Learn how integrating a SIEM platform with a cloud service can help your organisation unmask threats and provide a full security picture: dashboards to track compliance against the Essential Eight cyber mitigation strategies.

"*" indicates required fields

In February 2017, the Australian Signals Directorate (ASD) published a guideline listing eight critical cyber mitigation strategies, to which all government departments should adhere.

On 15 March 2022, the Protective Security Policy Framework was amended to mandate the Essential Eight, Maturity Level Two for all non-corporate Commonwealth entities. The mandatory implementation of the additional four controls is a core requirement from 1 July 2022.

Huntsman Security’s dashboard for the ACSC Essential Eight allows customers to continually monitor their maturity against each of the cyber security mitigation strategies in real-time.

DOWNLOAD OUR CLOUD SECURITY WHITE PAPER NOW AND DISCOVER:

  • How natively integrating a SIEM platform with a cloud service can help organisations unmask threats and provide a full security picture
  • Why a cloud-based SIEM needs to ingest the security telemetry for underlying operating systems, network devices and applications
  • How pre-compiled dashboards can allow organisations to track compliance against the ACSC’s Essential Eight Security Controls

SIGN UP TO RECEIVE CYBER SECURITY INSIGHTS

Read by directors, executives, and security professionals globally, operating in the most complex of security environments.