Priorities
Photo by Ch_pski on Unsplash

Priorities

In One of the biggest challenge in Cybersecurity is the usage of resources. This leads to a need of choosing between different needs. Hence we need to prioritize between different perspectives.

This will provide a tactical weight to the decision. Based on the tactical weight, we will be able to define what things that will be prioritized in front of other things.

Tactical Security is to do Prioritizations between different options in a structured way. It can be defined as he process of using evidence-based methods to rank and address different cyber security threats based on their likelihood and impact. A way of describing the interrelation between different factors that will contribute to the decision is us used a spider chart to visualize the relationships.

No alt text provided for this image

This will visually provide clues on where the priorities are for the organization. This will also provide input for a SWOT analysis of the cybersecurity organization.

A?prioritization matrix template?can then be used to list all criteria against the alternatives, attach weights to the criteria, and conduct the prioritization exercise.

Some example matrix templates are provided here:


In addition to the above mentioned discussion, there is another key point from 10 Laws of Cybersecurity Risk

Ruthless Prioritization is a survival skill?– Nobody has enough time and resources to eliminate all risks to all resources. Always start with what is most important to your organization, most interesting to attackers, and continuously update this prioritization.


No alt text provided for this image


Backlink

Forwardlink


#Tacticalsecurity

Johan Walldoff - CISSP, CISM, CRISC, CCSP

Senior Cyber Security consultant CISSP/CISM/CRISC/CCSP and music producer

1 年

Priorities will always be a challenge

回复

要查看或添加评论,请登录

Niklas Fredengren的更多文章

  • Multinomial decisions

    Multinomial decisions

    As part of the research for this article series, I read a research paper on tactical behaviour of bicyclists. One thing…

  • Investment

    Investment

    The reason for that is that security is not usually an investment that provides profit but loss prevention. So what is…

  • Budget

    Budget

    With evolving and emerging cyber threats, setting aside enough budget for cyber security initiatives is increasingly…

  • Value

    Value

    Measuring cybersecurity value But how can a company effectively measure its cybersecurity program and whether the…

  • Cost

    Cost

    We all know that Cybersecurity has a cost. I define it as Cost of Doing something and Cost of Inaction.

  • Proposed solution

    Proposed solution

    Solutions for handling Cyber security issues, can be divided in to three major solutions: Avoid. If the risk outweighs…

    2 条评论
  • Tactical Output

    Tactical Output

    The Tactical output is the outcome after all perspectives are taken in to account. This will be the a definition on…

  • Weight

    Weight

    To be able to prioritize what should be worked on, there is a need to describe what importance each threat has. One…

  • Tactical Input

    Tactical Input

    Today, security operations do not suffer from a "Big Data" problem but rather a "Big Data Analysis" problem. Let's face…

  • Threats

    Threats

    Threats would be all the things that will affect your organization possibilities to accomplish the Strategical and…

社区洞察

其他会员也浏览了