MELBOURNE · MUNICH
For CISOs, boards and executives · imagine what your cyber security team could become

Epoch KI

KÜNSTLICHE INTELLIGENZ

Your board is asking three questions.

What is our exposure?

Are we working on the right things?

Is what we're doing actually reducing risk?

Your tools see fragments.
Epoch KI sees the whole story.

We help you answer all three — and anything else your board puts on the table.

Not by adding another tool. By making sense of what you already have, your tools, your data, your organisational context.

We help you imagine what's possible. Then we bring it to life, in your environment, for your team.

DATA · INSIGHT · ACTION · REPORT

Same team. Different era.

The fixed point where your security team becomes what it needs to be.

CONTINUE
WHAT BECOMES POSSIBLE

Imagine if…

Nine examples. Nine domains. Infinite possibilities. We don't sell a platform … we help you imagine what your security team could do differently, then build it with you using the tools and data you already own.

Board communication

Imagine if your board could see decisions to approve — not findings to interpret.

GRC & compliance

Imagine if compliance wasn't a point-in-time event — but a continuous, live posture.

Threat & response

Imagine if every threat came with two or three response options — each with its financial consequence calculated.

Vulnerability & risk

Imagine if your 13,000 findings were reduced to 5 decisions — ranked by what actually matters to your business.

Identity & access

Imagine if toxic combinations — admin access, no MFA, unpatched host, critical data — were flagged the moment they formed.

Team capacity

Imagine if your team of 5 operated like a team of 50 — without a single additional hire.

OT, CI & operations

Imagine if your OT and IT environments were visible in a single risk view — not managed in separate silos.

Budget & vendor

Imagine if you could prove the ROI of every security tool you're running — and cut the ones that aren't reducing actual risk.

The bigger picture

Imagine if the question “are we secure?” had a real answer — not a qualified, caveated, it-depends response.

Imagine if you didn't have to imagine any of this anymore.

The full library · 55 prompts across 9 domains →
THE VALUE CHAIN

One engine. Four steps.

What your 15 tools already produce — turned into what your board can act on.

DATA INSIGHT ACTION REPORT
I.
DATA

Your 15 tools already produce it

We do not replace them. We read — read-only, under your NDA — from Wiz, CrowdStrike, Splunk, Tenable, Okta, and the eleven others you already paid for.

II.
INSIGHT

Signals reconciled, exposure quantified

Denominators aligned. Ontology mapped. Controls matched to frameworks your board actually cares about — Essential Eight, CPS 234, SOCI CIRMP, ISO 27001, NIS2. What fifteen fragments cannot say, one fabric can.

III.
ACTION

Ranked. Sequenced. Owned.

Ranked by quantified impact, sequenced by dependency, each one owner-assigned and budget-costed. Monday morning your team knows what moves and why.

IV.
REPORT

Six pages. Every number sourced.

Board brief. Risk P&L in AUD. Compliance evidence. Pentest-to-proof. Every report audit-defensible, every assumption named. A file your CFO can act on by Wednesday.

0
HOURS
from NDA signed to board-ready report
0
TOOLS, ONE FABRIC
SIEM · EDR · CSPM · VM · IAM · CASB — read-only
0
OUTCOMES ON SLA
board pack · risk in AUD · pentest-to-proof · M&A DD · CIRMP · prototype
DATA · before
BEFORE

Fifteen tools. Fragmented views.
Board questions no one could answer.

  • Manual reporting cycles · stale by the time they print
  • Reactive posture · every incident starts from zero
  • Quantified exposure · a promise, not an output
REPORT · after
AFTER

One operating picture. Quantified exposure.
Decisive action.

  • Unified intelligence across every tool you already own
  • Risk in AUD · not in CVSS scores
  • Board brief · audit trail · operating picture — one source
WHAT YOU RECEIVE · ILLUSTRATIVE REPORT

The intelligence brief. Delivered by hour 48.

Illustrative composite · not drawn from any one client · numbers rounded

TLP · AMBER · ILLUSTRATIVE CONFIDENCE · HIGH

Quarterly Security Posture Brief

Sources · 15 commercial tools · multi-year signal baseline · framework mappings
HIGH Identity is a governance problem, not a tooling gap CONFIRMED

Identity governance reports healthy coverage; measured coverage across the five-platform estate is materially lower. Authentication hygiene carries the domain score — strip it and central governance drops toward single digits. The fix is naming a single accountable owner across platforms, not more technology.

Sources · Identity team · Authentication · Remote access
HIGH Monitoring lift reflects methodology, not new capability RATIFICATION REQUIRED

Double-digit uplift on the monitoring domain this quarter comes from recognising endpoint detection as server monitoring evidence — no new deployment, no new control. Committee ratification is required to prevent the delta being misread as delivered coverage.

Sources · SOC · CISO decision record
HIGH Server estate accountability is the binding constraint CONFIRMED

A minority of servers in the estate carry named operational ownership. The remainder is post-transformation governance residue. No patching cadence closes a structural accountability gap — the ownership map is the prerequisite, not the output.

Sources · Technology operations · Asset inventory
COVERAGE
68%
PROCESS MATURITY
L2.8 / 5
POSTURE SCORE
6.2 / 10
PEER BAND
2nd quartile
RECOMMENDED ACTIONS
  1. Name the accountable identity-governance owner across all platforms — not additional tooling
  2. Server estate ownership map · raise Linux endpoint detection to target band
  3. Ratify the methodology shift explicitly at board level — do not absorb as a footnote
— Epoch KI · Delivered in 48 hours — ILLUSTRATIVE COMPOSITE · NO CLIENT DATA
FOUR WAYS TO START

Pick the entry point that fits this quarter.

