<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How are Cybersecurity professionals forming their strategy? in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/How-are-Cybersecurity-professionals-forming-their-strategy/m-p/48055#M527</link>
    <description>&lt;P&gt;A couple of key items to consider in developing a cybersecurity strategy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Are you following a cybersecurity framework that best aligns to the mission of your business? ISO 27001, NIST or NIST CSF?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Do you have a current, accurate and complete IT asset inventory (including OS, firmware, and applications)?&amp;nbsp;&lt;/P&gt;&lt;P&gt;A current topology diagram that not only depicts the IT architecture but also the flow of information to and from the organization.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Do you have a full understanding of the business's mission critical functions? And the business's future objectives and goals? What areas is the business willing to accept / manage risks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Having this information, will give you a high overview of the "as-is" status and good start towards organizing a "to-be" status and importantly resourcing a&amp;nbsp; cybersecurity strategy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps. All the best.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 26 Oct 2021 16:01:55 GMT</pubDate>
    <dc:creator>JWG_60</dc:creator>
    <dc:date>2021-10-26T16:01:55Z</dc:date>
    <item>
      <title>How are Cybersecurity professionals forming their strategy?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/How-are-Cybersecurity-professionals-forming-their-strategy/m-p/47921#M509</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How are Cybersecurity professionals forming their strategy?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It makes a lot of sense to follow lessons learnt, and to have objectives that can be met.&lt;/P&gt;&lt;P&gt;The same issues are clear in other defence avenues.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We're constantly suffering from being behind and not being able to proactively stop new attacks.&lt;/P&gt;&lt;P&gt;Our strategy needs to put us in the driving seat and do better than just reacting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An article i read on military defence listed four aspects of that strategy and in Cybersecurity terms they could look like this:&amp;nbsp;&lt;FONT color="#FFFFFF"&gt;&amp;nbsp;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;A href="https://192168ll.red/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;&lt;SPAN&gt;192.168.l.l&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; &lt;A href="https://routerlogin.red/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;&lt;SPAN&gt;routerlogin&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; &lt;A href="https://19216801.cc/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;&lt;SPAN&gt;192.168.0.1&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; &lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Firstly, we need complete freedom of action, and support from the board and senior management.&lt;/LI&gt;&lt;LI&gt;Second, we should be capable of being on top of most known threats due to protective measures.&lt;/LI&gt;&lt;LI&gt;Third we should have a good picture of what is happening around us&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;BR /&gt;With the first three we should be superior to other systems when applying countermeasures.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It would be good to exchange views on strategy choices and see how objectives are going to be met.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Nov 2021 03:42:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/How-are-Cybersecurity-professionals-forming-their-strategy/m-p/47921#M509</guid>
      <dc:creator>wolnqp</dc:creator>
      <dc:date>2021-11-04T03:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: How are Cybersecurity professionals forming their strategy?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/How-are-Cybersecurity-professionals-forming-their-strategy/m-p/47928#M510</link>
      <description>&lt;P&gt;If your query is about countermeasure to technical attacks, assuming that you have the basic security practices in place Mitre ATT&amp;amp;CK would be a good place to start.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 07:21:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/How-are-Cybersecurity-professionals-forming-their-strategy/m-p/47928#M510</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2021-10-18T07:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: How are Cybersecurity professionals forming their strategy?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/How-are-Cybersecurity-professionals-forming-their-strategy/m-p/48055#M527</link>
      <description>&lt;P&gt;A couple of key items to consider in developing a cybersecurity strategy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Are you following a cybersecurity framework that best aligns to the mission of your business? ISO 27001, NIST or NIST CSF?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Do you have a current, accurate and complete IT asset inventory (including OS, firmware, and applications)?&amp;nbsp;&lt;/P&gt;&lt;P&gt;A current topology diagram that not only depicts the IT architecture but also the flow of information to and from the organization.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Do you have a full understanding of the business's mission critical functions? And the business's future objectives and goals? What areas is the business willing to accept / manage risks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Having this information, will give you a high overview of the "as-is" status and good start towards organizing a "to-be" status and importantly resourcing a&amp;nbsp; cybersecurity strategy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps. All the best.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 16:01:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/How-are-Cybersecurity-professionals-forming-their-strategy/m-p/48055#M527</guid>
      <dc:creator>JWG_60</dc:creator>
      <dc:date>2021-10-26T16:01:55Z</dc:date>
    </item>
  </channel>
</rss>

