One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 6150878
Date de publication 2022-08-06 10:46:21 (vue: 2022-08-06 00:05:40)
Titre CISO workshop slides
Texte A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning. The title 'CISO Workshop: Security Program and Strategy' with 'Your Name Here' suggests it might be a template for use in a workshop/course bringing CISOs up to speed on the governance, strategic and architectural aspects of information security, but in fact given the amount of technical detail, it appears to be aimed at informing IT/technology managers about IT or cybersecurity, specifically. Maybe it is intended for newly-appointed CISOs or more junior managers who aspire to be CISOs, helping them clamber up the pyramid (slide 87 of 142):
Envoyé Oui
Condensat #82 142 :aside ;ms able about accidental account achieve act aimed all almost although altogether amount any anyway appear appears application appointed approach:how architectural are arguably arrangements artificial as:it aspects aspire attacks audience;cloud automation azure balanced beady been being below better brands bringing broader browsing bullets business busy but categories category caught centric check choice ciso cisos clamber clarify classic classical closer complex compliance comprehensive compromised concern concerns confuses confusing constructed context continuous control/drive cool corporate corresponding could counted course: naturally crude curious customer cyber cybersecurity cycle data dealing deck decks deliberate deming depth detail detailed details devsecops diagrams direction discontinuity discuss don downplaying driven either emphasises enable enablement enabling enterprise equate error especially even exactly example examples exploiting exposed externally face fact factor fail fairly favour field financial finite fires floods focus focused forms fraud free from full generally getting given glossy governance gripes happily has have help helping here hints how human idea ignoring illustrate implies implying improve improvement improvements improving incident incidental incidents included including indicate individual information informing inside intangible intellectual intelligence intelligence/machine intended intent interesting internal/external interruptions intrigued ironic it/technology its juggle junior just key knowledge later leading learned learning lessons let limited line look:business lot lots major malicious malware management managers many market marketing mature maturity maybe mean meaning means measure measured metrics metrics:clarity micro microsoft might missing mix modernization more morning much name narrow/specific naturally need newly next nice nicely normal not novel number numerous objectives objectives;hacking offered often one organisation other others out outcomes outdated overall own parameters part particular partner passwords patching per perceptions personality personally perspective plan plenty plus polish positive possibly posture powerpoint present presentation presenter prevent previous process program property protecting provided provoking pyramid quietly rapid rather rationally really realm reasonably recovery refer reference referring relating releasing relevant reliably remainder resilience:security resources response response: responses right risk sabotage said scorecard security see selected selection senior services set significant simple simultaneously sing sizeable slide slides software/systems some specifically specifically;devops speed stated strategic strategy style subtle such suggest suggested suggests support supposed supposedly sure take targeted technical template terms than thank thankfully theft them these things thinking those though thought threat threats three thrust tiny title towards training truly trust trusted two uncommon understand unless use useful user version very virtually vulnerability way weak well what whatever which who whole why wider within without workers workflow works workshop workshop/course workshop: worth would yer your zero
Tags Malware Vulnerability Threat Patching Guideline Medical Cloud
Stories Uber APT 38 APT 37 APT 28 APT 19 APT 15 APT 10 APT 34 Guam
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: