www.tobruksecurity.com
Open in
urlscan Pro
2a06:98c1:3120::3
Public Scan
URL:
https://www.tobruksecurity.com/
Submission: On August 12 via automatic, source certstream-suspicious — Scanned from NL
Submission: On August 12 via automatic, source certstream-suspicious — Scanned from NL
Form analysis
1 forms found in the DOMPOST //www.weebly.com/weebly/apps/formSubmitAjax.php
<form enctype="multipart/form-data" action="//www.weebly.com/weebly/apps/formSubmitAjax.php" method="POST" id="form-662227186800127850" accept-charset="UTF-8" target="form-662227186800127850-target-1723503232001">
<div id="662227186800127850-form-parent" class="wsite-form-container" style="margin-top:10px;">
<ul class="formlist" id="662227186800127850-form-list">
<label class="wsite-form-label wsite-form-fields-required-label"><span class="form-required">*</span> Indicates required field</label>
<div>
<div class="wsite-multicol">
<div class="wsite-multicol-table-wrap" style="margin:0 -15px;">
<table class="wsite-multicol-table">
<tbody class="wsite-multicol-tbody">
<tr class="wsite-multicol-tr">
<td class="wsite-multicol-col" style="width:33.333333333333%; padding:0 15px;">
<div>
<div class="wsite-form-field" style="margin:5px 0px 5px 0px;">
<label class="wsite-form-label" for="input-626373138574190472">Name <span class="form-required">*</span></label>
<div class="wsite-form-input-container">
<input aria-required="true" id="input-626373138574190472" class="wsite-form-input wsite-input wsite-input-width-370px" type="text" name="_u626373138574190472">
</div>
<div id="instructions-626373138574190472" class="wsite-form-instructions" style="display:none;"></div>
</div>
</div>
</td>
<td class="wsite-multicol-col" style="width:33.333333333333%; padding:0 15px;">
<div>
<div class="wsite-form-field" style="margin:5px 0px 5px 0px;">
<label class="wsite-form-label" for="input-123198062145381008">Phone <span class="form-required">*</span></label>
<div class="wsite-form-input-container">
<input aria-required="true" id="input-123198062145381008" class="wsite-form-input wsite-input wsite-input-width-370px" type="text" name="_u123198062145381008">
</div>
<div id="instructions-123198062145381008" class="wsite-form-instructions" style="display:none;"></div>
</div>
</div>
</td>
<td class="wsite-multicol-col" style="width:33.333333333333%; padding:0 15px;">
<div>
<div class="wsite-form-field" style="margin:5px 0px 5px 0px;">
<label class="wsite-form-label" for="input-677354560737135112">Email <span class="form-required">*</span></label>
<div class="wsite-form-input-container">
<input aria-required="true" id="input-677354560737135112" class="wsite-form-input wsite-input wsite-input-width-370px" type="text" name="_u677354560737135112">
</div>
<div id="instructions-677354560737135112" class="wsite-form-instructions" style="display:none;"></div>
</div>
</div>
</td>
</tr>
</tbody>
</table>
</div>
</div>
</div>
<div>
<div class="wsite-form-field" style="margin:5px 0px 5px 0px;">
<label class="wsite-form-label" for="input-245261378366312342">Comment <span class="form-required">*</span></label>
<div class="wsite-form-input-container">
<textarea aria-required="true" id="input-245261378366312342" class="wsite-form-input wsite-input wsite-input-width-370px" name="_u245261378366312342" style="height: 200px"></textarea>
</div>
<div id="instructions-245261378366312342" class="wsite-form-instructions" style="display:none;"></div>
</div>
</div>
</ul>
</div>
<div style="display:none; visibility:hidden;">
<input type="hidden" name="wsite_subject">
</div>
<div style="text-align:center; margin-top:10px; margin-bottom:10px;">
<input type="hidden" name="form_version" value="2">
<input type="hidden" name="wsite_approved" id="wsite-approved" value="approved">
<input type="hidden" name="ucfid" value="662227186800127850">
<input type="hidden" name="recaptcha_token">
<input type="submit" role="button" aria-label="Submit" value="Submit" style="position:absolute;top:0;left:-9999px;width:1px;height:1px">
<a class="wsite-button">
<span class="wsite-button-inner">Submit</span>
</a>
</div>
<input type="hidden" id="formLocation" name="formLocation" value="www.tobruksecurity.com">
</form>
Text Content
+61 (7) 3315 2361 * Home * What We Do * About * Industries * Contact Us TOBRUK SECURITY Experts in Cybersecurity for Critical Infrastructure and High-threat environments Get in touch OUR SERVICES -------------------------------------------------------------------------------- THREAT & RISK ASSESSMENT SECURITY ARCHITECTURE CYBER PROGRAM AND PROJECT MANAGEMENT TECHNICAL SECURITY ASSESSMENT CYBERSECURITY MANAGEMENT SYSTEM ASSESSMENT CYBERSECURITY LEADERSHIP AND EDUCATION CRISIS MANAGEMENT TOBRUK SECURITY Our Mission To help organisations better understand, prepare, and respond to cybersecurity threats, ensuring safety and reliability of essential services. Our Values We are a credible and capable authority in cybersecurity. We deliver confidential, discrete, and relevant services and pragmatic advice. We solve cybersecurity challenges holistically. Your Results Optimise cybersecurity return-on-investment