Discover the critical ninth step to maximise the visibility and measurement of the Essential 8, including vital links to official government documentation.

"*" indicates required fields

The Australian Cyber Security Centre’s (ACSC’s) publication of the Essential Eight shows organisations how to defend against most cyber threats. These are the key controls ACSC encourage organisations to employ to help protect against cyber-attack. Yet there’s one critical security control that’s missing that provides the visibility and measurement of the status and efficacy of the other eight – and it’s called Protective Monitoring.

In this paper, we share:

  • The critical ninth security control that’s missing
  • How to build a resilient defence against cyber attacks
  • The vital links to official government documentation

SIGN UP TO RECEIVE CYBER SECURITY INSIGHTS

Read by directors, executives, and security professionals globally, operating in the most complex of security environments.