CHAPTER 13

image

Mapping Against Cybersecurity Frameworks

While designing an effective enterprise cybersecurity architecture is an admirable goal in and of itself, no architecture lives in a vacuum. Being able to map to other cybersecurity frameworks is an important part of making sure the enterprise’s cybersecurity program is complete and demonstrating that completeness to outside observers. This chapter details how an enterprise cybersecurity program can be mapped against other cybersecurity frameworks, some of which were introduced in Chapter 2. Reasons for mapping an enterprise cybersecurity program against other frameworks include the following: ...

Get Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.