Identify
Develop organizational understanding to manage cyber risk across systems, assets, data and resources.
- Asset Management
- Business Environment
- Governance Risk Assessment
- Risk Management Strategy
Develop organizational understanding to manage cyber risk across systems, assets, data and resources.
- Asset Management
- Business Environment
- Governance Risk Assessment
- Risk Management Strategy
Develop and implement the necessary safeguards to ensure delivery of critical services.
- Access Control
- Awareness and Training
- Data Security
- Info Protection Processes & Procedures
- Maintenance
- Protective Technology
Develop and implement activities to identify the occurrence of a cybersecurity event.
- Anomalies and Events
- Security Continuous Monitoring
- Detection Processes
Develop and implement appropriate activities to act on a detected cybersecurity event.
- Response Planning
- Communications
- Analysis
- Mitigation
- Improvements
Develop and implement activities to maintain resilience plans and restore any resources or services that were compromised in a cybersecurity incident.
- Recovery Planning
- Improvements
- Communications
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum iaculis nisl sed dictum aliquam.