You are on page 1of 1

Dela Cruz, Jovineil V. Feb. 24.

2024
CITE 007 – CS32S1 Information Assurance and Security

Cybersecurity Activity

1.) What do you think the article is about?

This article talks about the importance of having a good cybersecurity team and outlines
guidelines for the management of the team efficiently. This article emphasizes the crucial roles
that the team members do in maintaining the security. It also points out the need for
collaboration of both cyber security and the business goals. Lastly it includes the necessary
skillsets and traits for an excellent cybersecurity team. There are also 7 included roles and its
corresponding responsibility in a team.
2.) Among the seven (7) roles and responsibilities of cybersecurity structure, which one do
you think is the most important?

Among the 7 roles, I cannot specifically choose what is the most important roles as each
role has its own purpose. They all play a specific role that makes the teamwork in a well-
rounded manner. Therefore, I cannot choose from the seven roles as each one is different from
the other.

Although, if I really need to choose from the 7 roles I would choose the Ability to Work
across the organization. This helps with communicating, collaborating, and cooperating with
the members of the cybersecurity team even the other departments.

3.) Do you agree with the article? Why or why not?


Yes this article points out valid points that are very important for the effective management
for cybersecurity. This also emphasizes the importance of team members knowing their
specific roles and it significance. This also points out the need for cybersecurity to support the
business rather than hinder its business operations. It is a good article as it really highlights the
key aspects for a successful cybersecurity management. This also offers a structured
framework in specifying roles and its responsibilities within a cybersecurity team. In
conclusion, the guidelines that are in the article are in line with the industries best practices
and are likely to help enhance the overall security posture of an organization.

You might also like