Table of Contents

You must be a registered user and logged-in to read this White Paper.

2 Contents
  1. Introduction
  2. Contents
  3. Starting Out
    1. So where are you starting from?
    2. Forming a risk perspective
    3. Fail to plan, plan to fail
    4. Building the future starts with a coherent strategy
    5. So what are the key components of a cyber security strategy?
    6. Develop a robust business case
  4. Cyber Hygiene
    1. First things first
    2. Breaking it down
  5. Cyber Capability – Core Aspects
    1. Mission; Vision; Values
    2. Scope and objectives
    3. Design principles and capabilities
    4. Requirements
    5. Operating model
    6. Capability construct
    7. Processes and procedures
    8. Team structure
    9. The physical construct
  6. Cyber Security – The Next level
    1. Maturing nicely
    2. In practice
    3. People, process, technology and DATA
    4. The skills gap
  7. Critical Success Factors
    1. Team organisation
    2. Network/perimeter security
    3. Host/endpoint security
    4. End user application development
    5. Security metrics and analysis
    6. Log management
    7. Security policy framework
    8. Network security testing
    9. Initiatives to harden the enterprise
    10. User/Security Awareness Training
    11. Network visibility
    12. Knowledge (intelligence) management
    13. Analysis process
    14. Analyst skills
    15. Collaboration
    16. Detections
    17. Digital forensics
    18. Malware analysis
    19. Mitigations
    20. Cyber investigations
    21. Opportunistic threats
    22. Insider threats
  8. Summary
  9. Recommended Reading


Table of Figures
  1. Figure 1 – Example Thematic Construct
  2. Figure 2 – The STIX architecture
  3. Figure 3 – The Cyber-Attack Lifecycle
  4. Figure 4 – The Threat Intelligence Cycle

Continue reading ‘Starting out’ »