Chapter 1 – Cybersecurity is (Not) an IT Issue
Chapter 2 – Effective Cybersecurity Principles for Boards of Directors
Chapter 3 – Structuring for the Digital Age
Chapter 4 – A Modern Approach to Assessing Cyber Risk
Chapter 5 – The Role of HR Functions in Scaling Cybersecurity and Building Trust
Chapter 6 – Cybersecurity and the Office of the General Counsel
Chapter 7 – Cybersecurity Audit and Compliance Considerations
Chapter 8 – Cyber Supply Chain and Third-Party Risk Management
Chapter 9 – Technical Operations
Chapter 10 – Crisis Management
Chapter 11 – Cybersecurity Considerations During M&A Phases
Chapter 12 – Developing Relationships with the Cybersecurity Team
Technical operations security needs constant evaluation and evolution to safeguard enterprise assets in a digitalized era with increasing cybersecurity risks. Going forward, adoption of new technology and innovation will be crucial both in terms of promoting competitiveness of the business and to achieve more effective cyber risk management and mitigation. As stated in a PWC survey, the benefits of innovation are evident, closing the wide lead that attackers have held for a long time. The shift of operations and security tools to cloud infrastructure, switching to advanced technologies, and restructuring operations through automation and rationalization are improving the cost efficiency and effectiveness of cyber operations through-out the enterprise. However, there will also be risks associating new innovation, which may be detrimental if not accounted for properly. As organizations go through modernization processes and are subject to increasingly sophisticated attacks, such as SolarWinds, they need to incorporate strategies such as the Defense in Depth for proper management of the security programs and controls to not only enhance operational effectiveness, but also enhance operational security.
Maintaining and investing in a centralized and robust technical security operations team focused on defense-in-depth will best position an organization to meet and address these accelerating threats. Having the program elements in place is the first step, equally important is maintaining vigilance to keep coverage of all the program elements at the highest percentage possible. This coverage is key as threat actors will exploit gaps wherever they exist, regardless if they expose high risk assets or not.
With ownership of an organization’s assets and defense-in-depth program elements defined, measurement of and adherence to the highest standards within those elements can be best effectuated. With this in place, cybersecurity roles and responsibilities for all other functions and staff come into focus and can enable requirements for collective efforts from participants across the entire organization.
Combining Technology, Public Policy and Economics to Create a Sustainable System of Cybersecurity
| 703-907-7090
| admin@isalliance.org
| 2500 Wilson Blvd, #245
Arlington, Virginia 22201
USA
ISA provides cybersecurity expert testimony and thought leadership in government and serves as an expert witness to the press.