AUCYBERSCAPE
Linkedin-in
Twitter
Youtube
REGISTER
MEMBER LOGIN
About
About AUCYBERSCAPE, our partners and FAQs ▸
Understand
What is cyber security? A breakdown of categories and glossary of terms ▸
Explore
Discover Australia's most promising growth sector ▸
A
U
CYBERMAP
Use AUCYBERMAP to connect with Australian cyber security providers ▸
Learn
Understand career pathways and education opportunities ▸
Register
Register your company with AUCYBERSCAPE ▸
Resources
Useful tools to deepen your understanding ▸
Contact
Have a question? ▸
Member Login
REGISTER
Become a member to register your company▸
SUBSCRIBE TO A
U
CYBERSCAPE NEWS▸
BECOME A FRIEND OF AUSTCYBER’S NETWORK▸
Your listing details
Organisation Contact Details
ORGANISATION NAME*
ABN*
REGISTERED TRADING ADDRESS*
Unlock Pin Location
Lock Pin Location
Enter coordinates manually
Latitude
Longitude
GENERAL ENQUIRIES PHONE NUMBER
GENERAL ENQUIRIES EMAIL ADDRESS*
WEBSITE URL
Logo*
Maximum file size: 1mb.
Organisation's Owner / CEO / Managing Director
This person will automatically be an account holder for this company. Account holders will receive a notification email informing the outcome of this registration and if approved, details to create an account to access the MEMBER LOGIN section of A
U
CYBERSCAPE to manage this company’s profile.
FIRST NAME*
LAST NAME*
JOB TITLE*
PHONE NUMBER*
EMAIL ADDRESS*
Secondary Contact
FIRST NAME
LAST NAME
JOB TITLE
PHONE NUMBER
EMAIL ADDRESS
Please indicate if the Secondary Contact provided above will be an account holder for this company. Please note: a valid email address must be provided for an account holder (Two account holders is recommended)
YES, SECONDARY CONTACT IS AN ACCOUNT HOLDER
Organisation Profile
IS YOUR ORGANISATION AUSTRALIAN OWNED?*
Yes
No
Please select the country where organisation is headquartered
If other selected, please specify country
IS YOUR ORGANISATION OWNED BY A PARENT COMPANY?*
Yes
No
Please provide company name:
Country/location parent company is headquartered
Parent company ABN
IS YOUR ORGANISATION PUBLIC OR PRIVATE?*
Public
Private
WHAT IS THE MAIN FOCUS OF YOUR ORGANISATION?*
Accelerator, Incubator and/or start-up hub
Provider of cyber security products/ services
R&D institution
Education provider
Defence
Professional & consulting services
Financial services
Insurance services
Other
If Other is selected, please indicate:
SIZE OF ORGANISATION*
Micro (0-4 employees)
Small (5-19 employees)
Medium (20 – 50 employees)
Medium (51 – 100 employees)
Medium (101 – 150 employees)
Medium (151 - 199 employees)
Large (200 or more employees)
Approximately how many full-time equivalent cyber security employees with technical skills does your organisation employ in Australia? e.g. programming, analytics, digital forensics, etc. (please enter a number)*
Approximately how many full-time equivalent cyber security employees with non-technical skills does your organisation employ in Australia? e.g. HR, admin, non-technical managers, etc. (please enter a number)*
What is the expected size of your organisation by 30 June 2021? (end of Australian financial year 2020/2021)*
Micro (0-4 employees)
Small (5-19 employees)
Medium (20 – 50 employees)
Medium (51 – 100 employees)
Medium (101 – 150 employees)
Medium (151 - 199 employees)
Large (200 or more employees)
If Other is selected, please indicate
If Other is selected, please indicate
If Other is selected, please indicate
If Other is selected, please indicate
Organisation Description
BUSINESS DESCRIPTION
0
/
1000
Organisation Capability
BUSINESS SOLUTIONS*
0
/
1000
PRODUCTS AND SERVICES (Select all that apply)*
For more information about cyber security product and service categories including definitions, please visit the
Understand
