Mature your cyber security and be privacy compliant

From one of the first organisations in Australia to achieve ISO 27001:2022

We help businesses uplift their cyber security with Australia’s Privacy Act front of mind.

ISO 27001 Certification
cyber essentials certification
IASME cyber assurance certification

The MyEmpire Group difference

"We’re big enough to support all manner of businesses, from ma and pa’s to enterprise, but small enough to still obsess over detail."

We don’t obsess over detail to the point of paralysis, but we do take great pride in delivering exceptional work. And it’s not just because we get a thrill receiving elated client feedback, although that’s something we all share in common. Primarily it’s because we genuinely care about building cyber security systems that protect businesses. That means really learning your business and your people so we can develop a cyber security strategy suited to you, not a close-enough template pulled from a file. That’s what makes us different; we only feel satisfied when we know a job’s been done right. 

"The biggest benefit to working with MyEmpire Group is having access to cyber expertise on an as-needed basis. We're able to access skills and knowledge across a broad range of [cyber security] areas, and without having to hire in-house."
Jenelle Schultz
Chief Operating Officer, Business Fitness
"The MyEmpire Group team’s technical understanding of Essential 8 and ability to cut through all the techno-speak and explain things to us in layman's terms made the process so much more streamlined."
Lisa Saunders
Group Executive – Governance Risk & Compliance, REI Superannuation

Our People

Our cyber security specialists are a mixture of seasoned veterans, many with 30+ years’ experience in IT, management and security. We also have young faces on the team, our rising stars–those whose talents we recognised early and chose to invest in. 

Beyond being experts in their fields, our people share a few things in common, a result of how we hire. Prior to any skills being tested in an interview, we look for personable people. Authentic, honest people who are passionate about their field and good communicators. In other words, we look for people who light up when they talk about their line of work. People whose passion is contagious. Only candidates who meet this criteria are taken through the typical interview steps where we probe skills and work history.

ISO 27001

Leadership Team

Alex Woerndle, MyEmpire Group

Alex Woerndle


Alex is an experienced director, IT consultant and infosec professional. He provides security management and leadership to a range of organisations from start-ups through to governments and ASX50 listed enterprises. He has also served over 10 years in voluntary roles as a Non-Executive Director of the Australian Information Security Association,.au Domain Administration Ltd and the Australian Conservation Foundation’s Finance, Audit and Risk Committee.

Carl Woerndle


Carl has more than three decades’ experience in IT, security and business leadership. Prior to MyEmpire Group, he and Alex built DistributeIT which held approx. 10% market share of domains. As well as a business owner and manager, Carl has worked as a Cyber Security Advisor consultant for Deloitte. He is a regular keynote speaker on cyber security.

Chris Self


Chris is a highly experienced information security principal. He has worked as a senior cyber security consultant for KPMG, CQR Consulting (now part of CyberCX) and Deloitte. Prior to starting with MyEmpire Group, he was the Information Security Manager at Adelaide Airport where he led a full rebuild of the airport’s cyber security processes and infrastructure. Chris holds a master’s in information systems security and a number of information security certifications, including CISSP and CRISC.

Talk to a Cyber Security Specialist

Let us help mature your cyber security while ensuring you meet your privacy responsibilities.

We have cyber security specialists on our team who are experts on Australian privacy obligations and the responsibilities of organisations to meet privacy compliance.

Meet Australian privacy compliance standards

We embed privacy into every cyber security uplift we take with an organisation. We call it a privacy-by-design approach to security. Our experts ensure you are meeting your privacy obligations while simultaneously building a robust and practical cyber security strategy. After all, you can’t have privacy without good security.

Cyber security gap assessment Cyber security specialists

Protect personal information and make it accessible

As well as putting security controls in place to protect against breaches of personal information, we can also help ensure information is accessible to individuals when they want it and that it this information is complete and up-to-date. These are all requirements under Australia’s Privacy Act.

Improve your operational management of privacy

We help with documentation, e.g. updating your privacy policy to ensure privacy compliance. We can also help to design and implement a privacy management strategy to manage the personal information you process through your organisation and supply chain. This helps streamline your operational efficiency while uplifting your security.

Security of Critical Infrastructure (SOCI)

Build a reputation for protecting user information

Maturing your cyber security not only helps protect data and privacy, but also the greater reputation of your organisation. Individuals need to know they can trust a brand to protect their information in order to even consider becoming a customer. We help ensure you have the processes and controls in place to properly protect your user’s information. More brand trust equals more business opportunities.

Training to embed privacy into your organisation's culture

A big part of meeting your privacy obligations is ensuring everyone in your organisation understands what their role is in privacy maintenance, aka what they need to do to meet Privacy Act obligations for your organisation. Everyone has at least a small role to play and training is needed to get everyone on the same page. We offer in-person and online training, ranging from low-key training on new security procedures to in-depth security presentations for Boards, management teams etc.

Cyber security gap assessment

Mature your cyber security and the way your organisation manages privacy

We can help...

  • Review your privacy processes, policies and notices
  • Define roles and responsibilities
  • Conduct Privacy Impact Assessments (AU)
  • Create/review a clearly expressed Privacy Policy (external legal advice is needed to assist with this)
  • Implement risk management processes to identify, assess and manage privacy risks across your organisation
  • Develop and maintain processes for handling PI (personal information) across its lifecycle
  • Set up processes for receiving and responding to privacy enquiries and complaints
  • Establish processes to allow individuals to quickly and easily access and correct their personal information
  • Create a Data Breach Response Plan
  • Document compliance with privacy obligations, including privacy process reviews, breaches and complaints
  • Create channels for staff and customers to provide feedback on privacy processes
  • Stay on top of developments in privacy law
  • Monitor and address new security risks and threats 
  • Train staff on privacy obligations
  • Integrate privacy training into inductions
  • Guide a privacy-wise company culture.

Talk to a cyber security expert today