The CISO Den
Published in

The CISO Den

Cycle Patterns in Cybersecurity Management

Find the stuff that need fixing and fix it

Photo by Joel Fulgencio on Unsplash

Discovery Cycle

Prioritization Cycle

Verification Cycle

Remediation Cycle

break down by team
break down by type of weakness

Knowledge Management Cycle

Compliance Management Cycle

Activity Management Cycle

Quality Management Cycle

Resources Management Cycle

Symptoms

Conclusion

To learn more

--

--

The CISO Den is about how to deliver the best cybersecurity for organizations, no matter the size, budget, industry or country

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store