Cybersecurity Strategies
Every enterprise should have a cybersecurity strategy and the CISO of each of these organizations should be able to articulate it. Whether your organization has a strategy or not, I hope this chapter provokes some thought and provides some tools that are helpful.
In this chapter, we'll cover the following topics:
- A sampling of cybersecurity strategies that have been employed over the past two decades, including:
- The Protect and Recover Strategy
- The Endpoint Protection Strategy
- The Physical Control and Security Clearances Strategy
- Compliance as a Security Strategy
- The Application-Centric Strategy
- The Identity-Centric Strategy
- The Data-Centric Strategy
- Attack-Centric Strategies
- A look at DevOps
- A brief introduction to Zero Trust
Let's begin by discussing which strategy is the right strategy for your organization.
...