Skip to content
BISTEC IT Services

Pillar 3 — Managed Security

24/7 security operations. Named senior analysts. Evidence on tap.

Detection, response and CPS 234 evidence. Senior named analysts on the contract. Foundation / Defence / Resilience tiers, pricing on request.

The mid-market regulated-FS bind

You're on this page for one of two reasons. Either you're choosing a managed security partner against a written CPS 234 obligation and a board-risk committee timeline. Or something has happened — an alert, a near-miss, a peer's incident in the press, the credential-stuffing wave that hit pension/super funds in 2025 — and the question on your desk is who answers the phone at 2am Sunday, and what evidence will they leave on Monday morning.

Mid-market firms — banks, mutuals, pension/super funds, mid-tier insurers — sit in a difficult middle. Big-four banks have the budget for an in-house security operations centre. The very small end can survive on EDR and a retainer. The middle has to buy in 24/7 detection and response, plus the evidence chain regulators, the audit committee and the cyber insurer all want — without paying tier-1 consulting fees.

Most managed-security pages tell the same story: AI-powered, next-generation, intelligent, autonomous. We tell a different one.

Pratfall

We don't claim AI in security operations. Humans do this work.

This is the page where we say it plainly. The detection, the triage, the containment call, the customer phone call at 2am, the evidence summary the board sees on Friday — all of it is done by named human analysts. Our SIEM (Microsoft Sentinel) and EDR (SentinelOne, CrowdStrike, where it fits) ingest signal at machine scale. The decision about what to do next is made by a person whose name is on your contract.

We made this choice deliberately. The regulatory environment — CPS 234, CPS 230, Essential Eight, APRA's cyber stocktake, equivalent prudential frameworks elsewhere — increasingly asks for evidence of human accountability in the response chain. "The model decided" is not yet, and may never be, an acceptable answer to a regulator.

Our approach

Six elements that show up on every Defence and Resilience tier engagement.

  1. 01

    Senior named security analysts — accountable end-to-end

    Our security operations are staffed by senior named analysts. The lead is named on the contract. The P1 escalation path has a name at every step. Colombo engineering depth supports everything that isn't security — security work stays with senior named analysts.

  2. 02

    CPS 234 alignment — control-mapped and audit-ready

    We map your environment against CPS 234 §11, §13, §15 and §35. The mapping is documented, version-controlled and produced as an evidence pack quarterly (Foundation), monthly (Defence) or continuously plus board pack (Resilience). Auditor asks for a control-test report; it lands in their format, in their week.

  3. 03

    Essential Eight ML2 alignment — and the ML3 conversation when you're ready

    We baseline against ML1, design uplift to ML2, and run the program. Per-control adoption notes in your monthly report — patching, application control, MFA, admin privilege, daily backups, hardening, MS Office macro control, user-application hardening — each tracked at the actual maturity achieved, not the aspirational one.

  4. 04

    MITRE ATT&CK-mapped detection — the engineering layer

    Detection content is built and tuned against MITRE ATT&CK. We don't ship vendor-default rules and call it security operations. Every detection has a use case, a data source, an analyst owner, a tuning history, and a TP/FP rate reported quarterly.

  5. 05

    CREST-certified analysts and named lead

    The team includes CREST-certified analysts. Your account has a named lead — the person who phones at 3am, runs the post-incident review, writes the board update and presents at audit committee if asked.

  6. 06

    Foundation / Defence / Resilience — modular packaging, pricing on request

    We publish the packaging structure, not the prices. Pricing shapes to your environment — endpoint count, log volume, data sources, evidence cadence — and lives in scoped proposals. Few managed-security firms publish tiers transparently on the open web. We publish the structure because procurement teams reward it.

Foundation / Defence / Resilience

Three tiers. Pricing on request — shaped to your environment. Defence is the most common shape for regulated mid-market firms.

Foundation

Smaller regulated firms baselining a managed-security capability for the first time, or supplementing an in-house team's daytime coverage.

Coverage
Business hours, named analysts
Stack
EDR (SentinelOne) + log management baseline
Response SLA
4-hour acknowledge
Evidence cadence
Quarterly evidence pack
CPS 234
Mapped
Essential Eight
ML1 baseline + uplift roadmap
Named accountability
Yes — analyst-on-account

Pricing on request — shaped to your environment

Most common

Defence

Most mid-tier banks, mutuals, pension/super funds and insurers running a regulated entity. The right shape for the typical regulated mid-market firm.

Coverage
24/7/365
Stack
EDR + Microsoft Sentinel SIEM + threat-intel feeds + CyberArk PAM (where relevant)
Response SLA
30-min acknowledge / 1-hour containment for confirmed P1
Evidence cadence
Monthly evidence pack
CPS 234
Mapped + audit-ready (control-test reports produced)
Essential Eight
ML2 alignment + roadmap; uplift program included
Named accountability
Yes — named analyst on the contract

Pricing on request — shaped to your environment

Resilience

Firms with the highest CPS 234 / CPS 230 obligations, complex environments, or board-risk committees that want continuous evidence and dedicated human availability.

Coverage
24/7/365 + on-site analyst rotation where scoped
Stack
EDR + SIEM + UEBA + DLP + Imperva WAF + CyberArk PAM + Palo Alto integration (where relevant)
Response SLA
15-min acknowledge / 30-min containment for confirmed P1
Evidence cadence
Continuous + monthly board pack
CPS 234
Mapped + audit-ready + uplift-led (we drive the uplift program with your CRO)
Essential Eight
ML2 alignment + ML3 uplift program
Named accountability
Yes — named analyst + dedicated lead

Pricing on request — shaped to your environment

Tier names slot cleanly into RFP comparison tables. None are commodity. The visual emphasis on Defence is deliberate — it's the right level for most regulated mid-market firms.

Senior-led variant
Senior security with named accountability. Engineering depth from Colombo for everything that isn't security.

What's on the contract

  • Senior security operations
  • Named lead on contract
  • CREST-certified analysts
  • MITRE ATT&CK-mapped detection
  • CPS 234 (control-mapped)
  • CPS 230 alignment (in force 1 July 2025)
  • Essential Eight ML2
  • ISO 27001
  • Microsoft Sentinel partner
  • SentinelOne · Palo Alto · CrowdStrike · CyberArk · Imperva integrations
  • Privacy Act / NDB compliant

We picked the mid-market deliberately. Your named lead doesn't get reassigned to a Big-Four bank. Senior people stay on your most important issues — not the largest customer's. If you've watched your incumbent get acquired by a global firm, you know what we mean.

Sample evidence pack

Sample CPS 234 Evidence Pack

A redacted real-world sample of the monthly evidence pack we produce for a Defence-tier FS customer. CPS 234 control mapping (§11/§13/§15/§35), Essential Eight ML2 maturity with per-control notes, top detections of the period, P1 incident summary, patch posture, identity hygiene metrics, third-party status, and the audit-ready summary your CRO can take into a board meeting. The artefact, not a slide about it.

Frequently asked

  • Our security operations are staffed by senior named analysts. The lead on your contract is named and personally accountable for the response chain. Engineering depth from Colombo supports everything that isn't security — service desk, infrastructure build, project surge — but the security work itself stays with senior named analysts.

Talk to a security lead

Twenty minutes. Named accountability from the first call. Sample CPS 234 evidence pack on request.