Skip to content
About

Built around the operator. Not the audit committee.

Cyber Toolbox is a co-ordination platform for the team running incidents and exposures. Pre-built playbooks, a defensible activity log, and the kind of clarity you only appreciate at 02:00.

Philosophy

Why the platform looks the way it looks

The hard part of cyber response isn't writing the playbook — it's the seven open tabs, the chat thread, the spreadsheet, and the SharePoint that no one updates. Cyber Toolbox collapses that into one workspace.

Incidents and exposures share the same shell. The activity log is append-only. The playbook version is recorded against every case. The audit trail isn't a side-effect — it's the database.

01

Built around the operator.

A tired incident commander at 02:00 needs to find the next thing to do without thinking. Every UX decision is judged against that bar.

02

Co-ordination is the product.

The hard part of incident response isn't writing the playbook — it's the seven open tabs, the chat thread, the spreadsheet, and the SharePoint that no one updates. We collapse that into one workspace.

03

Tenancy you can't bypass.

Row-level security means the application can't leak data across tenants even with bugs. Every new table inherits the same uniform policy template.

Founder

Meet Christopher Lloyd

Christopher Lloyd, founder of Cyber Toolbox

Founder

Christopher Lloyd

Aotearoa New Zealand

Christopher is a cybersecurity practitioner with operational experience across the full incident lifecycle — from detection and triage through containment, recovery, and post-incident review. He's worked under the kind of pressure that puts theory aside: regulatory clocks ticking, stakeholders asking questions, decisions that have to land.

He started Cyber Toolbox because the tooling didn't fit the work. Teams were juggling spreadsheets, SharePoint, a chat channel, and a regulator's clock during the most consequential hours of their professional lives. Cyber Toolbox is the workspace he wished existed when the alert landed.

Now he builds and runs the platform from Aotearoa, working with security teams who take co-ordination seriously — teams that want a defensible record, a single source of truth, and a way to prove the programme is working. His approach is straightforward: co-ordination over heroics, defensible by design, outcomes over activity.

Values

What we stand for

Co-ordination over heroics

When the alert lands, the team that wins isn't the one with the best individual — it's the one with the best workspace. We build for the team, not the hero.

Defensible by design

Append-only logs, version-locked playbooks, RLS-enforced tenancy. The audit trail is the database — not a side-effect of it.

Symmetric workspaces

Incidents and exposures live in the same workspace shell. Operators running both shouldn't feel like they're using two products.

Outcomes over activity

Hours logged don't matter. A verifiable close, a defensible record and a credible trend line do. We measure what we ship.

Built in Aotearoa

Why New Zealand

Cyber Toolbox is built and operates from Aotearoa (New Zealand). We work with security teams across the region and globally — teams that expect integrity, pragmatism, and a workspace that respects their time.

Being remote-first means we ship fast and stay close to operators. The product improves because the people who use it tell us what hurt at 02:00.

We serve organisations that take security seriously. Teams that know that co-ordination matters more than the policy in the binder. Teams building real capability.

−40.9006° S, 174.8860° E

Ready to see Cyber Toolbox under load?

Book a 30-minute demo and we'll walk through the workspace — declaration to closure — using a real scenario.