ASD ISM Compliance Guide OVERVIEW

Share on Facebook0Share on Google+0Tweet about this on TwitterShare on LinkedIn0Email this to someone

ASD ISM Compliance Guide OVERVIEW

This paper gives an overview of the full Compliance Guide which summarises the main principles from Section 2 of the ISM, shows how Huntsman technology maps to them, and how it helps organisations to assess and manage key aspects of their IT risk status, such as:

  • Readiness to respond to targeted cyber security incidents
  • The controls to protect the organisation from serious threats
  • The potential cost of a cyber security incident
  • Effectiveness of fostering a strong security culture.

Download the ASD ISM Compliance Guide OVERVIEW