CISO MindMap 2023: What do InfoSec Professionals Really do?
Most people outside the Cybersecurity profession don’t fully realize and appreciate the complexity of a security professional’s job. Since 2012, CISO MindMap has been an effective educational tool to communicate CISO responsibilities and has enabled security professionals to design and refine their security programs.
Here is the latest and updated CISO MindMap for 2023 with a number of updates and new recommendations for 2023-24.
#useful #management
Most people outside the Cybersecurity profession don’t fully realize and appreciate the complexity of a security professional’s job. Since 2012, CISO MindMap has been an effective educational tool to communicate CISO responsibilities and has enabled security professionals to design and refine their security programs.
Here is the latest and updated CISO MindMap for 2023 with a number of updates and new recommendations for 2023-24.
#useful #management
👍4
CISO MindMap 2023_What do InfoSec Professionals Really do.pdf
874.5 KB
CISO MindMap 2023: What do InfoSec Professionals Really do?
👍4
First things first: Threat Modelling using Free and Open Source Tools by Roger Carhuatocto
On 2014 RSA Conference (archive not available), Eric Olson of Cyveillance said a good and real simil about Threat Modelling: “It is a lot like teenage sex: Everyone is talking about it, everyone thinks everyone else is doing it, and most of the few people who are actually doing it aren’t doing it all that well”.
Source
#useful #DevSecOps
On 2014 RSA Conference (archive not available), Eric Olson of Cyveillance said a good and real simil about Threat Modelling: “It is a lot like teenage sex: Everyone is talking about it, everyone thinks everyone else is doing it, and most of the few people who are actually doing it aren’t doing it all that well”.
Source
#useful #DevSecOps
👍4
👍4❤1
Penetration Testing Guide Via Cyber Press.pdf
6.4 MB
Quick Start Guide to Penetration Testing (ENG)
👍5
Incident Response Playbooks and workflows for Account Compromised, Critical, Data Loss, Malware, Phishing, Ransom
#docs
#docs
👍4
Incident_Response_Playbooks_and_workflows_for_Account_Compromised.pdf
3.9 MB
Incident Response Playbooks and workflows for Account Compromised, Critical, Data Loss, Malware, Phishing, Ransom
👍4
Cyber Security Toolkit for Boards
Resources designed to help board members govern cyber risk more effectively.
#docs
Resources designed to help board members govern cyber risk more effectively.
#docs
👍3