This paper gives an overview of the full ComplianceĀ Guide which summarises the main principles from Section 2 of the ISM, shows how Huntsman technology maps to them, and how it helps organisations to assess and manage key aspects of their IT risk status, such as:

ASD ISM Compliance Guide OVERVIEW
  • Readiness to respond to targeted cyber security incidents
  • The controls to protect the organisation from serious threats
  • The potential cost of a cyber security incident
  • Effectiveness of fostering a strong security culture.

DOWNLOAD THE GUIDE

  • Readiness to respond to targeted cyber security incidents
  • The controls to protect the organisation from serious threats
  • The potential cost of a cyber security incident
  • Effectiveness of fostering a strong security culture.
ASD ISM Compliance Guide OVERVIEW