About CT
Security and Governance
As an engineering led business, our executive team is the driving force behind our stringent security practices, continuously pushing us to further harden our systems, practices and processes and therefore, unlike most other organisations, our internal teams don’t have to fight for the investment in cyber security resilience.
Protected
Don’t risk your security with just anyone. We are Australia’s most audited and certified Security Provider and we bake in Security by design into every single one of our product and service offerings.
Our core infrastructure, cloud platforms and telecommunications core are irap assessed demonstrating our commitment to security.
When we say protected, we mean PROTECTED. Our data hosting services are certified to the Protected level under the Federal Government’s Hosting Certification Framework.
As a member of the Defence Industry Security Program, we provide Security Cleared Personnel to a wide range of organisations. This means you get a higher level of security, no matter your industry.
We engage third party penetration testers to perform both internal and external penetration testing against our platforms and systems on an annual basis, and we combine this with weekly vulnerability scans which are performed by our team.
We have held the ISO 27001 certification for over seven years and after all that time, these controls are well and truly baked in to our operating standards.
Security controls baked in
The security of our systems and operations are of paramount importance to us and therefore, we invest a significant amount of time and money into our cyber programs. The below initiatives and controls are just some of the security elements spanning our operations
- We target the ACSC Essential 8
- Maturity Level 3.
- Our users
- undergo regular cyber security awareness training.
- We are a Network Partner
- within the Australian Cyber Security Centre.
- We have over 400 security controls
- in place across our environment.
- We have active monitoring and response
- implemented across our environment.
- Our Security Controls and Frameworks
- are reviewed regularly and externally audited.
- We do not permit any third-party vendor to have unsupervised access
- to any of our systems.
- We have implemented a Supply Chain Risk Management Framework
- compliant with the ISO 31000 Risk Management Standard.
- We employ a dedicated Compliance Manager
- who is responsible for internally auditing our Information Management System and associated controls.
- We actively contribute threat intelligence data
- with other entities and utilise a wide array of third-party threat feeds in the protection of our systems and networks.
- Our Chief Technology Officer
- is responsible for our internal Cyber Security programs, maturity, continual improvement and ensuring we are meeting our internal and external security commitments.
- We uphold comprehensive cyber insurance coverage
- to fortify our defense against potential digital threats and ensure the resilience of our cybersecurity measures.
- We are a member of AusCERT.
- reinforcing our commitment to staying at the forefront of cybersecurity awareness and collaboration for the benefit of our stakeholders and the broader digital community.
- We operate under a Zero Trust architecture.
- exemplifying our unwavering dedication to ensuring the highest level of security by continuously scrutinising and validating every aspect of our digital environment.
- We have implemented an Insider Threat Program
- - a commitment to preemptively identify and mitigate potential internal risks, thereby fortifying the overall security posture of our organization.
- We ensure that you are protected at all times
- , employing state-of-the-art measures and vigilant monitoring to safeguard your security around the clock.
Risk Management Framework
As a risk adverse organisation, we maintain a stringent Risk Management Framework, compliant with ISO 31000 which is owned by our Executive Team and administered by our Compliance Manager. Our framework prioritises the removal of risks from our business and where this isn’t possible, mitigating these risks through the implementation of controls to reduce the probability of a risk occurring and/or the impact of the risk should it eventuate. We foster a risk adverse culture which translates to a thorough understanding of our obligations towards our customers, stakeholders and the communities in which we work, play and serve.
As risks are identified within our business, these are logged in our Risk Register with priority given to the mitigation and implementation of counter controls to manage the risk. Our Risk Register is reviewed on a monthly basis by our Chief Executive Officer and the wider Executive Team.
Get cyber secure
If you’d like to learn more about how we can keep you secure, or would like to report a cyber incident, get in touch.