Professional Documents
Culture Documents
How - To - Present - Cyber - Security - To - Senior - Management - Complete - Deck - Slide07 (7 Files Merged)
How - To - Present - Cyber - Security - To - Senior - Management - Complete - Deck - Slide07 (7 Files Merged)
How - To - Present - Cyber - Security - To - Senior - Management - Complete - Deck - Slide07 (7 Files Merged)
This slide portrays information regard ing assessment of current cybersecurity framework on certain
standards.
I
Protect Access Control e
®r
Add text here 0
Threat Intelligence e
®.r l
Detect Continuous Monitoring
Commun ication
e
e
@)---- Response Response Planning 0
Add text here e
o Inciden t recovery e
1 Recovery Add text here 0
Add text here e
@Pr
•
Optimizing Cybersecurity Framework Roadmap
Thisslide portrays information regardingoptimization of current cybersecurityframework. The ITdepartment will require to fulfill
crucial activitiesin specifictimeframe.
Immediate (0-6 Months} Short Term (3-12 Months} Long Term ( 12-> Months}
Implement control
>» »» 0
l
envi ronment
Network upgrajat ion > Record management Platform upgr<dation
Implement security »» »» 0
processes Security assessment
Handlingthreats Patch management
&
maintenance
Add text Add text
here here Add text here
Add text here Add text here Add text
here
Phase Description
) Incident
Ticket creation ) Service request
u Critical
u High
,_ Incident prioritization
u
Medium
u Low
1
6 Incident closure Add text here
I I
lillll
Local area W ide area
network Mainframe network
systems
Contingency plan
l
./ ./ ./ ./
coordination with syst em ./
security controls
Vendors coordination ./ ./ ./
Add text ./ ./ ./
here
Syst em ./ ./ ./ ./ ./
backups
Remot e access and ./ ./
wireless technologies
integration
Add text here ./ ./
VRlfiall• This sli<e is lo:>% editable. Adapt it to your needs and captureyour
audience'sattention.
Cybersecurity Maintenance Checklist
Thisslide providesinformation regarding service maintenance checklist that is prepared for the client and the activities menticned will be performed on daily, weekly, monthly orqcarterly
basis.
0 0 0 0
+ Back up
monitoring ./ ./
... [ ] Preventive
Maintenance ./
.. .
[ )
Virus
Scanning ./ ./
G,;:J Security
Patches
•
./
Disk Error
Checking ./ ./
Executive
6' Reporting ./ ./
Review and Planning
Meeting
111111111111111111111111111111 1111111111111111111111111111111111111111111111111111111111111111111111111111111 1111111111111111111111111111111111111111111111111111111111111111111111111111111 1111111111111111111111111111111111111111111111111111111111111111111111111111111 111111111111111111111111111111
This sli<e is lo:>% editable. Adapt it t o your needs and capture your audience's
attention.
Dashboard - Incident Tracking
Thisslide portrays information regardingthe dashboard that firm willtra:k various incidents detected. These incidents will be managed in order to avoid cybersecurity
risks.
-
!!!!! Pa tch Operating Systems
11111111111111111111111111111111
13 I Restrict Admin
Privileges
11111111111111111111111111111111
- - - -
To p 4 To p 4
Incidents Open 0 Cl o sed O Incidents » Open 0 Cf oscd 0 Incidents Open 0 Cl osed O Incidents >' O p en 0 Closed 0
>> >>
Disable untrusted
Microsoft Office Macros User Application Hardening Multi-Factor Authentification Daily backup of important data
A lerts lHr 24Hr A lerts lHr 24Hr A lerts lHr 24Hr A lerts lHr 24Hr
Incidents Open- a Clos ed- a Incidents Open- a Closed- a Incidents Open- a Clos e d- a Incidents Open- a Clos e d- a
* M M¥f* This sli<e is lo:>% editable. Adapt it to your needs and captureyour
audience'sattention.
Cyber Security Governance
Thisslide portrays information about how firm will assess different alternate siteson certain parameters such asimplementati3n cost, hardware and telecommunication connection
requirement, setup time, location.
Steering Committee
Risk Management/Information Security Security Requirements
and Executive
Strategy
Management
Implementation
Security Objectives
Monitor/Metrics
Reporting Trend Analysis
I