Cyber Security

Security in Depth is one of the world's leading cyber research & advisory companies. We prepare businesses to be cyber ready

State of Cyber Security in Australia - 2019 Research


Read the 2019 report

The State of Cyber Security in Australia Report is the largest research project on cyber security in Australia. The findings on where Australian businesses, we believe is significant. To find out more you can read the report here.

Read the report

CARR - The Australian Standard in Cyber Risk Management

CARR - The Cyber Assurance Risk Rating remains unique in its ability to help organisations understand their Cyber Risk Maturity as well as help organisations make better decisions with Cyber Risk.

For more information please click here

Security in Depth in the News.

Michael Connory, CEO of Security in Depth demonstrates the ease with which companies can be hacked in today's digital world.

Supporting Mental Health Awareness


In Depth Cyber Research

Cyber Security Research, Security in Depth, infosec research, data breach research, phishing

As the world's leading researcher on Cyber Security we can provide your organisation and your business leaders with unique insights and support in structuring and maintaining a Cyber Secure and resilient organisation 

Cyber Security Consulting Services

Iso27001, NIST consulting, CIS controls, Incident Response, training,  awareness, cyber governance

Want to know where to start and how best to implement a Cyber program. Start here. Our consultants are some of the world's most experienced and knowledgeable and are adept at translating technical language to real world so your business leaders and your organisation can benefit 

Cyber Security Technical Solutions

Penetration testing, vulnerability testing, vulnerability scanning, cyber attack, red team, phishing

The easiest way to describe our services here - this is where we hack you - with your permission. Our technical team are adept at testing your infrastructure, your applications, your network. 

Cyber Awareness and Security Training

Cyber awareness, LMS, elearning, security training, cyber basics

70% of all data breaches are caused by people making mistakes. The easiest and best way to help your staff is to provide quality training and our staff are some of the worlds leading corporate trainers, supported by the world's most awarded learning platforms.  

Our Products

CARR - Cyber Assurance Risk Rating

CARR, Cyber Assurance Risk Rating, Cyber Review Cyber score supplier assurance third party assurance

The Cyber Assurance Risk Rating (CARR) is the de facto Australian standard for assessing cyber security business risk, when reviewing business relationships with third party suppliers. CARR provides a global, regional and local view of an organisation’s risk profile and the likelihood of a data breach via third party suppliers.  

Candiru - Simulated Cyber Attack


Cyber research shows that over 75% of cyber attacks worldwide originate from a malicious email, and the number of those targeted attacks keep increasing. As we have seen in the past, both very high-profile cyber campaigns as well as less known ones, are launched with an email containing a malicious attachment or link for infecting the victims with ransomware or opening a direct connection with the Command & Control (C&C) servers of the hackers. 

GuardMyID - Identity Protection


GuardMyID is one of the world’s premier personal identity and cyber security support services. We help individuals and organisations stop identity theft as well as reduce the harm they experience from identity theft and cyber scams – everyday 24/7


Security in Depth in the NEWS

Cyber Credit Scores help organisations reduce risk



A new service from Australian cyber research and consultancy firm Security in Depth aims to help enterprises minimise risk through a new ‘credit score’-style rating that assesses the security maturity of suppliers that integrate with their systems.

The new service is essentially “a cyber credit score,” CEO Michael Connory told Computerworld.

Read More

Human factor weak link in health data security



Crystal ball gazing is an art usually left to mediums and psychics who profit off the hope of the true believers.

It’s the ability to sell a belief that makes what a medium has to say an interesting story, and yet, there is something to be said about forecasting events with credibility and foresight while armed with the right information.

Read More

Cyber Credit Scores determining future business realationships


A new service rates businesses in supply chains on their security measures and the potential risk of doing business

A new service has been launched to give indicators to enterprises of whether or not their supply chain partners could be susceptible to cyberattacks.

The security of businesses is only as strong as its weakest link. Threat actors understand this and will often target employees via phishing campaigns, malicious links, and fraudulent websites in order to steal credentials and infiltrate a corporate network.

Read more