The service level perspective – cyber intelligence – Data Exposure and Sharing

  • Who needs to know my info?
    • The three services are just a few examples, but some other services may want to know some information that has been developed by the teams. Identify which services they are and figure out:
  • What do the other services need to know?
    • We need to be able to figure out what the other teams need to know and at what frequency
    • Develop Key Risk Indicators among services
    • Automate to create the operational cyber intelligence dashboard
  • How will we track results? How do we ensure that the results that are found are mitigated?
    • The left-hand needs to know what the right hand is doing. It will be the same with the teams that are sharing this information with each other.
    • If the red team and vulnerability management team found the same vulnerability in the base processes, it would be good to know (at the same time) when the vulnerability was fixed by the Risk Mitigation process.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.17.6.75