Formerly the ASD Essential Eight, the newly reviewed ACSC Essential Eight is a series of baseline mitigation strategies taken from the Strategies to Mitigate Cyber Security Incidents recommended for organisations by the Australian Government. Implementing these strategies as a minimum makes it much harder for adversaries to compromise systems.
Once the initial review has been completed and technical assessments have commenced, we will assess the overall security maturity by evaluating the security policies and controls against the PSPF and ACSC’s Strategies to Mitigate Cyber Security Incidents, aligned with the Essential Eight Maturity Model.
This service begins with an analysis and assessment of your environment against the ACSC Essential Eight Framework. As part of our discovery, we will host interviews and workshops as required, conduct onsite inspections, and review documented policies and processes to form an understanding of your security risk profile and posture
Once the initial review has been completed and technical assessments have commenced, we will assess the overall security maturity by evaluating the security policies and controls against the ACSC Strategies to Mitigate Cyber Security Incidents, which will align with the Essential Eight Maturity Model
The outcome of the assessment is a report documenting the current state of each of the categories, identifying and assessing any threats and risks, and providing prioritised recommendations.
These recommendations can either be implemented by your internal IT team, or the security engineers at Security Centric can provide that service too.
Ongoing cyber-supply chain, ransomware, and new software vulnerabilities are all part of the current cyber threat landscape. Many organisations are now insisting that their suppliers, vendors, and partners can demonstrate their cybersecurity maturity, and aligning with the ACSC Essential Eight is an important step towards lowering your organisational risk as it relates to cybersecurity. Benefits include:
Unsure of what you should be looking for from your penetration test? We've compiled a checklist outlining the top five "must-haves" from your security provider.
The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.
Remember:
The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.
Remember:
Level 34, 201 Elizabeth St
Sydney, NSW 2000
Call us: +61 2 9199 0000