Information security


Analyse evolving threats and vulnerabilities

To manage vulnerabilities in your information security, take the following action.

  • Monitor your systems, networks, and processes for security vulnerabilities. Observe system and network events, configurations, and processes to detect suspicious or unauthorised events.
  • Be proactive to stay on top of vulnerabilities or flaws in your technical environment.
  • Assess your security measures against best practice and known security threats.
  • Analyse, prioritise, and report on vulnerabilities that pose the most immediate risk to your organisation.
  • Apply fixes and track them to completion to mitigate the risk of your information being compromised.

Threats are continually evolving. Your chief security officer (CSO) should use the following threat catalogues to stay abreast of emerging threats:

Page last modified: 4/05/2022