APPENDIX E

image

Cybersecurity Operational Processes

To maintain an effective cybersecurity posture, the Chief Information Security Officer (CISO) should maintain a number of enterprise operational processes to include the following:

  1. Policies and Policy Exception Management
  2. Project and Change Security Reviews
  3. Risk Management
  4. Control Management
  5. Auditing and Deficiency Tracking
  6. Asset Inventory and Audit
  7. Change Control
  8. Configuration Management Database Re-certification
  9. Supplier Reviews and Risk Assessments
  10. Cyberintrusion Response
  11. All-Hazards Emergency Preparedness Exercises
  12. Vulnerability Scanning, Tracking, and Management
  13. Patch Management and Deployment ...

Get Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.