadership

    For businesses with ongoing defence obligations, a vCISO provides the security leadership function without the cost of a full-time hire.

Typical timeframe
DISP accreditation: 3–6 months
ISO 27001: add 6–12 months
Start my DISP journey
5
⚠️ Privacy Act deadline

The Australian Privacy Act small business exemption ends 1 July 2026

For businesses that will lose the small business exemption on 1 July 2026 β€” any business with turnover above $3 million, or that handles health information, or that has opted in previously. If you are not ready, you are running out of time.

  1. 1
    Privacy Act Compliance Sprint

    Fixed-scope sprint to get compliant before 1 July 2026. Covers the key obligations β€” data mapping, privacy notices, consent mechanisms, and breach response procedures.

  2. 2
    Policy & Procedures

    Update your privacy policy and internal handling procedures. The Act requires documented processes β€” not just good intentions.

  3. 3
    Privacy Framework (ongoing)

    Build the ongoing programme: privacy by design, vendor assessments, breach response rehearsal, and staff training. Compliance is not a one-time event.

Typical timeframe
Compliance sprint: 4–6 weeks
Deadline: 1 July 2026
Beat the deadline

Not sure which path fits your situation?

Tell us what prompted the question and we'll map out the right sequence for where you are now.

Find my starting point

Kaurna Acknowledgement

We acknowledge and pay our respects to the Kaurna people, the traditional custodians of the ancestral lands on which we work. We acknowledge the deep feelings of attachment and relationship of the Kaurna people to country and we respect and value their past, present and ongoing connection to the land and cultural beliefs.