E8 Defender FAQs
- Home
- About us
- Blogs & Tech FAQs
- E8 Defender FAQs
Here are some common questions and answers about our new E8 Defender service.
FAQ: How long does the Essential 8 Level 2 uplift process typically take?
The timeframe for achieving Essential 8 Level 2 maturity can vary depending on your organisation's current cybersecurity posture, the complexity of your IT environment, and the resources you can dedicate to the uplift. After an initial assessment, Logi-Tech will provide a tailored project plan with estimated timelines. Our Power BI dashboard helps keep this process transparent and on track.
FAQ: What is involved in the initial assessment to determine our current Essential 8 maturity?
Our initial assessment involves a comprehensive review of your existing IT infrastructure, security policies, and current compliance with the Essential 8 controls. We'll conduct interviews with key personnel, review documentation, and may use automated tools to gain a clear understanding of your current maturity level and identify the specific gaps that need to be addressed to reach Essential 8 Level 2.
FAQ: Do you provide support beyond the initial uplift to maintain compliance?
Yes, maintaining Essential 8 Level 2 compliance is an ongoing process, not a one-time event. Logi-Tech offers various post-uplift support packages, including ongoing monitoring, regular reviews, and guidance on adapting to evolving cyber threats and Essential 8 updates. We can work with you to establish a continuous improvement program to ensure sustained compliance.
FAQ: What if we have existing cybersecurity solutions in place? How do you integrate with them?
We aim to leverage your existing investments where possible. Our team will assess your current cybersecurity tools and platforms to determine how they can contribute to achieving Essential 8 Level 2. We'll identify any gaps and recommend additional solutions or configurations as needed, ensuring a cohesive and effective security environment. Our approach is to integrate, not replace, where it makes sense.
FAQ: What are the benefits of DISP certification for my business?
DISP certification is crucial for any organisation looking to engage with the Australian Defence industry. Key benefits include:
- Eligibility for Defence Contracts: Many Defence tenders and contracts require DISP membership as a prerequisite.
- Demonstrated Security Maturity: It signals to Defence and other government entities that your organisation has robust security measures in place.
- Access to Security Advice: DISP members gain access to Defence security services, advice, and training.
- Enhanced Reputation: It builds trust and credibility, not just within the Defence sector, but also with other clients and partners concerned about cybersecurity.
FAQ: What is the Essential Eight, and why is Level 2 important for DISP?
The Essential Eight is a set of baseline mitigation strategies developed by the Australian Cyber Security Centre (ACSC) to help organisations protect against a range of cyber threats. Level 2 (Maturity Level 2) signifies a more robust implementation, designed to counter attackers who are more skilled and often targeting specific organisations. For DISP membership, demonstrating Essential 8 Maturity Level 2 is a mandatory requirement for your ICT and Cyber Security domain, signalling your organisation's commitment to strong cyber protection when handling sensitive Defence information.
FAQ: What are the four security domains of DISP, and how does Logi-Tech assist with all of them?
The DISP framework covers four critical security domains: Security Governance, Personnel Security, Physical Security, and ICT & Cyber Security. While Logi-Tech's primary expertise is in the ICT & Cyber Security domain, specifically with Essential 8 Level 2 uplift, we can recommend trusted partners if you require direct implementation support in those areas.
FAQs: Do I need Power BI software to be able to view the dashboard in real time?
To ensure you have real-time visibility and interaction with your Essential 8 progress, our dashboards are powered by Microsoft Power BI. While Power BI is required for real-time viewing, many clients find they already have the necessary licensing through their existing Microsoft 365 subscriptions (such as E5), or a basic Power BI free account can grant access if the content is hosted in a Premium workspace. We'll guide you through ensuring your team has appropriate access. Alternatively, we are happy to provide you with a Power BI Dashboard status report, both at your request and via our monthly progress updates provided to your team.
FAQ: What kind of reporting can I get from the dashboard, beyond just progress tracking?
In addition to real-time progress tracking of each control, the Power BI Dashboard can be configured to provide various reports, including:
- Overall Essential 8 Maturity Status
- Breakdown of controls by Essential 8 mitigation strategy
- Historical progress and trends
- Identification of outstanding tasks and bottlenecks
- Detailed evidence submission status for each control
- Reports tailored to specific DISP audit requirements
FAQs: Can I get the excel data that is used to inform the Power BI Dashboard?
Yes, absolutely! We understand the importance of having direct access to your data. The Power BI Dashboard is directly linked to an Excel spreadsheet that serves as the central repository for all your Essential 8 control information and supporting evidence.
This means you can:
- Receive a copy of the Excel spreadsheet at any time upon request. This spreadsheet contains all the detailed information underpinning the status and evidence of your Essential 8 controls.
- Easily transfer this Excel data to the DISP Portal. This is a significant benefit designed to streamline your DISP Application and/or Annual Security Audit reporting, saving you time and effort.
- Maintain an offline record of your compliance progress and evidence.
Our Power BI Dashboard offers a dynamic, real-time visual representation of this data, providing you with quick insights and progress tracking. However, the foundational data remains accessible to you in a familiar and highly functional Excel format, ensuring you always have direct ownership and control over your compliance information.
FAQ: How secure is the Power BI Dashboard and the underlying Excel data?
The security of your data is paramount. The Power BI Dashboard is hosted within the highly secure Microsoft Power BI Service, which leverages Microsoft's robust security infrastructure, including data encryption, access controls, and compliance certifications. The underlying Excel data is securely managed within Logi-Tech's systems with strict access protocols, and any transfer to your organisation or the DISP Portal is conducted through secure methods to ensure its confidentiality and integrity.
Got more questions? Please reach out to us at sales@logitech.com.au