PART TWOProcess
Cybersecurity is no longer only the domain of your IT and security teams. From the loading dock to the C-suite, everyone must be security minded.
The connection between your people and the security technology you invest in is encapsulated in processes.
Processes Bridge How People Use Technology
Sound processes build a bridge between your people and your technology. With the right processes in place, articulated in clear policies, people know up front what they should and should not do. Sound cybersecurity processes and policies limit employee access to only the data they need to do their jobs, and the right processes can ensure that employees protect and properly use the data your people do need.
To be mature, processes need to be clearly defined, agile, easy to follow, measurable, and repeatable. Written policies should be clear and succinct to ensure that everyone understands what they should do.
Defining processes and putting them in place is not a one-time effort. Maintaining cybersecurity is a continuous, evolving process. On a regular basis, you need to review your policies and processes to determine if they're still effective or if they need to be modified.
This section covers process areas of urgent concern for CISOs, including cyber risk management, blending NOC and SOC, secure development, compliance, and supply chain risk.
Cyber Risk Management ...
Get Fight Fire with Fire now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.