
Baidam and AUSCERT sign 12-month cyber pact on threat sharing
Baidam and AUSCERT have signed a 12-month pact covering threat intelligence, incident response, phishing takedowns and training for Australian organisations.

Baidam has signed a 12-month memorandum of understanding with AUSCERT, locking in a partnership on threat-intelligence sharing, incident-response support, phishing takedowns, training and joint events. Phishing, fraud and incident-response demand remain elevated across the Australian market.
The framework covers five workstreams: threat intelligence, incident response, phishing takedowns, cyber education and joint events, Australian Cyber Security Magazine reported. AUSCERT has operated for more than 30 years and serves more than 500 member organisations. Baidam is pitching the tie-up as a way to connect specialist delivery with an established national response network.
For local security teams the practical question is access, not branding. Many Australian organisations still buy cyber help in pieces — an external responder on call, phishing disruption from one supplier, staff training from another, threat briefings from a third. A single arrangement that joins those jobs up is easier to explain to budget holders.
The two groups are not new to each other. An AUSCERT archive page for a 2019 NAIDOC Week event shows the relationship goes back several years. Security Solutions Media reported the memorandum formalises collaboration that was already operating in practice. Plenty of cybersecurity alliances stop at co-branded marketing; this one lands on defined operational areas.
Baidam chief executive Beau Hodge told SecurityBrief Australia the company sees technology as most effective when tied to people and purpose. Strip away the quote and the scope around it is what matters: threat sharing, response support and training are the lines Australian organisations buy when they need help with active risk. The trade reports did not disclose financial terms, customer numbers or service-level commitments.
Why the agreement matters
Buyers typically procure the functions this deal bundles as separate contracts. Threat intelligence tells defenders what to watch. Incident response helps after something has gone wrong. Phishing takedowns limit brand abuse. Training is the long-tail work of changing staff behaviour. A formal link between a services provider and a response body that has been running for three decades suggests local customers want those functions stitched together, particularly as lean internal teams face more fraud and cyber extortion.
Dr David Stockdale, AUSCERT’s general manager, told Security Solutions Media that Baidam had “gave before they took” — a phrase he used to describe trust built through the earlier relationship. The public statements stayed on community, resilience and collaboration. Whether the five workstreams turn into repeatable services is the test that counts.
A memorandum is straightforward to sign. Outputs are harder. Local customers will watch whether threat briefings arrive fast enough to act on, whether phishing takedowns actually reduce scam exposure, and whether the training is more useful than a set of generic awareness slides. The agreement does not rewrite Australian cyber law or impose new reporting rules. It does add a layer of coordination to the incident-response and threat-intelligence ecosystem.
For CISOs and IT managers at smaller organisations that rely on outside help, the near-term question is practical: does the Baidam–AUSCERT partnership produce faster phishing disruption, clearer threat briefings and useful training on business-email compromise, executive impersonation and supplier invoice fraud? Or is it another memorandum in a crowded market?
Reza Khalil
Cybersecurity reporter covering breaches, threat intel, and the ACSC beat. Former incident responder. Reports from Canberra.


