Sep 9, 2025
3 min read
Introduction to Cyber Security
(#17 of 17)
This article looks CIRP beyond being a reactive plan and implementing it is a measurable and proactive component of a security strategy. It outlines how a CIRP reduces the impact of a breach and discusses key metrics for continuous improvement.
Sep 2, 2025
4 min read
Introduction to Cyber Security
(#16 of 17)
Exploring in more detail the different types of discrepancies that can undermine control effectiveness, including issues with implementation, training, and a changing threat landscape. It provides practical insights into how to detect these gaps and offers a clear, action-oriented remediation checklist to ensure continuous improvement in cybersecurity defences.
Aug 19, 2025
4 min read
Introduction to Cyber Security
(#14 of 17)
This article examines the process of implementing cybersecurity controls, progressing from strategy to implemented controls. It outlines the steps to plan, execute, and test security defences to effectively address vulnerabilities. This ensures that controls are not only implemented but also well documented and maintained for effectiveness.
Aug 17, 2025
3 min read
Introduction to Cyber Security
(#13 of 17)
A risk mitigation plan only works if it’s properly executed. This requires change management principles to communicate with everyone, get their buy-in, and continuously monitor that the new processes are being followed. This turns the plan from a static document into a living part of the organisation’s culture.
Aug 10, 2025
4 min read
Introduction to Cyber Security
(#12 of 17)
Risk management frameworks integrate decision-making to reduce risk to ALARP. Cyber controls, preventative, detective, and corrective, address assessed threats. Assess the security gap and controls that align with the sccepted risk appetite and objectives.
Aug 1, 2025
4 min read
Introduction to Cyber Security
(#11 of 17)
A Cyber Incident Response Plan (CIRP) is needed to transform an organisation’s approach to security incidents from panic to preparedness. It provides a structured playbook for preparing, detecting, responding to, and recovering from a cybersecurity events. A CIRP provides clear responsibilities and procedures, minimising harm and accelerating recovery. Its value is in creating coordinated action in high-pressure situations, preventing disorganisation, and reducing the downtime, costs, and reputational damage that can result from a breach.
Jul 29, 2025
3 min read
Introduction to Cyber Security
(#9 of 17)
ICT assets include hardware, software, information, infrastructure, skilled personnel, and outsourced services. An asset register systematically documents these, forming the foundation of IT asset management. It tracks lifecycle, reduces risks, prevents waste, and documents vulnerabilities. Maintaining a detailed register ensures risk management focuses on protecting the organisation’s most valuable resources.
Jul 28, 2025
3 min read
Introduction to Cyber Security
(#8 of 17)
Risk in cybersecurity is the probability of threats exploiting vulnerabilities to impact assets. Risk management involves identifying, assessing, and controlling threats through structured approach of identification, analysis, evaluation, treatment, and monitoring. This strengthens resilience, improves efficiency, and aligns security contols with organisational strategy while addressing evolving digital threats.
Jul 15, 2025
3 min read
Introduction to Cyber Security
(#6 of 17)
Mapping the Essential Eight to the Information Security Manual (ISM) gives organisations a clear and actionable guide for implementing each security strategy at the desired maturity level. This mapping translates objectives into controls that aligns with priorities and obligations, ensures progress is measurable and outcome driven
Jul 12, 2025
3 min read
Introduction to Cyber Security
(#4 of 17)
The Australian Signals Directorate (ASD) leads the nation’s cyber defence through the Essential Eight, the Information Security Manual, and the Cyber Incident Response Plan. Together with the Australian Cyber Security Centre, this guidance empowers organisations to strengthen defences, benchmark maturity, and contribute to Australia’s collective digital resilience.