Abstract
Once the enterprise has its cybersecurity controls and capabilities, and can quantitatively assess its cybersecurity posture and operate its cybersecurity processes, it is time to engage with the business at a programmatic level and operate a comprehensive cybersecurity program. This chapter describes how the enterprise can use iterative assessments and prioritization to select, plan, resource, and execute progressive improvements to its cybersecurity posture. This cybersecurity program utilizes all of the management tools described in this book, including: (1) a framework for managing a cybersecurity program, (2) a quantitative method for assessing the program and identifying strengths and weaknesses, and (3) ongoing operations and cycles of improvements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam
About this chapter
Cite this chapter
Donaldson, S.E., Siegel, S.G., Williams, C.K., Aslam, A. (2015). Managing an Enterprise Cybersecurity Program. In: Enterprise Cybersecurity. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6083-7_14
Download citation
DOI: https://doi.org/10.1007/978-1-4302-6083-7_14
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-6082-0
Online ISBN: 978-1-4302-6083-7
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)