Contact Us:

  • Privacy Policy (November 2023)
  • This policy outlines how we collect, use, and safeguard your personal information.
  • Information We Collect & How We Use It
  • Contact Form: When you use our contact form, we collect your name, email, and phone number. This is used to respond to your inquiries
  • Microsoft Clarity, Google & Bing Analytics: We use Microsoft Clarity together with Google & Bing Analytics to collect data such as your page views, and visitor behavior on our site. This helps us understand how our website is used to help us improve our site.
  • We do not share your personal data with any third parties, except as necessary for Microsoft Clarity, Google & Bing Analytics analysis, see their privacy policies for more information.
  • Data Security
  • Contact form information is sent via formspree.io as this is a 100% static site to a shared mailbox in Office 365. Access to this mailbox is restricted to specific individuals within our company to ensure the security of your information.
  • formspree.io helps us archive a copy of the form submission where it is retained for 30 days. If you prefer to contact us directly, you can email us at [email protected] for the same purpose.
  • Your Rights
  • You have the right to access, amend, or request the deletion of your personal data. If you have any privacy-related concerns, questions, or requests regarding your personal information, please contact us at [email protected].
  • Changes to Privacy Policy
  • Our privacy policy may be updated periodically. Any changes will be posted here and communicated to individuals who have previously submitted forms.
  • Jurisdiction
  • This privacy policy adheres to the Australian Privacy Principles.
project black logo
monitor with binary on it representing code and engineering work

Security Engineering.

Get help implementing your missing security controls, or remediating recommendations from assessments. Clear out that project backlog.

Our Core Offerings.

ASD Essential Eight Implementation

Mitigate cyber threats by implementing strategies prescribed by the ASD's Essential Eight and reach your desired maturity level. Whether it involves application control, patching, or hardening, the best time to start was yesterday; the next best time is now.

ISO 27001 & PCI DSS Control Implementation

Achieve compliance with confidence. We help you navigate and integrate these critical standards into your operations, ensuring not just compliance but also a stronger, more secure business infrastructure.

Security Automation and Orchestration

Streamline security with automation. Security is harder with manual, labour intensive processes, automate activities like patching with or hardening with automation and desired state configuration tooling.

Workstation & Server Hardening

Default configurations are designed to balance usability and security for a wide range of users and organizations. To ensure that insecure defaults are disabled, harden your workstations and servers.

Why Project Black?

Pragmatic Controls

Tailor security controls specific to your needs, not everyone needs to build Fort Knox. We assess your unique risk profile to ensure that every security control is necessary, efficient, and adds real value.

Compliance Assurance

Our work has undergone rigorous audits for ISO 27001 and PCI DSS compliance, ensuring that the controls we implement meet the stringent requirements of these standards. You can rest assured that your controls are robust but also align with your regulatory demands.

Partnering for Knowledge, Not Just Solutions

Our goal extends beyond implementing the control and billing you. We're committed to bringing you along on the journey. As we work to enhance your cybersecurity, we also focus on educating and equipping your team with the knowledge they need.

Commitment to Innovation

Attacker methodologies continuously evolve, staying ahead of the curve is paramount. Project Black invests significantly in research and development. This commitment to continuous learning and innovation ensures that the techniques and tools remain cutting edge. Check out our research blog.

FAQs.

  • How are these engagements priced?

    For security engineering projects, we typically engage on a T&M basis with an effort estimation to ensure fairness and transparency.

  • Why should we consider outside help?

    Most organisations don't have the workload to employ a full-time cybersecurity engineer making it more practical to seek outside expertise. By working with us you'll get access to specialised skills on demand without the associated overheads.

  • How do you make this cost effective?

    For most of our customers, they don't actually need us to click the buttons. We provide expert guidance and leave your team to take action, this maximises your resources making sure they have access to specialised knowledge, reducing costs, and building your teams capabilities.

Get a Quote.

Fill out the form below with your details, and we'll reach out to you on the same day.