www.tobruksecurity.com Open in urlscan Pro
2a06:98c1:3120::3  Public Scan

URL: https://www.tobruksecurity.com/
Submission: On August 12 via automatic, source certstream-suspicious — Scanned from NL

Form analysis 1 forms found in the DOM

POST //www.weebly.com/weebly/apps/formSubmitAjax.php

<form enctype="multipart/form-data" action="//www.weebly.com/weebly/apps/formSubmitAjax.php" method="POST" id="form-662227186800127850" accept-charset="UTF-8" target="form-662227186800127850-target-1723503232001">
  <div id="662227186800127850-form-parent" class="wsite-form-container" style="margin-top:10px;">
    <ul class="formlist" id="662227186800127850-form-list">
      <label class="wsite-form-label wsite-form-fields-required-label"><span class="form-required">*</span> Indicates required field</label>
      <div>
        <div class="wsite-multicol">
          <div class="wsite-multicol-table-wrap" style="margin:0 -15px;">
            <table class="wsite-multicol-table">
              <tbody class="wsite-multicol-tbody">
                <tr class="wsite-multicol-tr">
                  <td class="wsite-multicol-col" style="width:33.333333333333%; padding:0 15px;">
                    <div>
                      <div class="wsite-form-field" style="margin:5px 0px 5px 0px;">
                        <label class="wsite-form-label" for="input-626373138574190472">Name <span class="form-required">*</span></label>
                        <div class="wsite-form-input-container">
                          <input aria-required="true" id="input-626373138574190472" class="wsite-form-input wsite-input wsite-input-width-370px" type="text" name="_u626373138574190472">
                        </div>
                        <div id="instructions-626373138574190472" class="wsite-form-instructions" style="display:none;"></div>
                      </div>
                    </div>
                  </td>
                  <td class="wsite-multicol-col" style="width:33.333333333333%; padding:0 15px;">
                    <div>
                      <div class="wsite-form-field" style="margin:5px 0px 5px 0px;">
                        <label class="wsite-form-label" for="input-123198062145381008">Phone <span class="form-required">*</span></label>
                        <div class="wsite-form-input-container">
                          <input aria-required="true" id="input-123198062145381008" class="wsite-form-input wsite-input wsite-input-width-370px" type="text" name="_u123198062145381008">
                        </div>
                        <div id="instructions-123198062145381008" class="wsite-form-instructions" style="display:none;"></div>
                      </div>
                    </div>
                  </td>
                  <td class="wsite-multicol-col" style="width:33.333333333333%; padding:0 15px;">
                    <div>
                      <div class="wsite-form-field" style="margin:5px 0px 5px 0px;">
                        <label class="wsite-form-label" for="input-677354560737135112">Email <span class="form-required">*</span></label>
                        <div class="wsite-form-input-container">
                          <input aria-required="true" id="input-677354560737135112" class="wsite-form-input wsite-input wsite-input-width-370px" type="text" name="_u677354560737135112">
                        </div>
                        <div id="instructions-677354560737135112" class="wsite-form-instructions" style="display:none;"></div>
                      </div>
                    </div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </div>
      </div>
      <div>
        <div class="wsite-form-field" style="margin:5px 0px 5px 0px;">
          <label class="wsite-form-label" for="input-245261378366312342">Comment <span class="form-required">*</span></label>
          <div class="wsite-form-input-container">
            <textarea aria-required="true" id="input-245261378366312342" class="wsite-form-input wsite-input wsite-input-width-370px" name="_u245261378366312342" style="height: 200px"></textarea>
          </div>
          <div id="instructions-245261378366312342" class="wsite-form-instructions" style="display:none;"></div>
        </div>
      </div>
    </ul>
  </div>
  <div style="display:none; visibility:hidden;">
    <input type="hidden" name="wsite_subject">
  </div>
  <div style="text-align:center; margin-top:10px; margin-bottom:10px;">
    <input type="hidden" name="form_version" value="2">
    <input type="hidden" name="wsite_approved" id="wsite-approved" value="approved">
    <input type="hidden" name="ucfid" value="662227186800127850">
    <input type="hidden" name="recaptcha_token">
    <input type="submit" role="button" aria-label="Submit" value="Submit" style="position:absolute;top:0;left:-9999px;width:1px;height:1px">
    <a class="wsite-button">
				<span class="wsite-button-inner">Submit</span>
			</a>
  </div>
  <input type="hidden" id="formLocation" name="formLocation" value="www.tobruksecurity.com">
</form>

Text Content

+61 (7) 3315 2361
 * Home
 * What We Do
 * About
 * Industries
 * Contact Us




TOBRUK SECURITY

Experts in Cybersecurity for Critical Infrastructure
and High-threat environments

Get in touch






OUR SERVICES

--------------------------------------------------------------------------------





THREAT & RISK ASSESSMENT




SECURITY ARCHITECTURE




CYBER PROGRAM AND PROJECT MANAGEMENT




TECHNICAL SECURITY ASSESSMENT




CYBERSECURITY MANAGEMENT SYSTEM ASSESSMENT




CYBERSECURITY LEADERSHIP AND EDUCATION




CRISIS MANAGEMENT


TOBRUK SECURITY


Our Mission
To help organisations better understand, prepare, and respond to cybersecurity
threats, ensuring safety and reliability of essential services.

