Secure State

Secure State

IT Services and IT Consulting

Clovelly Park, South Australia 864 followers

Information security and cyber security specialists.

About us

Secure State's mission is to provide digital and technological enablement to its clients. Our services and products will be delivered with the same security frameworks and best practices as used by Enterprise, Government and Defence. Our core belief is that information and cyber security should be the number one focus for all technology and businesses.

Industry
IT Services and IT Consulting
Company size
11-50 employees
Headquarters
Clovelly Park, South Australia
Type
Privately Held
Founded
2021

Locations

  • Primary

    MAB Eastern Prom

    Suite 30

    Clovelly Park, South Australia 5042, AU

    Get directions

Employees at Secure State

Updates

  • View organization page for Secure State, graphic

    864 followers

    🪩 Flinders Foundation PINK YELLOW BLUE DISCO 🪩 Luke Smith and Amy Smith had the pleasure of attending this event and worthy cause on Saturday night, as the guests of Solstice Media and InDaily The foundation funds world class innovations and the event is focused on the fight against cancer. Pleasure to be a guest and to learn more about how the foundation is supporting those affected by this devastating disease. #flindersfoundation #philanthropy #cybersecurity

  • View organization page for Secure State, graphic

    864 followers

    View profile for Ben Hodge, graphic

    Delivering hand crafted secure I.T.

    🚨 Australia's First Standalone Cybersecurity Act 🚨 There are big changes are on the horizon for Australian businesses! The newly proposed Cyber Security Act will make ransomware payment reporting mandatory, a significant step toward improving national cybersecurity resilience. With cyberattacks becoming more sophisticated, mandatory reporting will: - Improve transparency - Help authorities track and prevent further attacks - Strengthen our collective defence against cybercrime As we move towards stricter regulations, it’s critical for organisations to stay ahead by enhancing their security posture and aligning with frameworks like ISO 27001. Is your business ready for the new era of cybersecurity? #CyberSecurity #Ransomware #Australia #Compliance #ISO27001 #CyberResilience https://lnkd.in/gNWSU6k7

    Australia’s first standalone Cyber Security Act to make ransom payment reporting mandatory

    Australia’s first standalone Cyber Security Act to make ransom payment reporting mandatory

    cyberdaily.au

  • View organization page for Secure State, graphic

    864 followers

    ⚡️APPLICATION SECURITY LIGHTENING TALKS — about last night 👇🏼 Luke Smith attended and spoke at cyber security session hosted by SecTalks and Adelaide .NET User Group (ADNUG) at UniSA. The first of its kind — a collaboration between these passionate and important cyber communities. Luke discussed secure software development from a penetration tester’s perspective. This included basic OWASP vulnerabilities, Application Security Verfication Standard (ASVS) and the Web Security Testing Guide. Also speaking on their expertise were 👾 Rob Bos and Josh Young. #cybersecurity #SecTalks #Networking #Adelaide #ADNUG

    • No alternative text description for this image
  • View organization page for Secure State, graphic

    864 followers

    🚨 NEED TO KNOW 🚨 Our cyber security consultant Adam McHugh lays out the important changes to requirements for organisations a part of the Australian Defence Industry. See his post below 👇🏼

