Cyber Security Building a Resilient Security Team

· Mark Hayward
Ebook
85
Pages
Eligible
Ratings and reviews aren’t verified  Learn More

About this ebook

Assessing Organizational Security Needs and Objectives (Excerpt)

This introductory section from Cyber Security Building a Resilient Security Team (Series 7) provides an excellent, strategic starting point for security leadership by defining how to establish the scope and priorities of a security program.

Core Strengths of the Passage

1. Strategic Focus on Stakeholders

The text correctly places stakeholder engagement as the critical initial step. By advising to start with executives, department heads, and IT personnel, it reinforces that security is a business risk problem, not just a technical one. This approach ensures the resulting security objectives are aligned with the organization's mission and risk tolerance.

2. Linking Business Value to Security Objectives

A key strength is the focus on assessing what the organization values most (intellectual property, customer privacy, system availability). This framing is essential as it grounds security objectives in tangible business outcomes, making it easier to justify resource allocation and build a resilient team structure.

3. Comprehensive Analysis Factors

The passage outlines a robust process for analysis by requiring review of:


Past Incidents: Using historical data to identify patterns and inform practices (e.g., focusing on data encryption after a breach).

Legal and Regulatory Obligations: Stressing the mandatory minimum standards and the necessary engagement with legal advisors to ensure compliance alignment.

This eBook is a valuable, management-level introduction that guides security leaders to properly scope their program by connecting business priorities, regulatory mandates, and historical risk. It establishes a strong business-first foundation for the subsequent discussion on team formation and resilience.

About the author

For over 20 years (or 23, depending on the source), they've been immersed in the world of digital security, developing and implementing robust controls to protect organizations from ever-evolving threats. Their experience includes working independently and with prominent organizations, including local and central government departments in the UK. A veteran of the UK Armed Forces, the author combines military discipline with deep industry expertise, offering insightful perspectives and a hands-on approach. They are passionate about sharing their knowledge and real-world experiences to illuminate the critical importance of cybersecurity in today's digital age, making complex topics accessible and engaging for all.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.