Assurance Services.
Internal Audit Services
We specialise in the provision of internal audit services to government organisations, providing the full suite of internal audit and support services (such as strategic planning, maturity assessments, quality assurance improvement plans and recommendations monitoring). Our expert auditors provide independent and objective evaluations, ensuring that internal controls are robust, risks are mitigated, and operations are aligned with strategic objectives.
Fraud & Corruption Control
Safeguard your organisation against fraud and corruption with our specialised services. We can assist agencies in identifying and understanding risks through Fraud Risk Assessments, design or review of Fraud Control Plans in accordance with Commonwealth requirements – and generally provide advice on the implementation of control measures to ensure the integrity of your operations. We have advised agencies in the implementation of integrity frameworks and controls, and can support maturity assessments against the Commonwealth Integrity Maturity Framework.
Information Security
We can support the safeguarding of your valuable information assets – provide advice and support in respect of privacy, records management and access control. Through these approaches, we help to ensure the confidentiality and integrity of your data. Our consultants have applied the Privacy Act 1988 (Privacy Act) including the 13 Australian Privacy Principles to assess whether Australian Government agencies processes and systems are able to handle personal information.
Project Assurance
Our Project Assurance services help to ensure the success of strategic projects and programs. We offer a structured approach to project management, conducting thorough assessments to identify and address potential risks and challenges – and overall provide confidence that projects will be delivered within time, scope and budget.
Quality Assurance
We can support the implementation of quality assurance frameworks tailored for different situations, including quality assurance in relation to large systems implementations and assurance frameworks supporting key business processes. We apply the Quality Management Systems applying the AS/NZS ISO 9001:2016 standard in assessing quality frameworks. Our consultants are able to identify and highlight the effectiveness of key activities to provide assurance that critical aspects of the quality framework are operating effectively.
​
Cyber Security Assessments
Our certified assurance professionals can conduct comprehensive evaluations of your IT infrastructure, identify vulnerabilities, and provide strategic recommendations to strengthen your defences against cyber risks. We have certified Infosec Registered Assessors Program (IRAP) practitioners who can provide security assessments to support the certification and accreditation of systems and networks.
Forensic Audit & Investigations
Our experience practitioners are qualified as either Certified Practicing Accountants (CPA) or Chartered Accountants (CA) and can support the conduct of detailed examinations and investigations to detect and prevent fraud, financial irregularities, and misconduct. With the use of specialised software, our team is able to streamline and automate our approach.
ICT Assurance
Secure the reliability of your Information and Communication Technology (ICT) systems with our ICT Assurance services. We can assess the effectiveness of your technology infrastructure, identify vulnerabilities, and provide recommendations to enhance performance and security. Our team is experienced in implementing and assessing against a range of frameworks including the Australian Government Information Security Manual (ISM), Control Objectives for Information Technologies (COBIT), and the Protective Security Policy Framework (PSPF).
​
Penetration Testing
Our penetration testing services involve the application of ‘ethical hackers’ to simulate real-work cyber attacks to uncover vulnerabilities from malicious actors, enabling you to focus your efforts and defences to protect digital assets from unacceptable risk. Using industry leading practices, we perform a high-level assessment of the system design and configuration, security controls in conjunction with relevant information gathered as part of the firewall, router, and switch configuration assessment.