A security culture based on Risk, created asymmetric views about company security maturity, across different security functions. My paper wants to suggest an integration and re-design, based on a logical approach and well known methodologies, only moving the focus away from the risk model.
The target of this soft talk is to show how each security function should work in concert with the rest of the organization, providing constant feeds to other security teams.
The take-away of the talk should be to stimulate the readers to review collaboration across enterprise security functions and automation of input feeds and security team outputs.
W.H.Bender Quote 65 - The Team Member and Guest Experience
Cyber Security integration
1. - Why is security integration important?
- How do you integrate different security functions?
- How do you maintain a security integration?
- How do you measure results?
“The information in this document is provided “AS IS” with no warranties, and confers
no rights. This document does not represent the thoughts, intentions, plans or
strategies of my employer. It is solely my opinion. Product names, logos, brands, and
other trademarks featured or referred to within the document are the property of their
respective trademark holders.” Please note, I am not a law expert but an IT guy, if I
forgot to mention something let me know.
Material under Creative Commons license.
Type: Attribution-NonCommercial-NoDerivs
Credit Images: