Professional Documents
Culture Documents
Chief Cyber Security Officer: Security Leadership Security Governance Security Risk Management Security Architecture
Chief Cyber Security Officer: Security Leadership Security Governance Security Risk Management Security Architecture
Security
Leadership
Security
Governance
Security Risk
Management
Security
Architecture
Program
Management
Engage
Stakeholders
Manage RM
Policy
Facilitate Biz
Architecture.
Manage Strategic
& Tactical Plans
Manage
Committee ToR
Facilitate RM
Appetite
Oversee
Information Arch.
Manage the
Budget
Facilitate
Decision Points
Align with
Enterprise Risk
Consult on
Application Arch.
Manage
Communications
Allocate
Resources
Lead Risk
Assessment
Consult on
Technology Arch.
Manage the
Team & Projects
Allocate Capital
Lead Risk
Treatment
Manage the
Roadmap
Lead SIRT
Manage External
Inquiries
Manage Risk
Registry
Manage Security
SLA / OLA
Lead Due
Diligence
Manage
Compliance
Manage Service
Provider Risks
Manage
Vulnerabilities
Lead Monitoring
& Reporting
Lead
Investigations
Lead Monitoring
& Reporting
Manage related
Docs & Records
Manage Audits
This information has been shared freely by Mark E.S. Bernard. If you find it useful please acknowledge this contribution.
If you would like additional information or assistance with the customization and implementation of a balanced risk
management process for your security program then please contact Mark @ 604-349-6557 or mesbernard@gmail.com