© Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam 2018
Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams and Abdul AslamEnterprise Cybersecurity Study Guidehttps://doi.org/10.1007/978-1-4842-3258-3_17Cybersecurity Operational Processes
Scott E. Donaldson1 , Stanley G. Siegel2, Chris K. Williams3 and Abdul Aslam3 (1)Falls Church, Virginia, USA
(2)Potomac, Maryland, USA
(3)San Diego, California, USA
Overview
To maintain an effective cybersecurity posture, the Chief Information Security Officer (CISO) should maintain a number of cybersecurity operational processes.
As suggested by the graphic, this appendix describes a set of such processes and their supporting information systems.
While this list is not all-inclusive, it includes ...