Latest Advisory
Essential Eight is Not a Complete Cyber Strategy
The Essential Eight is what it advertises – eight key mitigation strategies that work together primarily to prevent and limit cyber incidents. It has rightly become a widely adopted baseline for Australian organisations in and beyond the public sector. But it explicitly states that it is not a complete security strategy, and this assertion is correct. Organisations need to understand what Essential Eight does and does not cover, and use this to plan their next steps.
Essential Eight is Not a Complete Cyber Strategy
The Essential Eight is what it advertises – eight key mitigation strategies that work together primarily to prevent and limit cyber incidents. It has rightly become a widely adopted baseline for Australian organisations in and beyond the public sector. But it explicitly states that it is not a complete security strategy, and this assertion is correct. Organisations need to understand what Essential Eight does and does not cover, and use this to plan their next steps.
The Australian Government Cyber Security Strategy – How Will it Impact Your Organisation?
In November 2023, the Federal Government released the 2023–2030 Australian Cyber Security Strategy. How will it impact your organisation?
IBRS State of Identity Whitepaper
This paper sheds light on critical aspects of identity and access management such as justifying investments, controlling federated identities, and addressing certification fatigue.
Learning and Development for the Introduction of New Technology (Part 2)
Following ‘Learning and Development for the Introduction of New Technology’, IBRS looks into the necessity of incorporating learning and development programs into all user acceptance testing processes for new solutions.
Sourcing Monthly February 2024
IBRS Sourcing Monthly brings you the latest news and deals in the Australian IT world.
Getting Started with Human Centred Design – Presentation Kit
This presentation dives into the world of human centred design. Discover the what tools are available and the myths that surround this design focus.