Jul 3, 2025
4 min read
Introduction to Cyber Security
(#1 of 17)
When introduced to cybersecurity after a career in industrial commissioning, I discovered it is less dramatic then Hollywood movies and more about structured processes, testing, documentation, and discipline. a commissioning and testing background proved surprisingly relevant, making cybersecurity familiar and less intimidating.
Jul 10, 2025
6 min read
Introduction to Cyber Security
(#2 of 17)
Cybersecurity is a core business requirement built on analysing assets, threats, and risks. Using frameworks and maturity models, organisations align security with objectives and compliance. A proactive, structured approach ensures resilience, safeguards assets, and strengthens business continuity against evolving threats.
Jul 11, 2025
3 min read
Introduction to Cyber Security
(#3 of 17)
Confidentiality, Integrity, and Availability is the foundation of cybersecurity. It ensures sensitive data remains private, accurate, and accessible to authorised users. Balancing these three elements strengthens resilience and tailors security priorities to the needs of an organisation.
Jul 12, 2025
3 min read
Introduction to Cyber Security
(#4 of 17)
The Australian Signals Directorate (ASD) leads the nation’s cyber defence through the Essential Eight, the Information Security Manual, and the Cyber Incident Response Plan. Together with the Australian Cyber Security Centre, this guidance empowers organisations to strengthen defences, benchmark maturity, and contribute to Australia’s collective digital resilience.
Jul 13, 2025
3 min read
Introduction to Cyber Security
(#5 of 17)
The Essential Eight is a set of mitigation strategies from the Australian Cyber Security Centre that helps organisations build cyber resilience. The framework’s four maturity levels provide a progressive roadmap for implementing control strategies.
Jul 15, 2025
3 min read
Introduction to Cyber Security
(#6 of 17)
Mapping the Essential Eight to the Information Security Manual (ISM) gives organisations a clear and actionable guide for implementing each security strategy at the desired maturity level. This mapping translates objectives into controls that aligns with priorities and obligations, ensures progress is measurable and outcome driven
Jul 22, 2025
2 min read
Introduction to Cyber Security
(#7 of 17)
In cybersecurity, the terms threats, vulnerabilities, and risks are sometimes used incorrectly and interchangeably, but they are distinct concepts. Understanding their relationship is fundamental to building an effective security program. Think of them as a logical chain: a threat exploits a vulnerability to create a risk.
Jul 28, 2025
3 min read
Introduction to Cyber Security
(#8 of 17)
Risk in cybersecurity is the probability of threats exploiting vulnerabilities to impact assets. Risk management involves identifying, assessing, and controlling threats through structured approach of identification, analysis, evaluation, treatment, and monitoring. This strengthens resilience, improves efficiency, and aligns security contols with organisational strategy while addressing evolving digital threats.
Jul 29, 2025
3 min read
Introduction to Cyber Security
(#9 of 17)
ICT assets include hardware, software, information, infrastructure, skilled personnel, and outsourced services. An asset register systematically documents these, forming the foundation of IT asset management. It tracks lifecycle, reduces risks, prevents waste, and documents vulnerabilities. Maintaining a detailed register ensures risk management focuses on protecting the organisation’s most valuable resources.
Jul 29, 2025
3 min read
Introduction to Cyber Security
(#10 of 17)
To build proactive cybersecurity defenses, a foundational understanding of the threat landscape is required. By comprehending common cyber threats like phishing, ransomware, and viruses, an organization can inform risk assessments and prioritise security controls.
