Independent Cyber Security Consulting

Scared about cyber? Relax.

Many firms fearmonger to sell unnecessary services. We conduct independent, objective reviews — evaluating real value and real risk to determine a justified investment for protection.

Get in touch
Scroll
Methodology

How we get you to your Version 1.

01

Pre-flight

Each business is unique. We identify your most critical infrastructure and evaluate it against a threat matrix to determine what needs attention first.

02

Plan

We develop a tactical roadmap using mathematical models and risk analysis formulas, ensuring the right systems receive optimal protection at the right cost.

03

Review

Security is continuous. We conduct quarterly reviews to ensure compliance with project commitments and adapt to changes in threats or business needs.

Real numbers. Not just a finger in the wind.

Optimising IT security budgets is challenging. Our V1.0 methodology emphasises critical risk analysis for efficient risk management.

As independent consultants, we prioritise needs and resilience — avoiding upselling and conflicts of interest common with some virtual CISOs at MSPs.

Risk analysis and planning
Core Values

Integrity first.

Integrity

The cornerstone of our practice. We foster trust from the inception of every relationship through honesty, transparency, and ethical behaviour.

Accountability

We accomplish what we planned and what we said we'd do. We take personal responsibility for our work — so you can count on us to deliver.

Simplicity

Technology can be technical. We break down projects for different audiences in your business to ensure everybody is on the same page, top down and bottom up.

Security infrastructure
Jack Waterhouse
Role Cybersecurity Strategist Experience 10+ years in IT Security
CISSP PMP

Jack Waterhouse

Jack is a Cybersecurity Strategist with over ten years of experience specialising in the management and execution of large-scale IT security projects, having spent over half of his career in IT management roles.

He has excelled in mitigating security challenges for major organisations due to his deep understanding of executive constraints — recognising that leaders, despite best intentions, often lack the time to delve deeply into IT security matters.

His focus is on fortifying organisations against cyber threats, ensuring the confidentiality, integrity, and availability of critical assets. By addressing security pain points comprehensively, he allows leaders to focus on core business objectives, assured that their IT environment is secure and resilient.

Testimonials

What clients say.

Jack introduced us to the concept of minimal viable security measures, allowing us to strengthen our defenses progressively and efficiently.

Miriam Chief Information Officer, Department of Defence

Jack's expertise in cyber budgets transformed our budget planning. His costing forecast helped us allocate funds. We maintained a stringent cyber budget.

Madeleine Senior Legal Counsel

The V1.0 methodology Jack introduced was brilliant. With his guidance, we refined our Managed Services, ensuring enhanced security for our apps.

Peter Application Services & DevOps, Red Hat
Get in touch

Time to get IT security off your plate?

Email contact@v1.au Phone +61 3 8828 7337