page
Infrastructure Security
Managed / Security Service Provider (MSSP)
Security Operations Centre provision
Security hardware
Cyber-physical systems security including Supervisory Control And Data Acquisition (SCADA)
Physical layer and telecoms security
Systems Security
Cryptography, including encryption
Operating systems and virtualisation security
Quantum control technologies
Network security
Anti-fraud
Virtual Private Networks (VPNs)
Intrusion prevention
Endpoint security including firewall and antivirus
Authentication including biometrics
Autonomous systems security
Managed Security Service Provider (MSSP)
Cloud/hosting security
Identity and access management
Software & Platform Security
Internet of Things security
Software as a Service (SaaS) security
Managed / collaborative security operations centre
Threat intelligence analytics
Application security
Endpoint security including firewall and antivirus
Intrusion detection
Vulnerability scanning
Email security
Application whitelisting
Mobile and web security
Attacks & Defences
Penetration - testing
Vulnerability assessment
Cyber security research including bug bounty programs
Threat detection and response
Wargaming and exercising
Cyber deception technologies
Active defence
Decoys
Threat emulation
Digital forensics
Human, Organisational and Regulatory Aspects
Cyber security training and education
Cyber governance, risk and compliance management including audit and maturity assessment
Cyber readiness assessment
Privacy impact assessment
Cyber-related professional services
Technical due diligence
Consultancy and advisory
Legal services
Recruitment
Insurance
Other
Technical testing for application/use cases
Technical testing for export
Incubator program
Accelerator program
Other
If Other is selected, please indicate
Education, Training and Development
DOES YOUR ORGANISATION PROVIDE EDUCATION OR TRAINING IN CYBER SECURITY?*
Yes
No
IF YES, IN WHAT CATEGORIES AND AREAS?*
For more information about these categories please refer to the Standard National Workforce Framework available on the
Learn
page
Collect and Operate
Cyber Operational Planning (OPL)
Cyber Operations (OPS)
Collection Operations (CLO)
Investigate
Cyber Investigation (INV)
Digital Forensics (FOR)
Operate and Maintain
Customer Service and Technical Support (STS)
Data Administration (DTA)
Knowledge Management (KMG)
Network Services (NET)
Systems Administration (ADM)
Systems Analysis (ANA)
Oversee & Govern
Program/Project Management (PMA) and Acquisition
Cyber Security Management (MGT)
Legal Advice and Advocacy (LGA)
Strategic Planning and Policy (SSP)
Training, Education and Awareness (TEA)
Executive Cyber Leadership (EXL)
Analyse
All-Source Analysis (ASA)
Exploitation Analysis (EXP)
Language Analysis (LNG)
Targets (TGT)
Threat Analysis (TWA)
Securely Provision
Risk Management (RSK)
Software Development (DEV)
Systems Architecture (ARC)
Systems Development (SYS)
Systems Requirements Planning (SRP)
Technology R & D (TRD)
Test and Evaluation (TST)
Protect and Defend
Cyber Security Defence Infrastructure Support (INF)
Incident Response (CIR)
Vulnerability Assessment and Management (VAM)
Cyber Security Defence Analysis (CDA)
Mentoring
Traineeships
Cadetships
Other
If Other is selected, please indicate
Acknowledgement
I HAVE READ AND AGREE TO THE A
U
CYBERSCAPE
TERMS AND CONDITIONS
*
Choose an option:
If Other is selected, please indicate
If Other is selected, please indicate
If yes, select all that are applicable
Federal government
In the last 12 months
2 to 3 years ago
4 to 5 years ago
6 to 10 years ago
State / territory
In the last 12 months
2 to 3 years ago
4 to 5 years ago
6 to 10 years ago
Submit Registration
Please wait while the request is being processed.
Cart