Jul 22, 2025
2 min read
Introduction to Cyber Security
(#7 of 17)
In cybersecurity, the terms threats, vulnerabilities, and risks are sometimes used incorrectly and interchangeably, but they are distinct concepts. Understanding their relationship is fundamental to building an effective security program. Think of them as a logical chain: a threat exploits a vulnerability to create a risk.
Jul 15, 2025
3 min read
Introduction to Cyber Security
(#6 of 17)
Mapping the Essential Eight to the Information Security Manual (ISM) gives organisations a clear and actionable guide for implementing each security strategy at the desired maturity level. This mapping translates objectives into controls that aligns with priorities and obligations, ensures progress is measurable and outcome driven
Jul 13, 2025
3 min read
Introduction to Cyber Security
(#5 of 17)
The Essential Eight is a set of mitigation strategies from the Australian Cyber Security Centre that helps organisations build cyber resilience. The framework’s four maturity levels provide a progressive roadmap for implementing control strategies.
Jul 12, 2025
3 min read
Introduction to Cyber Security
(#4 of 17)
The Australian Signals Directorate (ASD) leads the nation’s cyber defence through the Essential Eight, the Information Security Manual, and the Cyber Incident Response Plan. Together with the Australian Cyber Security Centre, this guidance empowers organisations to strengthen defences, benchmark maturity, and contribute to Australia’s collective digital resilience.
Jul 11, 2025
3 min read
Introduction to Cyber Security
(#3 of 17)
Confidentiality, Integrity, and Availability is the foundation of cybersecurity. It ensures sensitive data remains private, accurate, and accessible to authorised users. Balancing these three elements strengthens resilience and tailors security priorities to the needs of an organisation.
Jul 10, 2025
6 min read
Introduction to Cyber Security
(#2 of 17)
Cybersecurity is a core business requirement built on analysing assets, threats, and risks. Using frameworks and maturity models, organisations align security with objectives and compliance. A proactive, structured approach ensures resilience, safeguards assets, and strengthens business continuity against evolving threats.
Jul 3, 2025
4 min read
Introduction to Cyber Security
(#1 of 17)
When introduced to cybersecurity after a career in industrial commissioning, I discovered it is less dramatic then Hollywood movies and more about structured processes, testing, documentation, and discipline. a commissioning and testing background proved surprisingly relevant, making cybersecurity familiar and less intimidating.