Our Values
We are a credible and capable authority in cybersecurity. 
We deliver confidential, discrete, and relevant services and pragmatic advice.
We solve cybersecurity challenges holistically. 

Your Results
Optimise cybersecurity return-on-investment and protect your most valuable
assets - your customer's trust.

Read more about us




WORLD CLASS EXPERTISE

We are leaders in critical infrastructure and high-threat cybersecurity, where
the consequences of failure can be catastrophic.  Our leadership extends to
participating in developing industry standards and research initiatives.
READ MORE
Tobruk helps the Rail Industry improve cybersecurity
Tobruk’s CEO, Duncan Unwin, has been working with the rail industry to develop
the first national standard for cybersecurity.  AS7770 developed by the Rail
Industry Safety Standards Board (RISSB), provides comprehensive guidance on
developing an effective cybersecurity management framework in a rail operator. 

Tobruk’s research on cyber-threats to rail publish by the Institute of
Mechanical Engineers
The Journal of Rail and Rapid Transit, has published an article on Tobruk’s
research into rail cyber-safety.  The article “Railway cyber safety - an
intelligent threat perspective” was authored by Duncan Unwin and Dr Louis
Sanzogni, from Griffith University.  This journal is a scientific peer-reviewed
journal on rail systems.  The paper reports on the results on using wargaming
approaches to understand emerging threats to these complex cyber-physical
systems.

Tobruk participating in the Australian working group on control system cyber
safety
Gideon Parker, Senior Consultant, has been providing technical advice to the
Australian working group of the ISA/IEC 62443 standard. This standard is one of
the most central to the core cybersecurity of control systems, and Gideon’s
participation reflects his reputation in control system cybersecurity.




TAILORED DEFENCE STRATEGIES INFORMED BY RISK ASSESSMENT.

The design of cyber-defences should be based on the sophistication and
motivation of attackers you are facing, and the consequences of being hacked. 
 We use concepts developed in the military intelligence domain, to better
understand the motivation, identify and tactics, technique, and procedures of
likely attackers.  We then use this knowledge to design efficient, effective,
and resilient security architectures.
READ MORE
Military intelligence has much to teach cybersecurity professionals about
knowing the threat faced by an organisation.  Rather than relying on generic
statements about threat environments, the Tobruk approach is to use processes
developed by military intelligence (S2) to understand your enemy.

One we understand this picture, we can construct cybersecurity architectures
that deal with the level of threat that an organisation is likely to face. 
Duncan Unwin, our CEO, has used his experience from 25 years in Signals to help
organisations understand their threats and implement smart defences.  For
example, when facing sophisticated threat agents, we recommend not only
conventional controls to prevent, detect and respond to threats, but also active
defence measures that provide positive warning that an organisation is being
targeted for attack.





REAL OUTCOMES

We don’t consider a document or slide pack to be the end of our mission.  We
take strategies and architectures, and using our extensive programme and project
management expertise, work with your IT delivery partners and your organisation
to implement them.   Our holistic approach addresses governance, policies and
standards, people and organisation, technology, and operations.   We can do this
using classical engineering project management methodologies or Agile and Lean
management approaches.
READ MORE
A Cloud Identity Access Architecture for a Bank
In 2019, Valdemar Jakobsen, our Chief Information Security Officer, worked with
a mid-tier bank to design a cloud-based identity and access management solution,
that would connect all their systems with a single administration process for
Staff needing granular access to customer information.  He worked with Microsoft
and Ping Identity to develop a solution that was comprehensive yet practical,
and which can be progressively rolled out to all the core systems in the bank.

Tobruk helps a start-up in a high-threat environment
Duncan Unwin, Tobruk’s CEO, has been helping a start-up crypto-currency exchange
to implement effective cybersecurity controls on a limited budget.  “It’s a real
challenge for them, as there is really no higher-threat environment and they are
a small team with no cybersecurity staff.  With these restrictions, we have
helped them reducing their risk for the least investment.”




SCALABLE APPROACH

Tobruk values practical approaches that start from where an organisation is
today.  We help you set realistic goals using manageable investments.  We always
look to optimise the return on investment by lowering cyber risk for the least
cost.


FEEL FREE TO CONTACT US

* Indicates required field
Name *


Phone *


Email *



Comment *




Submit



⇣ Drag elements to your Custom Footer Container ⇣

HOME
WHAT WE DO
ABOUT
INDUSTRIES
CONTACT US



Site powered by 543 Website Design & Online Advertising
⇣ Drag elements to your Bottom Footer Container ⇣

Top
 * Home
 * What We Do
 * About
 * Industries
 * Contact Us

× ⇣ Drag elements to sideNav container ⇣