The Essential Eight for Security program

Malicious cyber activity is increasing in frequency, scale, and sophistication, especially following the events of 2020. Between 1 July 2019 and 30 June 2020, the Australian Cyber Security Centre (ACSC) responded to an average of 164 cybercrime reports per day… that’s 1 report every 10 minutes.

How to mitigate security risks with the Essential Eight

While no single mitigation strategy is guaranteed to prevent cyber security incidents, the ACSC has recommended that organisations implement eight essential mitigation strategies as a baseline. This baseline, the Essential Eight, makes it much harder for adversaries to compromise systems, and can be a cost and time effective way of ensuring watertight security.

Program1Image

The Essential Eight for Security Explained

Don’t miss this upcoming introductory webinar session, facilitated by Mark Anderson, Microsoft Australia’s National Security Officer, to learn more about:

  • The threat landscape – where and how risks are increasing for your organisation.
  • What is the Essential Eight? – what the controls are, how they came about, and how they can offer protection?
  • The Essential Eight in practice – learn about how NSW Department of Customer Service implemented some of these controls.
  • Best practice tips and recommendations – key insights about how to get the most out of the Essential Eight for your organisation.

View On Demand
Program2Image

The Essential Eight for Security in Practice, Patching of Operating Systems & Applications

This session will cover these topics to help you accelerate your Essential Eight maturity journey:

  • Understand how you can effectively manage patching in your end user computing environment using Microsoft Modern Management and Windows Update for Business
  • Explore how you can effectively manage patching across your data centre (whether on-premises, in the cloud, or both)
  • Discover how you can manage threats and vulnerabilities more effectively through Microsoft's TVM capabilities

View On Demand
Program3Image

The Essential Eight for Security in Practice, Multifactor Authentication & Restrict Admin Privileges

This session will cover these topics to help you accelerate your Essential Eight maturity journey:

  • Understand how you can leverage Identity and Authentication features in Azure AD at Levels 1, 2 and 3 of the Essential Eight maturity model
  • Explore how Azure AD Conditional Access brings all these features together to help you accelerate your zero trust journey
  • Discover how the Essential Eight template in the Microsoft 365 Compliance Manager tool helps you accelerate your Essential Eight maturity

View On Demand
Program4Image

The Essential Eight for Security in Practice, Application Controls

This session will cover these topics to help you accelerate your Essential Eight maturity journey:

  • Understand how you can leverage key Microsoft Security capabilities to harden the security posture of your digital estate
  • Explore how you can implement effective application control to prevent the execution of unapproved and/or malicious programs across your digital estate

View On Demand
Program5Image

The Essential Eight for Security in Practice, User Application Hardening & Office Macros

This session will cover these topics to help you accelerate your Essential Eight maturity journey:

  • Provide Application Hardening guidance and insights across the ASD Essential 8 maturity levels
  • Describe the Security Baselines available to expedite Application Hardening across Windows, Office and Edge
  • Summarise the options available to control web application access through web content filtering and shadow IT management
  • Provide Office Macro configuration guidance and insights across the ASD Essential 8 maturity levels

View On Demand
Program6Image

The Essential Eight for Security in Practice, Daily Backups

This session will cover these topics to help you accelerate your Essential Eight maturity journey:

  • Mitigation strategies to recover data and system availability, including restoring system state through Windows autopilot
  • Backup and availability addressed in Office 365
  • Leveraging the Azure backup service to backup your on-premises and Azure resources

View On Demand
Program7Image

Program8Image

Program9Image

Program10Image

Program11Image

Program12Image

Program13Image

Program14Image

Program15Image

Program16Image

Program17Image

Program18Image

Program19Image

Program20Image

Program1Image

Program2Image

Program3Image

Program4Image

Program5Image

Program6Image

Program7Image

Program8Image

Program9Image

Program10Image

Program11Image

Program12Image

Program13Image

Program14Image

Program15Image

Program16Image

Program17Image

Program18Image

Program19Image

Program20Image