To help guide organisations in choosing the right technologies to achieve the appropriate level of Essential Eight maturity, ASG Group have provided a collection of recommended vendor technologies mapped to each of the eight strategies.

Under its list of duties, the Australian Cyber Security Centre (ACSC) provides proactive advice and assistance to government, businesses, and communities, to help them improve the management of cyber risk. The ACSC cyber and information security programs and advice includes the Essential Eight mitigation strategies.

The Essential Eight, if done properly, allow an organisation to move through the prioritised strategies one by one, with the attributes of one, complementing the next, and the full package focusing on the evolving threat landscape and emphasising a whole-of-business activity.

If you’re just getting started on the Essential Eight, you’ll first need to identify your organisations current cyber security maturity level. You can find more information on that in our earlier blog, found here.

If you’re already on your way, we’ve compiled a list of recommended technologies mapped to each of the eight strategies that you might find useful.

You can download a copy using the form below.

RELATED INSIGHTS

CHOOSING THE RIGHT CYBER SECURITY PARTNER

Trusting a third party cyber security partner with your organisations most valuable assets – your IT infrastructure – isn’t a decision that should be taken lightly. On top of technical capability, there are lots of considerations you should take into account. We asked our National Capability Manager for Cyber Security what his advice would be […]

Read More

DIGITAL FOR MINING IN A CHANGING WORLD

Digital services in the mining industry were traditionally driven by occupational safety and the need to increase productivity and efficiency. Industry 4.0 has already resulted in the automation of many practices, introducing devices to capture and provide a real time view of operations. This resulted in organisations digitising their operational data and enabling faster machine […]

Read More

DETERMINING CYBER SECURITY SPEND: WHAT’S ENOUGH?

Cybercrime can affect businesses of all sizes in every sector. In our inherently digital world, it is no longer a question of “what if”, but “when?”   Still for many Australian businesses, defences fall short – a survey of 1400 global IT decision makers showed that 76 percent were hurt by their lack of cyber preparedness in […]

Read More