

Our Strategy and Planning services work with customers across all industries facing unique challenges. We cater for organisations operating in heavily regulation environments, national security, critical infrastructure and across the full spectrum of maturity.
Our team possess decades of experience on both the customer and supplier side, so we understand the value of partnerships. We take the time to truly understand how our customers operate, their challenges, strengths, weaknesses and opportunities. As a result, we provide tailored outcomes which are:
Quantifiable: Demonstrating return on investment
Achievable: Within the constraints of the customers capability and resources
Aligned: Linked to overarching strategies, mandates and objectives
Personal: Designed to meet the specific demands of our customers
Our Expertise
Our experienced team specialise in delivering a wide range of services which set our customers on the right path.
- Security Strategy
- Capability Maturity
- Security Governance
- Security Program Design
- Security Workforce Assessment
- Community of Practice Development
We use industry recongised frameworks, models and methods and apply these based on individual requirement.
- National Institute of Standards and Technology (NIST)
- Control Objectives for Information Technology (COBIT)
- Center for Internet Security (CIS)
- Cloud Security Alliance (CSA)
- Information Security Manual (ISM)
- Protective Security Policy Framework (PSPF)
- Capability Maturity Model (CMM)


Security Awareness and Training
Identity and Access Management
Monitoring Unusual and Privileged Access
Threat and Vulnerability Management
Data Loss Prevention
Emerging Technology and Threats
IT Related Controls

Cyber Program Uplift
A methodical and tested approach to enhancing organisational maturity
We provide maturity assessments and critical advice across entire organisations or selected capabilities, for example security operations, architecture, vendor management, governance and research and development. These are typically a strong starting point for customers to baseline their current operations and pivot towards achieving target objectives within their security program.
Our delivery methodology is driven by transparent communication with senior leadership, middle management, operational specialists, and a nuanced understanding of enterprise risk. Akela provides actionable insights that can drive progression to a desired future state. Key outputs from a Cyber Maturity Assessment include.
Capability Framework Development
Demand & Supply Analysis
Gap Analysis
A cyber maturity assessment is also a valuable exercise to run at set intervals to test results of an uplift program.
