Cybersecurity strategies summary
We have reviewed several popular cybersecurity strategies. These strategies include:
- Protect and Recover Strategy
- Endpoint Protection Strategy
- Physical Control and Security Clearances Strategy
- Compliance as a Cybersecurity Strategy
- Application-Centric Strategy
- Identity-Centric Strategy
- Data-Centric Strategy
- Attack-Centric Strategy
We also discussed Zero Trust, which I concluded wasn’t a strategy in the same way as the others on the list are.
A summary of my CFSS score estimates for these strategies is provided in Table 9.12. As you can see, I gave the Attack-Centric Strategy the highest estimated CFSS score. In my view, it is the only strategy that has the greatest potential to help organizations address the cybersecurity fundamentals, mitigate the Cybersecurity Usual Suspects, and potentially help implement advanced capabilities:
Cybersecurity... |