DMA cyber security services
safeguard staff, operations, data, ensure capability, compliance & availability.

DMA provide cyber security services to OT/IT organisations. We identify assets, people, process and technology, assess and document risk, craft strategy and confirm a program of work enabling your organisation be safe, compliant and operational, leveraging global and domestic standards and regulations.

Information Security Governance, Risk and Compliance

We are a company that listens to your requirements and deliver programs in line with local and global standards and guidelines.

Policy, Procedure, Technology

  • Governance & Business Case
  • Program of works management
  • ISO 27001:2022 (ISMS)
  • Essential 8 L1-4
  • IEC 62443, PCI-DSS
  • Cyber Security Strategy
  • Risk Assessment/Health Check
Cyber Security Training

DMA cyber security courses

  • 1-2 Hr Lunch & Learn Cyber Security 101
  • 1/2 & 1 Day Cyber Security Awareness
  • 3 Day ICS/SCADA Security (Technical)
  • Executive and Board Training

Call or email for more information

Technology Solutions

Buy the right technology for your requirements.

We partner with world leading technology companies to bring you solutions to business problems.

  • Project Management
  • Risk mitigation
  • Vendor selection
  • Implementation
  • Testing
  • Monitoring & Management
Penetration Testing - Assurance

DMA provide all forms of penetration testing;

  • Web Application Testing &
  • Code Review
  • External & Internal Penetration Testing
  • Social Engineering Testing
  • Red Teaming
  • Physical Infrastructure Testing
  • Remote Access Testing
  • ICS / SCADA Security

DMA use OWASP & CREST testing methodologies

Monitoring Services

Monitoring Service

  • Asset discovery
  • Vulnerability Scanning
  • IDS/IPS
  • Threat Intelligence Feed
  • Behavioral Analytics
  • SIEM
  • Lawful Intercept & Data Retention

Cloud and or on premise, hybrid services

In house set up or remote monitoring

Incident Response

DMA document the process from start to return to normal operations.

  • Business Continuity Plan
  • Disaster Recovery Plan
  • Incident Response  Plan
  • Role management
  • Logs, Logs, Logs
  • Correlation Rules

Security incident management, triage, investigation and resolution

WHY CLIENTS CHOOSE US

Experience

Our people have experience in multiple industries delivering large and small scale projects, delivered on time and on budget.

Read More

Technology

We love what we do, we read and keep up to date with latest threats, incidents and solutions to pass onto our clients achieve operational sustainability.

Read More

Trust

Our people are trusted advisers with Australian Government security clearances, and a passion to deliver results for our clients. 

Read More

Call Andrew Sheedy on 0418 552 987
to arrange a confidential discussion

Error: Contact form not found.