Summary
By now, you should know the value of having cybersecurity policies and procedures in place and the importance of investing time and resources in creating them.
You learned how to implement the CUDSE method to create and manage cybersecurity policies and procedures like a pro! You then expanded your knowledge of compliance and learned how to achieve and manage it.
However, staying compliant requires assessment, so you also expanded your knowledge on the different types of audits and how to deal with them.
But since audits are complex and expensive, you learned about a great tool to perform a self-evaluation of your cybersecurity level in a faster, easier, and more effective way, with the implementation of ECM2.
In the next chapter, we will see a series of systems, tools, and techniques to deal with the most challenging, complex, and vulnerable layer of any IT infrastructure: Layer 8, also known as the Users layer!