and protect your most valuable assets - your customer's trust. Read more about us WORLD CLASS EXPERTISE We are leaders in critical infrastructure and high-threat cybersecurity, where the consequences of failure can be catastrophic. Our leadership extends to participating in developing industry standards and research initiatives. READ MORE Tobruk helps the Rail Industry improve cybersecurity Tobruk’s CEO, Duncan Unwin, has been working with the rail industry to develop the first national standard for cybersecurity. AS7770 developed by the Rail Industry Safety Standards Board (RISSB), provides comprehensive guidance on developing an effective cybersecurity management framework in a rail operator. Tobruk’s research on cyber-threats to rail publish by the Institute of Mechanical Engineers The Journal of Rail and Rapid Transit, has published an article on Tobruk’s research into rail cyber-safety. The article “Railway cyber safety - an intelligent threat perspective” was authored by Duncan Unwin and Dr Louis Sanzogni, from Griffith University. This journal is a scientific peer-reviewed journal on rail systems. The paper reports on the results on using wargaming approaches to understand emerging threats to these complex cyber-physical systems. Tobruk participating in the Australian working group on control system cyber safety Gideon Parker, Senior Consultant, has been providing technical advice to the Australian working group of the ISA/IEC 62443 standard. This standard is one of the most central to the core cybersecurity of control systems, and Gideon’s participation reflects his reputation in control system cybersecurity. TAILORED DEFENCE STRATEGIES INFORMED BY RISK ASSESSMENT. The design of cyber-defences should be based on the sophistication and motivation of attackers you are facing, and the consequences of being hacked. We use concepts developed in the military intelligence domain, to better understand the motivation, identify and tactics, technique, and procedures of likely attackers. We then use this knowledge to design efficient, effective, and resilient security architectures. READ MORE Military intelligence has much to teach cybersecurity professionals about knowing the threat faced by an organisation. Rather than relying on generic statements about threat environments, the Tobruk approach is to use processes developed by military intelligence (S2) to understand your enemy. One we understand this picture, we can construct cybersecurity architectures that deal with the level of threat that an organisation is likely to face. Duncan Unwin, our CEO, has used his experience from 25 years in Signals to help organisations understand their threats and implement smart defences. For example, when facing sophisticated threat agents, we recommend not only conventional controls to prevent, detect and respond to threats, but also active defence measures that provide positive warning that an organisation is being targeted for attack. REAL OUTCOMES We don’t consider a document or slide pack to be the end of our mission. We take strategies and architectures, and using our extensive programme and project management expertise, work with your IT delivery partners and your organisation to implement them. Our holistic approach addresses governance, policies and standards, people and organisation, technology, and operations. We can do this using classical engineering project management methodologies or Agile and Lean management approaches. READ MORE A Cloud Identity Access Architecture for a Bank In 2019, Valdemar Jakobsen, our Chief Information Security Officer, worked with a mid-tier bank to design a cloud-based identity and access management solution, that would connect all their systems with a single administration process for Staff needing granular access to customer information. He worked with Microsoft and Ping Identity to develop a solution that was comprehensive yet practical, and which can be progressively rolled out to all the core systems in the bank. Tobruk helps a start-up in a high-threat environment Duncan Unwin, Tobruk’s CEO, has been helping a start-up crypto-currency exchange to implement effective cybersecurity controls on a limited budget. “It’s a real challenge for them, as there is really no higher-threat environment and they are a small team with no cybersecurity staff. With these restrictions, we have helped them reducing their risk for the least investment.” SCALABLE APPROACH Tobruk values practical approaches that start from where an organisation is today. We help you set realistic goals using manageable investments. We always look to optimise the return on investment by lowering cyber risk for the least cost. FEEL FREE TO CONTACT US * Indicates required field Name * Phone * Email * Comment * Submit ⇣ Drag elements to your Custom Footer Container ⇣ HOME WHAT WE DO ABOUT INDUSTRIES CONTACT US Site powered by 543 Website Design & Online Advertising ⇣ Drag elements to your Bottom Footer Container ⇣ Top * Home * What We Do * About * Industries * Contact Us × ⇣ Drag elements to sideNav container ⇣