data availability
Governance, Risk & Compliance

Leading Edge Information Pty Ltd, established in 1985 is a leading IT provider specialising in managed services with a primary focus on information security & data availability.
In addition to this we also assist in the area of Governance, Risk and Compliance and can offer these services in a cost effective, quick and easy manner.

Our reputation as a trusted partner allows your business to focus on your objectives as we deliver a range of solutions including the supply of licensing & hardware infrastructure, deployment & dedicated support via our certified staff.

Leading Edge Information is a business dedicated to helping organizations save time, mitigate risks and reducing capital & operational costs.

Our goal is to be Your Partner in Success!


Dominik Schroder.jpg


Leading Edge Information's complete portfolio of security vendors help businesses fight cybercrime, protect data and reduce security risk.

With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, we enable businesses to transform the way they manage their information security and compliance programs.

data availability

We provide storage solutions for on-premise & cloud that is
reliable & economical for data big and small.

In the cloud we deliver secure, durable, highly-scalable object storage.
Our cloud offerings are easy to use, with a simple web service interface to store and retrieve
any amount of data from anywhere on the web.
Best of all, you pay only for the storage you actually use.

When it comes to Disaster Recovery we help you backup fast and recover faster.
The reliability of our end-to-end business continuity solutions give you the confidence you need to
deliver best-in-class backup and disaster recovery.
Whether you’re running a small home office or managing a large IT department, our Recover-Ability
Solutions will provide you with the tools you need to keep disasters at bay.

Governance, Risk & Compliance

Although the classical organisation chart peaks with the chief executive who is actively involved in the governance of the incorporated entity, corporate governance mainly belongs to the Board of Directors. Since governance is distinctly different from management, the questions of how to separate the two activities and what should belong where arises.

While corporate governance is a complex and important area of the incorporated entity, it can be summed up using two simple terms:

Due Care. Due Diligence.

Board of Directors and executive management involved in the governance of the organisation need to ask the following two main questions in relation to the above terms:

What responsibility does my organisation have for protecting information, particularly information that belongs to others?
What responsibility does my organisation have to keep its information systems from being used to harm others?

In light of such questions it can be suggested that due care involves the establishment of information security controls, while due diligence involves the maintenance of such controls.

Leading Edge Information can provide comprehensive answers to the above questions using a systematic approach to address the governance concerns of Board of Directors and senior management relating to information security, risk and business continuity.

We also offer information security management solutions in framework format, including information security strategy, risk management, information security architecture, etc.
Our frameworks are based on international standards and best practice.


At Leading Edge Information we are not bound to any one particular vendor over another.
Instead, we work with "best of breed" vendors that cover the entire scope of your IT requirements.
We provide several types of on-demand, scalable computing resources.
Our virtualization options give you the flexibility of virtualization without having to
buy and maintain the physical hardware that runs the virtual machine.


Our support options help you manage costs, reduce risk, increase
flexibility and realise operational efficiencies.
We provide a highly personalized level of service for customers seeking technical help & the
flexibility to work with you on isolated incidents through to the outsourcing
of your entire IT infrastructure.

Decollatura, Italy.jpg




I am often asked what information security framework I use. Well, there are plenty to choose from. Many of them are excellent and some are even useful. New frameworks are developed quite often. Some are simply rebadging an old one, calling it “cyber”. Others have plenty of thought put into it and are quite valuable.

Read more here.



A non-vendor specific guide, the Australian Signals Directorate's (ASD) Strategies to Mitigate Cyber Security Incidents is a prioritised list of practical actions organisations can take to make their computers more secure.
The advantage of this guidance is that it is customisable to each organisation based on their risk profile and the threats they are most concerned about.

Read more here.

GDPR (General Data Protection Regulation)

Elizabeth Denham, the information commissioner in charge of data protection enforcement, says she is frustrated by the amount of "scaremongering" around the potential impact of the GDPR for businesses.
We agree. Here instead is the OAIC's guide to "Australian businesses and the EU General Data Protection Regulation" and if you have any questions, come and ask us.