Introduction
Cybersecurity simplified
()
Creating the cybersecurity program framework
()
1. Cybersecurity Governance
Adopt security frameworks to drive cybersecurity governance
()
Consider laws and regulations in cybersecurity governance
()
Policies, standards, and procedures to govern cybersecurity
()
Roles and responsibilities for cybersecurity governance
()
Cyber risk management program for cybersecurity governance
()
Risk management process to prioritize cyber defense
()
2. Inventory and Security of Assets
Infrastructure asset management for cybersecurity
()
Software asset management for cybersecurity
()
Secure cyber supply chain to reduce risk of external threats
()
3. Data Protection
Establish data security management practices to protect data
()
Encryption to provide confidentiality of data
()
Access management to control unauthorized access
()
Vulnerability management to mitigate security weaknesses
()
Secure configuration process to minimize vulnerabilities
()
4. Detect Potential Security Threats
Network security monitoring to detect cyber threats
()
5. Respond to Cybersecurity Events
Incident management to respond to a cyber attack
()
6. Recover Capabilities after a Cybersecurity Event
Integrating cybersecurity into disaster recovery
()
Data backups to defend against ransomware and cyber threats
()
7. Secure Applications Including Cloud and Emerging Technologies
Application security to mitigate data breaches
()
Cloud security to protect cloud data from threats
()
Leverage AI systems securely and responsibly
()
Conclusion
Additional resources
()
Ex_Files_Building_and_Auditing_Cybersecurity_Program.zip
(47 KB)
Glossary_BuildingAuditing_CybersecurityProgram.zip
(40 KB)