All advice, guidance and publications Title TypeAdviceGuidancePublication AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 12 Dec 2024 Publication Cyber security incident response planning: Executive guidance The Australian Signals Directorate (ASD) is responsible for monitoring and responding to cyber threats targeting Australian interests. Reporting cyber security incidents to ASD ensures that timely assistance can be provided, if required. This may be in the form of investigations or remediation advice. 12 Dec 2024 Publication Vulnerability disclosure programs explained A vulnerability disclosure program (VDP) is a collection of processes and procedures designed to identify, verify, resolve and report on vulnerabilities disclosed by people who may be internal or external to organisations. The importance of developing, implementing and maintaining a well thought-out VDP cannot be underestimated. It is an integral part of professional organisations’ business operations. 12 Dec 2024 Publication Cyber security incident response planning: Practitioner guidance ASD defines a cyber security incident as an unwanted or unexpected cyber security event, or a series of such events, that has either compromised business operations or has a significant probability of compromising business operations. 11 Dec 2024 Guidance ASD’s role in cyber security: For legal practitioners During a cyber security incident, or suspected cyber security incident, our goal is to work with impacted organisations, their legal representation, and any external vendors engaged to investigate an incident on behalf of the organisation. 05 Dec 2024 Publication Choosing secure and verifiable technologies The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and international partners have provided recommendations in this guide as a roadmap for choosing secure and verifiable technologies. 05 Dec 2024 Publication Choosing secure and verifiable technologies: Executive guidance This guide supports senior leaders to enable their organisations to understand their threat environment and make better-informed assessments and decisions to procure secure technologies. Pagination Previous page ‹‹ Page 16 Next page ›› View other content topics Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary