Skip to main content
Category
Guidance Document
Type
Standard
Access
Open
Status
Active
Created
Feb 2010
Updated
Feb 2017
This document provides strategies to help organisations mitigate cyber security incidents caused by various cyber threats. It addresses targeted cyber intrusions, ransomware and external adversaries with destructive intent, malicious insiders, ‘business email compromise’ and industrial control systems.

Main sections:

· Suggested mitigation strategy implementation order

· Strategies to mitigate cyber security incidents

· Summary of key changes since previous version
Access Strategies to Mitigate Cyber Security Incidents

By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.