ASD ISM Compliance Guide OVERVIEW
This paper gives an overview of the full Compliance Guide which summarises the main principles from Section 2 of the ISM, shows how Huntsman technology maps to them, and how it helps organisations to assess and manage key aspects of their IT risk status, such as:
- Readiness to respond to targeted cyber security incidents
- The controls to protect the organisation from serious threats
- The potential cost of a cyber security incident
- Effectiveness of fostering a strong security culture.