ASD ISM Compliance Guide OVERVIEW

Tweet about this on TwitterShare on LinkedIn0Share on Facebook0Share on Google+0Email this to someone

ASD ISM Compliance Guide OVERVIEW

This paper gives an overview of the full Compliance Guide which summarises the main principles from Section 2 of the ISM, shows how Huntsman technology maps to them, and how it helps organisations to assess and manage key aspects of their IT risk status, such as:

  • Readiness to respond to targeted cyber security incidents
  • The controls to protect the organisation from serious threats
  • The potential cost of a cyber security incident
  • Effectiveness of fostering a strong security culture.

Download the ASD ISM Compliance Guide OVERVIEW