Start small with a monthly subscription, or run the 48-hour prototype as a fixed-fee one-off. Per-outcome pricing for larger engagements is below.

Foundations
A$3–4k / month

GRC posture · weekly updates · monthly board report

Expand
A$6–8k / month

Foundations + vulnerability management · identity risk

Transform
A$10–15k / month

All domains · advisory · board presentation

48-hr Prototype
A$40k one-off

Full output · keep regardless · no procurement cycle

SIX OUTCOMES · ONE SLA · YOUR PICK

Outcomes, not subscriptions.

We sell the work, not the tool. Each lane has a named partner, a price, and a published success criterion. No per-seat. No per-token. No procurement theatre.

BOARD PACK
● LIVE
A$240K / year
Alex Chen · CISO Advisor

Six-page quarterly board brief. Every number sourced. Audit-defensible. Translation layer from CISO to Chair.

DISPLACES Big 4 board advisory · internal board prep
RISK IN AUD
● LIVE
A$300K / year
James Park · Risk Analyst

Quantified exposure against ISO 27001, NIS2, CPS 234, SOCI CIRMP. Monte Carlo curve. Scenario ladder. CFO-native language.

DISPLACES GRC consultants · internal FAIR modelling
PENTEST-TO-PROOF
● LIVE
A$150K / quarter
Peter Walsh · SOC Lead

Continuous pentest on rotation. Every finding triaged, remediation tracked, evidence file in board format.

DISPLACES Mandiant retainer · Bishop Fox engagements
M&A CYBER DD
◐ 2 days
A$50-120K / deal
James Park · Risk Analyst

Target-company posture scored in 48 hours. Deal-breaker risks surfaced. Integration cost modelled.

DISPLACES Big 4 cyber due-diligence
CIRMP ALWAYS-ON
◐ 3 days
A$360-540K / year
Maria Santos · CI Officer

SOCI / CIRMP / IEC 62443 programme. Always-on evidence collection. Regulator-ready on request.

DISPLACES SOCI advisor + MSSP combined
48-HOUR PROTOTYPE
● LIVE
A$40K one-off
Alex Chen · CISO Advisor

Enter any lane above. Your data, our fabric, 48 hours. You keep the report whether or not we continue.

DISPLACES Vendor POC cycles
EXPOSURE · FAIR METHODOLOGY · ILLUSTRATIVE

Quantified exposure. In the language your CFO reads.

Loss-distribution curve for an Australian financial services composite · Monte Carlo simulation, 10,000 iterations, Poisson × Lognormal · annualised in AUD.

A$0 A$15M A$50M A$100M A$160M A$320M MEDIAN A$14M EXPECTED A$20M P90 STRESS A$83M P99 TAIL A$237M
EXPECTED
A$20M
annual loss (mean)
MEDIAN
A$14M
P50 annualised
STRESS
A$83M
P90 annualised
TAIL
A$237M
P99 worst-case

Illustrative composite. Real client output is specific to their asset base, threat model, and control inventory.

THE FIRM · FIVE PARTNERS · ONE FABRIC

AI-augmented human operators. Signed on the work you sign for.

Not chatbots. Not "agents." Five named partners, each specialised, each backed by the fabric. You talk to them. They sign the report.

Epoch KI uses named AI agent personas, each specialised by domain, operated and overseen by our founding team.

AC
01

Alex Chen

CISO Advisor

Board strategy · operating picture · executive translation

JP
02

James Park

Risk Analyst

FAIR quantification · Risk P&L · CFO-grade modelling

PW
03

Peter Walsh

SOC Lead

Pentest-to-proof · incident response · detection engineering

SN
04

Sarah Nguyen

Compliance Officer

CPS 234 · Essential Eight · SOCI CIRMP · ISO 27001 · NIS2 · regulator language

MS
05

Maria Santos

CI Officer

SOCI · IEC 62443 · critical infrastructure · OT / SCADA

THE 48-HOUR PROTOTYPE · NOT A POC

Two days. Your data. A report you keep.

We do not run POCs. POC is theatre — a word vendors use to dress up a free trial for procurement. We build a working prototype on your data in 48 hours. If the output is not board-ready, you owe us nothing. You keep the report either way.

Our 48-hour prototype uses your actual data from day one. No synthetic demos. No vendor theatre. You see what your environment actually looks like — then decide.

See the hour-by-hour walk-through →
48 HOURS TO REPORT
ENGINEERING RECEIPTS
15
TOOL CONNECTORS
SIEM · EDR · CSPM · VM · IAM · CASB · API-verified
5y
SIGNAL BASELINE
multi-year telemetry reconciled to published benchmarks
7
FRAMEWORKS
Essential Eight · CPS 234 · SOCI CIRMP · ISO 27001 · NIS2 · IEC 62443 · FAIR
48h
FIRST REPORT
from NDA signed to board-ready output

Engineered in Munich · delivered in Melbourne · client names on request under NDA

Ready to see your data through Epoch KI?

Send your tool exports to hello@epochki.com and we'll have a board-ready report back to you within 48 hours.

hello@epochki.com

Or contact Mark Jones directly — mark@epochki.com · book a call: calendly.com/alexandre-medarov-epochki