Establish Programs | |||
Cybersecurity | Third Party Risk Management | Incident Response | Application Security |
Risk Management | Metrics | Vulnerability Management | Insider Threat |
Conduct Assessments | |||
Application Security (DevSecOps) | Vendors and Service Providers | Cybersecurity Program | Ransomware |
Business Process Risk | Incident Response | Line of Business Risk | FMEA Process Risk |
Security Operations Center (SOC) | Fraud Prevention | Insider Threat | Security Awareness Program |
Mergers and Acquisitions | Infrastructure Security | Zero Trust Security Model | Threat Landscape and Controls |
Cyber Exercise Program | Penetration Test Program | Cybersecurity Function | Agile Security Testing |
Prepare For | |||
Third Party Assessment | The Company to go Public | Assessment by a Regulator | Assessment by an Aquiring Company |
Develop | |||
Roadmap / Multi-Generational Plan | Annual Program Goals | Metrics, KPIs and KRIs | GRC Business Requirements Document |
Vulnerability Management Plan | Process Diagrams | Internal Control Framework | Cloud Security Strategy |
Risk Management Strategy | Risk Scenario Inventory | Incident Response Plan | Risk Register Process |
Security Management Plan | Communications Plan | Crisis Communications | Workforce Development Plan |
Conduct Training | |||
Incident Response | Security Awareness | Cybersecurity Assessments | Third Party Risk Management |
Metrics, KPIs and KRIs | Cybersecurity Risk Management | Fraud Prevention | Risk Register Process |
Career Advice: Cybersecurity Professionals | Career Advice: Cybersecurity Leaders | Program Maturity | Executive Coaching |
Present To | |||
Executives | Regulators | Board of Directors | The CISO |
Create Program Documentation | |||
Security Policies | Program Overview Deck | Procedures Manuals | Mission Vision Statement |
SWOT Analysis | Plan of Action and Milestones | Threat Landscape Advisories | Risk Tolerance Statement |
Security Contract Addendum | Program Welcome Packet | Security Awareness Newsletter | Control Deployment Risk Model |
Writing Services | |||
Cybersecurity Article - Ghost Writer | Cybersecurity Article | Cybersecurity Article with Promotion |