Our Approach

north’s consulting approach is tailored to every client based on their requirements. We blend creativity, trusted experience and technology to deliver exceptional outcomes for our clients. Our core approach is a blend of:

  • Security
  • Technology
  • Collaboration
  • Technical capability
  • Experience

Case Studies

PROTECTED Cloud Uplift Roadmap

Our client is a large Federal Government agency with a national footprint who is trusted to safeguard information regarding the majority of Australians. As the agency evolves and migrates their technology to the cloud, they need a plan to ensure their cloud architecture is ready for the storage and processing of PROTECTED classified information.

Achieving the Essential 8

Our client employs more than 3,500 staff across 29 locations with significant national critical infrastructure. The client required assistance in achievement of Australian Signals Directorate (ASD) Essential 8 across their complex ICT environment.

Security Architecture

Our client employs more than 3,500 staff across 29 locations with significant national critical infrastructure. Given the complex nature of the client’s systems, they required the development of a security architecture which took into account the ICT environments, as well as Australian Government Information Security Manual (ISM) and the Protective Security Policy Framework (PSPF) considerations.

Security Accreditation Documentation

A major Australian Government Department required assistance in developing security documentation to support their systems security accreditation function, as outlined in the Australian Government Information Security Manual (ISM).

Penetration Testing

north provides penetration testing services for a large Australian government client. The client operates a complex ICT environment with a large annual ICT budget.

IRAP Services

Our Australian Government Agency client required an Information Security Registered Assessors Program (IRAP) assessment of their Amazon Web Services (AWS) gateway to gain assurance of the operation of security controls around connectivity of their cloud compute environment.
Looking to improve your security and digital operations? Speak to our team and we’ll show you how.