
Blacklight Security
Illuminate your security vulnerabilities
Reading Time: 10 min
Hey,

I'm Devon. I co-founded Blacklight to provide the highest quality of tailored, technical cybersecurity services to businesses of all sizes - from the 5 person family business to the 6,000 employee enterprise.
All our people are highly specialised in their respective domains from penetration testing and red teaming, to digital forensics, intelligence, and malware analysis, including myself. We are also all former or current Five Eyes military personnel, leveraging our experience in high stakes military environments to better inform our approach to securing the digital frontier.
Read through this brochure to get an idea of the what, why, and how of what we do. For our clients, we tailor every engagement according to your specific needs so you only get exactly what you need and nothing less.
Speak soon,
Devon Gregory
Director
Who we work with

Government
Departments

Tech
Companies

Law
Firms

Critical
Infrastructure

Military
Orgs
The State of Security

$4.8M
Average cost of a single data breach (USD) in 2024 according to IBM

$9.5T
Global cost of cyber crime annually (USD) - the words 3rd largest GDP according to Bloomberg

90%
Percentage by which businesses are underspending on cybersecurity uplift according to McKinsey & Co.
The Process
How we work with you to secure your business
SITREP

We'll conduct a situation report (SITREP) of your externally accessible digital assets leveraging vulnerability scans, dark web reconnaissance, and OSINT (open source intelligence) to get a read of your company's digital footprint and potential attack vectors.
This report will include a grade that ranks your security maturity and provides key recommendations for improvement.
Mission Order

Shortly after the debrief you will receive a roadmap for a 12 month schedule to uplift your security based on our findings and discussions. This will provide you with consistent security input across the year as well as access to a dedicated security consultant at all times. You will further be provided with an incident hotline to call in the event of any breaches, for which you will have 24 / 7 / 365 access to one of our security consultants.
Debrief

We'll then schedule a debrief to discuss the findings with you and clear up any questions you may have. This will also be time where we will provide a high level discussion regarding security uplift for your organisation, with specificity around suggested engagements and timeframes.
Deployment

If you are happy with our proposed uplift plan, we will get to work right away, conducting gap analyses, pentesting, and providing on site training where required.
You'll be kept up to speed with our activities every step of the way and will receive a monthly progress update for the duration of the 12 months. Maintenance thereafter as well as further uplift will then be discussed nearing the end of the 12 months, for which renewal will be optional.
Service Catalogue
Our offerings

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly