Cyber security procurement

Slot game Find out how to procure cyber security services for Victorian Government departments and agencies.

e-Services: Cyber security and associated services

The Department of Premier and Cabinet manages the for the Victorian Government. Registered suppliers offer cyber security services in the following categories.

Email for more information about the following services.

Cyber security general consultation

  • stakeholder mapping including needs and risks
  • - implementation and assessment
  • information asset discovery and classification including critical asset
  • strategy, policies, procedures and guidelines
  • strategy development
  • configuration/security architecture assessment, design and implementation

Security audits

  • third party management including risk assessments and audit
  • threat and risk assessments
  • (note must have staff with Australian Signals Directorate accreditation)

Other specialist advice

  • Information and Communications Technology (ICT) and cyber legal advice
  • Supervisory Control and Data Acquisition and Industrial Control System security consulting

Cyber human behaviour

  • culture surveys
  • training and awareness

Security testing

  • social engineering testing including phishing testing
  • vulnerability assessment services
  • Red team services
  • disaster recovery testing

Technical security services

  • anti-malware
  • denial of service protection

Monitoring services

  • Security Information and Event Management (SIEM) and anomaly detection
  • Security Operation Centre (SOC)
  • Hunt and CERT services
  • threat intelligence

Security incident and Data breach management

  • forensic analysis services
  • incident management training and event simulation
  • incident management procedures
  • incident management services

Dimension Data contract

Slot gameDPC has a contract with for the following services:

  • real-time threat management as a service
  • security assessment services
  • managed application delivery services
  • dedicated firewalls
  • dedicated Intrusion Prevention System (IPS)
  • rogue device management
  • tenable IO
  • cloud discovery and analytics services
  • proofpoint managed security services
  • Targeted Attack Protection (TAP)
  • Proofpoint encryption (SaaS-powered, policy-based email encryption; Adapter access license required to connect Proofpoint to third-party encryption tools)
  • TAP mobile defence (AirWatch or MobileIron)
  • email Data Leak Prevention (DLP), including regulatory compliance, digital asset security
  • Data Discover (information governance)
  • Secure Share (cloud-based secure file sharing)
  • Email Fraud Defence
  • Web application firewall (WAF and DDoS)
  • Imperva DNS
  • vulnerability management service options

To find out if your agency is eligible to purchase services from this contract, please email:

Reviewed 12 November 2019

Contact the Chief Information Security Officer

Department of Premier and Cabinet

Was this page helpful?