Cybersecurity Strategies
Every enterprise should have a cybersecurity strategy, and the CISO of each organization should be able to articulate it. Whether your organization has a strategy or not, I hope this chapter provokes some thought and provides some tools that are helpful. In this chapter, we’ll cover a sampling of cybersecurity strategies that have been employed over the past two decades, including:
- Protect and Recover Strategy
- Endpoint Protection Strategy
- Physical Control and Security Clearances Strategy
- Compliance as a Security Strategy
- Application-Centric Strategy
- Identity-Centric Strategy
- Data-Centric Strategy
- Attack-Centric strategies
- Zero Trust
- A brief look at DevOps
Let’s begin by discussing which strategy is the right approach for your organization.