Map of Cyber Security

  1. Information Security
  • Determining and Following Information Security Frameworks:
    • ISO/IEC 27001 and 27002
    • NIST Cybersecurity Framework
    • CIS Controls
    • COBIT
  • Establishing and Implementing Policies:
    • Data Privacy Policies
    • Access Control Policies
    • Encryption Standards and Policies
    • Security Management and Incident Response Policies
  • Audit and Compliance:
    • Audit Processes and Controls
    • Compliance Assessments and Management

2. Cybersecurity:

  • Following Cybersecurity Frameworks:
    • MITRE ATT&CK Framework
    • SANS Top 20 Critical Security Controls
    • Cyber Kill Chain
    • Zero Trust Model
  • Cybersecurity Measures:
    • Threat Detection and Response
    • Identity Authentication and Access Controls
    • Encryption and Data Protection
    • Event Management and Analysis
    • Vulnerability Scaning and Penetration

Leave a Reply

Your email address will not be published. Required fields are marked *