Enterprise Cybersecurity Study Guide 2018
DOI: 10.1007/978-1-4842-3258-3_14
|View full text |Cite
|
Sign up to set email alerts
|

Managing an Enterprise Cybersecurity Program

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The functions are subsequently subdivided into 29 capability domains. These represent the cybersecurity functional areas and operational cyber technologies and processes (Donaldson et al , 2018) with which a cybersecurity architecture of an organisation can be built (Schoenfield, 2015). The 29 cybersecurity capability domains are further broken down into 140 capabilities that essentially represent a list of what should be achieved (required results) in the focus areas to maintain the desired cybersecurity resilience level.…”
Section: Discussion Of the Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…The functions are subsequently subdivided into 29 capability domains. These represent the cybersecurity functional areas and operational cyber technologies and processes (Donaldson et al , 2018) with which a cybersecurity architecture of an organisation can be built (Schoenfield, 2015). The 29 cybersecurity capability domains are further broken down into 140 capabilities that essentially represent a list of what should be achieved (required results) in the focus areas to maintain the desired cybersecurity resilience level.…”
Section: Discussion Of the Frameworkmentioning
confidence: 99%
“…Finally, the 140 cybersecurity capabilities can be realised by implementing any number of a set of cybersecurity controls or practices (operational cyber technologies and processes and procedures) that can be adapted from, for example, ISA/IEC 62443, NIST Special Publications 800–53, ISO/IEC 27002, COBIT and any number of other recommended security controls frameworks, guidelines and standards. In other words, no universal set of cybersecurity – preventative, detective, forensic and audit (Donaldson et al , 2018) – controls and/or practices is possible.…”
Section: Discussion Of the Frameworkmentioning
confidence: 99%