Cyber Resilience

Information security has challenged organisations since the very beginning. With increased dependency on digital services, cyber resilience is no longer a nice to have - it is essential.

“We shouldn’t ask our customers to make a tradeoff between privacy and security.
We need to offer them the best of both. Ultimately, protecting someone else’s data protects all of us”
- Tim Cook

Cyber Assure

From a complementary 30-minute screening of your choice to comprehensive independent assurance audits. We provide outcomes giving both you and external entities the confidence needed to map and improve your cyber resilience.

Cyber Foundation

Cyber resilience requires a foundation that encourages consistency and collaboration. By assessing your enterprise risk management framework, we create or improve your information security framework to mitigate risk.

Cyber Uplift

The culture piece of any information security framework determines its success. Through cyber risk awareness training, tabletop exercises, cultural surveys, and control testing, we enhance knowledge while identifying areas of improvement.

Technology itself is constantly changing. Organisations need to maintain ongoing monitoring of their cyber risk framework to proactively mitigate blind spots and adapt to the exponential rise of AI-enabled cyber attacks. Standards and regulations are now being issued and updated at unprecedented speed, offering essential guidance to counter these threats.

Our Approach

For Cyber Risk Management, our approach and methodology covers the better practice guidelines and standards relevant to the organisation including:

  • ISO 27001 Information technology — Security techniques — Information security management systems
  • ISO 27031 Information technology — Security techniques — Guidelines for information and communications technology readiness for business continuity
  • ISO 42001 Information technology — Artificial Intelligence Management Systems
  • ISO 38507 Information technology — Governance implications of the use of artificial intelligence by organisations
  • The Essential Eight from the Australian Cyber Security Centre (ACSC)
  • The National Institute of Standards and Technology (NIST) cyber security standards, guidelines, best practices
  • Cyber NSW Cyber Security Guidelines — Local Government
  • The Institute of Internal Auditors Cyber Security Topical Requirements
  • The Institute of Internal Auditors Third Party Management Topical Requirements

We also have extensive industry specific compliance experience relating to information security and risk management. For Australian Prudential Regulation Authority (APRA) regulated financial institutions, we ensure compliance with the designated risk management Prudential Standards and Guidelines:

  • CPS 234 Information Security
  • CPG 234 Information Security
  • CPS 230 Operation Risk Management
  • CPG 235 Managing Data Risks

Meet the Team

William Makdessi

William Makdessi

Cyber Risk | Education | Audit

William is a senior IT professional with over 15 years experience in cyber security across a broad range of industries, including insurance, local government, construction, and the public health sector. William is highly skilled in drafting frameworks, education and auditing.

Andy Chu

Andy Chu

Risk Technology | Strategy | Compliance

Andy brings over 13 years of consulting experience, His expertise and stakeholder engagement skills make him a trusted advisor for strategy-driven boards and executives.

Waresa Saiara

Waresa Saiara

risk | Cyber security | third party risks

Waresa is highly analytical auditor with extensive experience in financial and information security audit, leveraging technology such as Power BI to better represent audit data. Waresa pushes the needle on innovative ways to better communicate findings.

Case Studies

Real Results. Proven Impact.

From insurance and financial services to Local Government,  InConsult has helped boards, executives and Chief Information Security Officers strengthen governance, manage risk and build operational resilience in information security. Explore our client case studies to see how our practical, independent advice delivers measurable outcomes.

Cyber Risk Management Insights

New Third Party Requirements Reshaping Australia

On September 15th 2025, the Institute of Internal Auditors (IIA) issued the new Topical Requirements focused on strengthening consistency and quality of auditing the high-risk area of Third Party Management. As a new mandatory element of the IIA International Professional

Read More »
AI Governance

The AI Governance Maze: Navigating AI Risks and Chaos

Five years ago (mid-2020), the AI landscape was primarily dominated by “Narrow AI” models performing specific tasks like image classification, recommendation systems, and basic natural language processing. While foundational large language models like GPT-3 were being introduced (GPT-3 was released

Read More »
Ai governance

Essential AI Governance Documents to Build Trust in AI

As artificial intelligence (AI) becomes embedded in the operations of many organisations, effectively managing the associated risks is essential. Successful AI governance relies on a robust foundation of policies, plans, and documentation that address technical, operational, legal, and ethical dimensions.

Read More »

Would you like to know more about our Cyber Resilience services and capabilities?