Abstract
To maintain an effective cybersecurity posture, the Chief Information Security Officer (CISO) maintains a number of enterprise operational processes to include the following:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam
About this chapter
Cite this chapter
Donaldson, S.E., Siegel, S.G., Williams, C.K., Aslam, A. (2015). Cybersecurity Operational Processes. In: Enterprise Cybersecurity. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6083-7_20
Download citation
DOI: https://doi.org/10.1007/978-1-4302-6083-7_20
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-6082-0
Online ISBN: 978-1-4302-6083-7
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)