You must be a registered user and logged-in to read this White Paper.
2 Contents
- Introduction
- Contents
- Starting Out
- So where are you starting from?
- Forming a risk perspective
- Fail to plan, plan to fail
- Building the future starts with a coherent strategy
- So what are the key components of a cyber security strategy?
- Develop a robust business case
- Cyber Hygiene
- First things first
- Breaking it down
- Cyber Capability – Core Aspects
- Mission; Vision; Values
- Scope and objectives
- Design principles and capabilities
- Requirements
- Operating model
- Capability construct
- Processes and procedures
- Team structure
- The physical construct
- Cyber Security – The Next level
- Maturing nicely
- In practice
- People, process, technology and DATA
- The skills gap
- Critical Success Factors
- Team organisation
- Network/perimeter security
- Host/endpoint security
- End user application development
- Security metrics and analysis
- Log management
- Security policy framework
- Network security testing
- Initiatives to harden the enterprise
- User/Security Awareness Training
- Network visibility
- Knowledge (intelligence) management
- Analysis process
- Analyst skills
- Collaboration
- Detections
- Digital forensics
- Malware analysis
- Mitigations
- Cyber investigations
- Opportunistic threats
- Insider threats
- Summary
- Recommended Reading
Table of Figures