You are on page 1of 1

Va Cy Ld

Vulnerability
assessment Elements of Cybersecurity Roles Understand
cyber risk by
business unit,
Set and lead
technology
strategy
site, risk owner

Id Tl Es Ri As Ap Cb Sp
Identify and Map and monitor Establish Understand Assign risk Get board buy-in Prioritize cyber Sponsor
report CVEs threat landscape infosec vision risk appetite owners, and and approval risk and accept cybersecurity
of the board set goals certain risk items initiatives

Pr Sc Cm Bu Re Cr Tr Dm
Prioritize Evaluate Ensure Set budgets, and Report on Create and Demonstrate risk Report on
vulnerabilities security control organization estimate costs cybersecurity execute trending over time risk reduction
effectiveness is compliant effectiveness operational plan over time

Pa De
Manage patching
activities
Deploy SIEMs and
other SOC tools
In Ca Dt Re Bc Pt
Discover and Categorize Get full details Understand Understand Improve
analyze asset assets by subnet, on each asset relationships b/w business criticality relationships with
inventory location, etc. assets and users for each asset Infosec partners
Co Al incl. admins

Collaborate Prioritize
with IT, Dev, SOC alerts
and SOC teams

Vulnerability
Management
Risk
Analysis
CISO
Im Sa Np Dr Vn
Security Design and Develop security Identify new Establish Lead vendor
Architecture implement network architecture problem areas to disaster recovery selection
Security and computer be addressed procedures
CIO IT Manager
Operations security

You might also like