
Measure and improve
your processesresponse
against cyber threats.
Measure and improve
your processesresponse
against cyber threats.
Gain a clear, evidence-based view of your organisation's cybersecurity.

Overview
Does your organisation meet New Zealand’s security requirements?
Our Security Maturity Assessment provides a clear, structured view of how your organisation’s security controls align with recognised New Zealand standards—and where improvements are needed.
Using our Security Assessment Maturity Tool, we assess your organisation across six critical cyber security domains:
- Governance
- Information Security
- Personnel Security
- Physical Security
- Cloud Security
- Threat Intelligence
Meet security standards
Our framework aligns with the New Zealand Information Security Manual (NZISM) and Protective Security Requirements (PSR), using an evidence-based methodology that focuses on identifying, prioritising, and addressing security risks.
The assessment also supports organisations that handle government information or contracts, and helps demonstrate alignment with key legislative requirements, including the Privacy Act 2020 and the Public Records Act 2005.

"Security isn’t just about compliance—it’s about building resilient organisations that can thrive in an increasingly complex threat landscape."
Murray Wills, GM Consulting
Our Maturity Assessment Service
We provide clear reporting and tailored guidance to help improve security.

Maturity Assessment
Reporting
Get a structured view of your organisation's security.
Our reporting helps you see where you meet requirements—and where attention is needed.

Report
Detailed Assessment Reports show your compliance levels within security domains.

Report
Gap Analyses highlight critical vulnerabilities, pinpointing areas that need to be addressed.

Report
Executive Summaries provide board-level reporting to your leadership.

Maturity Assessment
Guidance
Turn assessment findings into meaningful action with expert, evidence-based guidance.
We help you take practical steps—prioritised by risk, impact, and effort.

Guidance
Remediation Roadmaps, organised by risk levels, outline the way forward with actionable steps.

Guidance
Requirements Guides provide evidence-based practices for each of your security controls.

Guidance
Compliance Mapping helps to align with specific NZISM and PSR requirements.
Protect your assets and reputation.
Security starts with understanding where you are. Let us map the way forward.
Let's Chat
Why Liverton Security?
Our Security Assessment Questionnaire is more than a compliance exercise.
It provides a structured, evidence-based approach that helps organisations understand their current security maturity and make meaningful, sustained improvements.
Assessment questions are directly mapped to specific NZISM and PSR requirements, providing clarity and traceability.
Evidence-based requirements and clear implementation guidance help teams understand what’s needed and how to address gaps.
A structured pathway supports progression from baseline compliance to stronger, more mature security practices.
The assessment creates a solid foundation for continued security improvement and future advisory or consulting support.
Case Studies & Insights
Explore real-world examples and insights about organisational risks and security.

Bridging Directly To Continuous Maturity Assessments
As organisations change, security often drifts out of alignment. Continuous maturity assessment helps identify weakening controls, workarounds, and emerging risks early—before they turn into incidents. It provides a practical way to keep security relevant, effective, and aligned with how a business operates as it evolves.

Complexity of Security (Part 1)
Security doesn’t fail because people don’t care—it fails when it’s too complex. With organisations juggling dozens of security tools, confusion has become a hidden vulnerability. Cybersecurity expert, Andrew Johnston, explains how over-engineered systems and technical language drive people to bypass security, and why simplicity—not more controls—is the key to building security that actually works.

The Problem with One-Size-Fits-All Cybersecurity (Podcast)
Richard Bourne, Chief Executive of Liverton Security, joins the Hipther Podcast to discuss a critical topic in today’s cybersecurity landscape—Why One-Size Cybersecurity Doesn’t Work. Richard shares insights on the evolving nature of cyber threats, the importance of tailored security solutions, and how organisations can better protect themselves from emerging risks.