Cybersecurity is gaining importance due to the increased number of cyberattacks and the huge losses that victims are reporting. In many organizations, however, the implementation of cybersecurity comes as a consequence of a threat or an attack. Organizations can decide to mount reactive, proactive, and operational cyber defenses, or a combination of the three depending on financial capabilities and levels of exposure to threats. This chapter will go through the three types of approaches to implementing cybersecurity and help you to choose the optimal one for your company.
In this chapter, we will cover the following topics:
- Proactive cyber defense
- Reactive cybersecurity
- Operational security
- The significance of the three pillars of security