More

Sun Chaser Cyber

Sun Chaser CyberSun Chaser CyberSun Chaser CyberSun Chaser Cyber

Boutique cyber services, customised for your organisation

Sun Chaser Cyber

Sun Chaser CyberSun Chaser CyberSun Chaser CyberSun Chaser Cyber

Boutique cyber services, customised for your organisation

ABOUT

About us

Sun Chaser Cyber is a boutique cyber security consultancy located in the sunny Gold Coast, Queensland, and servicing Australian businesses. Sun Chaser Cyber specialises in: 


  • Delivering cyber security tabletops
  • Project and program management
  • Cyber security awareness 
  • Training delivery


Having worked with a diverse range of stakeholders across industries and business sizes, as well as being on the tail end and having received consultancy services ourselves - we have observed the cookie-cutter, tick-and-flick, stamp-and-repeat approaches to cyber services too many times. 


Seeing the need for customised solutions in our market, Sun Chaser Cyber is devoted to delivering bespoke services and solutions to ensure they make a meaningful impact to your organisation.

Shelly Mills

Sun Chaser Cyber's director Shelly comes from a non-technical background, which helps her relate and understand to end-users. She’s since gathered over 9 years of experience working in IT and specialises in cyber security awareness, training, project and program management, tabletops and strategy. 


Shelly holds a Bachelor of Science (Hons), Graduate Diploma in Business (Public Relations), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), and PRINCE 2 Project Management Foundations certifications. An unashamed geek, Shelly is devoted to continual learning and professional development, and you’ll regularly catch her at conferences and industry events. 


A natural on stage, Shelly has presented on cyber security and hosted cyber security workshops at many notable events including Splendour in the Grass, AusCERT conference, and CyberCon Australia.

SERVICES

Cyber Security Tabletops

TECHNICAL - aimed at your Incident Response or Security Operations team and other appropriate IT stakeholders.

Our technical-level tabletop exercises simulate realistic cyber incidents, allowing your team to practice their response procedures. We’ll walk through scenarios, identify vulnerabilities, and enhance incident handling capabilities. Following the tabletop you’ll receive an after-action report outlining identified weaknesses and improvement opportunities.


BUSINESS - aimed at decision makers.

Designed for leadership, our executive-level tabletops focus on strategic decision-making during cyber crises. We’ll discuss risk management, business continuity objectives, communication strategies, and coordination across departments. Following the tabletop you’ll receive an after-action report outlining identified weaknesses and improvement opportunities.

Cyber Security Awareness

CYBER SECURITY AWARENESS CAMPAIGN

A targeted awareness campaign specific to your organisation, including blog articles and digital signs. We will work with you to understand your organisation’s internal communications channels, brand and style guides and environment. Choose from our standard awareness campaign themes, or we can hold a workshop with your cyber security team to understand your threat landscape and highest priority to educate end users on to develop a nuanced and targeted campaign.


CYBER SECURITY AWARENESS STRATEGY

After initial consultations to understand your organisation and goals,  we will develop a strategy for implementing a broader awareness and culture program. We’ll outline benefits, ROI, and strategies for fostering a security-conscious environment.


CYBER SECURITY AWARENESS STRATEGY AND IMPLEMENTATION

In addition to developing an awareness strategy, we’ll actively assist with program implementation, ensuring successful adoption and sustained awareness.


BESPOKE AWARENESS PRESENTATIONS

We can plan and tailor specific awareness presentations based on topic and audience.

Training

INTRODUCTION TO CYBER SECURITY FOR EXECUTIVES

Standard option: A comprehensive full-day training course covering essential cybersecurity concepts tailored for executives. Topics include threat landscape, risk assessment, and best practices.


Customised option: Begin with an initial consultation to understand your organisation’s unique concerns. We’ll then tailor the training to address specific risks and industry nuances.


INTRODUCTION TO CYBER SECURITY RISK MANAGEMENT

This half-day workshop outlines the principles of cyber security risk management.

Uplift Programs

DESIGN PROGRAMS OF WORK

Elevate your security posture with targeted uplift programs. These are tailored to you and can include initiatives that mitigate your risks, or help you achieve compliance against a standard.


CONTROLS IMPLEMENTATION

We’ll guide you through implementing effective controls that mitigate your risks and align with your organisation’s culture.


PROJECT MANAGEMENT 

From planning to execution, we’ve got you covered. Our project management services ensure seamless execution of cybersecurity initiatives. From risk assessment to implementation, we’ll oversee the entire project lifecycle. Expect efficient resource allocation, timely milestones, and successful outcomes.

CONTACT

CONTACT

Gold Coast, Queensland, Australia

[email protected] 0403 562 241

Get in Touch

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Downloads

Free downloadable templates to help you run your own cyber security tabletop

Tabletop Template - Facilitator Runsheet (docx)Download
Tabletop Template - Participant Document (docx)Download
Tabletop Template - Observer Evaluation (docx)Download
Tabletop Template - After Action Report (docx)Download

CONNECT WITH US

Copyright © 2024 Sun Chaser Cyber - All Rights Reserved.


This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept