Difference between revisions of "User:Shawndouglas/sandbox/sublevel3"
Shawndouglas (talk | contribs) |
Shawndouglas (talk | contribs) |
||
Line 1: | Line 1: | ||
Your organization now recognizes the importance of incorporating after-action reports and internal lessons learned into the existing cybersecurity plan. But we don't only learn from our own "blundering." You're not operating in a vacuum; other businesses are out there having the same types of successes and failures. What have they learned, and what have they improved? Determine what outside sources you should look towards for said lessons. Most likely this will involve looking to events that transpired in your industry, e.g., clinical laboratories looking to the healthcare industry and retailers looking to other retail security failures. In the healthcare realm, ''[https://www.healthcareitnews.com/category/resource-topic/privacy-security Healthcare IT News]'' has been tracking and conglomerating cybersecurity news, videos, inforgraphics, and projects for several years now. In the industrial world, [https://www.nozominetworks.com/in-the-news/ Nozomi Metworks] has been doing a respectable job of conglomerating cybersecurity news in multiple languages. In particular, focus on incorporating lessons learned that address an obvious gap in your cybersecurity infrastructure and plan. | Your organization now recognizes the importance of incorporating after-action reports and internal lessons learned into the existing cybersecurity plan. But we don't only learn from our own "blundering." You're not operating in a vacuum; other businesses are out there having the same types of successes and failures. What have they learned, and what have they improved? Determine what outside sources you should look towards for said lessons. Most likely this will involve looking to events that transpired in your industry, e.g., clinical laboratories looking to the healthcare industry and retailers looking to other retail security failures. In the healthcare realm, ''[https://www.healthcareitnews.com/category/resource-topic/privacy-security Healthcare IT News]'' has been tracking and conglomerating cybersecurity news, videos, inforgraphics, and projects for several years now. In the industrial world, [https://www.nozominetworks.com/in-the-news/ Nozomi Metworks] has been doing a respectable job of conglomerating cybersecurity news in multiple languages. In particular, focus on incorporating lessons learned that address an obvious gap in your cybersecurity infrastructure and plan. | ||
==Citation information for this chapter== | |||
'''Chapter''': 5. Develop and create the cybersecurity plan | |||
'''Title''': ''Comprehensive Guide to Developing and Implementing a Cybersecurity Plan'' | |||
'''Edition''': First | |||
'''Author for citation''': Shawn E. Douglas | |||
'''License for content''': [https://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 International] | |||
'''Publication date''': July 2020 | |||
<!--Place all category tags here--> |
Revision as of 20:27, 16 February 2022
Your organization now recognizes the importance of incorporating after-action reports and internal lessons learned into the existing cybersecurity plan. But we don't only learn from our own "blundering." You're not operating in a vacuum; other businesses are out there having the same types of successes and failures. What have they learned, and what have they improved? Determine what outside sources you should look towards for said lessons. Most likely this will involve looking to events that transpired in your industry, e.g., clinical laboratories looking to the healthcare industry and retailers looking to other retail security failures. In the healthcare realm, Healthcare IT News has been tracking and conglomerating cybersecurity news, videos, inforgraphics, and projects for several years now. In the industrial world, Nozomi Metworks has been doing a respectable job of conglomerating cybersecurity news in multiple languages. In particular, focus on incorporating lessons learned that address an obvious gap in your cybersecurity infrastructure and plan.
Citation information for this chapter
Chapter: 5. Develop and create the cybersecurity plan
Title: Comprehensive Guide to Developing and Implementing a Cybersecurity Plan
Edition: First
Author for citation: Shawn E. Douglas
License for content: Creative Commons Attribution-ShareAlike 4.0 International
Publication date: July 2020