How can we help you?

Tech made real: Essential Eight with Michael O'Keefe

In this video series, Michael O'Keefe, Cyber Security Consultant at AC3 discuss the Australian Cyber Security Centre 'Essential Eight' strategies developed to mitigate cyber security incidents.

1. What is the ACSC's Essential Eight?

Learn about the ACSC's Essential Eight in one minute with Michael O'Keeffe.

2. Moving from Maturity Level Zero to Level One ?

Hear from Michael O'Keeffe, as he discusses the difference between Maturity Level Zero and Maturity Level One.

3. Application Control - Mitigation Strategy

Hear from Michael O'Keeffe, as he discusses the first mitigation strategy of ACSC's Essential Eight, Application Control.

4. Patch Applications - Mitigation Strategy

Hear from Michael O'Keeffe, as he discusses the second mitigation strategy of ACSC's Essential Eight, Patch Applications.

5. Configure Microsoft macro settings - Mitigation Strategy

Hear from Michael O'Keeffe, as he discusses the third mitigation strategy of ACSC's Essential Eight, Configuring Microsoft macro settings .

6. User Application Hardening - Mitigation Strategy

Hear from Michael O'Keeffe, as he discusses the fourth mitigation strategy of ACSC's Essential Eight, User Application Hardening.

7. Patch Operating - Mitigation Strategy

Hear from Michael O'Keeffe, as he discusses the fifth mitigation strategy of ACSC's Essential Eight, Patch Operating.

8. Patch Operating Systems - Mitigation Strategy

Hear from Michael O'Keeffe, as he discusses the sixth mitigation strategy of ACSC's Essential Eight, Patch Operating Systems.

9. Multi-factor Authentication - Mitigation Strategy

Hear from Michael O'Keeffe, as he discusses the seventh mitigation strategy of ACSC's Essential Eight, Mutli-factor Authentication.

10. Regular Backups - Mitigation Strategy

Hear from Michael O'Keeffe, as he discusses the eight mitigation strategy of ACSC's Essential Eight, Regular Backups.