    View profile for Adam McHugh, graphic

    Senior Cyber Security Consultant @ Secure State | CISSP, CMMC-RP

    🚨 Important Changes for the Australian Defence Industry - Focus Shifts to Essential Eight Maturity Level 2 (No more Top 4!) 🚨 If your business is part of the Australian Defence Industry, you've likely been aware of the requirements of #DISP membership. There has however been an update to the #DSPF (27th of September) which brings significant changes to how #EssentialEight (E8) compliance is prioritised, especially with the removal of the Australian Signals Directorate E8 Top 4 option. Here's what you need to know: The previous focus on the Top 4 strategies from the E8 has been removed, and the spotlight is now on achieving E8 at Maturity Level 2 (ML2) across all ICT systems that correspond with Defence. This means: - No more partial compliance based on Top 4. - Full implementation of all Eight mitigation strategies at a defined maturity level - Increased focus on patching, application control, and security configurations that are crucial to defending against modern cyber threats. 🌐 How This Intersects with #CMMC and #NIST SP 800-171 For businesses also dealing with the US Department of Defense (DoD) contracts or handling Controlled Unclassified Information (#CUI), the changes to the Essential Eight create a potential overlap with CMMC and NIST SP 800-171 requirements. While these frameworks have different focal points, the changes bring the following challenges: CMMC (Cybersecurity Maturity Model Certification): For Australian Defence Industry businesses engaged with US DoD, CMMC compliance is becoming a critical requirement. Maturity Level 2 of the Essential Eight aligns well with the CMMC Level 1 requirement of safeguarding Federal Contract Information (#FCI), but these are separate frameworks that need to be managed concurrently. NIST SP 800-171: US contracts often demand compliance with NIST SP 800-171 to protect CUI (CMMC Level 2), and businesses need to ensure they meet these controls. While NIST SP 800-171 doesn’t map directly to the Essential Eight, there are areas of overlap—particularly in access controls, patch management, and configuration management. 📊 What This Means for Your Business These changes mark a shift towards holistic security rather than partial measures. Achieving Essential Eight Maturity Level 2 is now critical for remaining compliant with Australian Defence requirements, but don’t forget the potential impacts of CMMC flow-down or NIST SP 800-171 compliance if you’re working with US DoD contracts. Your organisation may need to: - Review your current cybersecurity practices and fill gaps in your Essential Eight implementation. - Ensure that your compliance frameworks align across Australian DISP requirements and potential US CMMC or NIST SP 800-171 requirements. - Plan for cybersecurity assessments that ensure you are meeting the highest standards of both Defence markets. If you need assistance with DISP and/or CMMC, please reach out to Secure State. We're happy to help 😊

  • View organization page for Secure State, graphic

    864 followers

    Are you on the executive team of a company and want to learn more about cyber? We’ve got an offering for you 🫵🏻 Join an in-house session with our founder and COO, Luke Smith, an expert in cybersecurity, where you can ask questions, explore real risks, and strategise to lead your company with confidence. Think this would be valuable? Contact us to learn more. 📧 info@securestate.com.au 💻 www.securestate.com.au #governance #riskassessment #cybersecurity #expert #cyberrisk #incidentresponse #cybereducation

    • No alternative text description for this image
  • View organization page for Secure State, graphic

    864 followers

    Expo’s are like a marathon especially with such a big turnout — here’s Luke Smith’s recap: It was great to see such a large turnout at #LandForces2024. I thoroughly enjoyed walking the floor and seeing the range of impressive new tech coming to markets. The best part was reconnecting with our Defence Industry clients and seeing the great work they are doing in the space. Shout out to Defence SA for hosting such a great selection of South Australian talent. Land Forces International Land Defence Exposition #defenceindustry #defence #cybersecurity

  • View organization page for Secure State, graphic

    864 followers

    💀 CYBER HYGIENE: IT'S A LIFE OR DEATH SITUATION 💀 A cyber breach normally means you are risking financial loss, reputation and operational time but in terms of the disruption to a healthcare provider, the risk is a much greater. As a part of the critical infrastructure, it is important for all types of healthcare providers (for example: GP clinics, surgeries, aged care facilities, disability support, allied health and even hospitals) to ensure their cyber hygiene is up to scratch. Not only is technology heavily relied upon for the running and support of patients, but their most sensitive personal information is also kept by our trusted healthcare providers. If you run any of the listed organisations above, it is imperative you have external experts at hand to ensure you have best practices in place. Reach out to us and see how we can help! 📧 info@securestate.com.au #cybersecurity #healthcare #alliedhealth #healthcareprovider #NDISsupport #adelaidebusiness #criticalinfrastructure #cyberhygiene #penetrationtesting #incidentresponse

    • No alternative text description for this image

Similar pages

Browse jobs