Security Services and Assessments

OVERVIEW

A robust security program is a fundamental requirement when working within the Defence sector. The Department of Defence has very specific expectations on businesses to ensure they contribute towards an effective security culture.

WHY ITS RELEVANT

SME businesses are an important part of the Australian Industry Capability and are essential requirements of a Prime Contractor’s supply network both within Australia and globally. A fundamental requirement of joining a supply chain is satisfying the Prime’s and the Department’s security expectations and guidelines.

Meeting these requirements first requires understanding of the expectations, an understanding of your business status thru an accurate assessment and then a strategy to close the gaps and maintain the upgraded security profile.

WHY US

Goal has helped many SME businesses develop strong security processes, procedures and protocols which meet the stringent demands of a global Defence supply chain.

We have established a reputation for quality, well designed solutions that are affordable. We work with you to provide a solution that best serves your needs.

One of our Group partners were recognised as being in the top 10 enterprise security solutions providers in APAC 2019.

Detailed Security Assessments

Security Health Check

A high-level review of current security measures against the current DISP security accreditation and current (2021) requirements at the desirable level.

This will assist with accurately scoping and quoting on further services and will double as prework also required for the security risk assessment.

Deliverables:  A documented high-level health check

Security Risk Assessment

The Security Risk Assessment will identify critical information and assets, enable understanding of security risks within the business.

Deliverables: A documented security risk assessment report

  • Physical Security Assessment and Design

This includes a site inspection and assessment of detailed physical security construction, along with design of the appropriate physical security zone in accordance with ASIO Tech Note.

Trusted Insider Threat Mitigation Program

Development of a trusted insider threat mitigation program; informed by risk assessment outcomes.

Deliverables: A documented Trusted Insider Program