User:Shawndouglas/sandbox/sublevel3

From LIMSWiki
Jump to navigationJump to search
Cybersecurity Controls - Lunch N' Learn Session (37382400940).jpg

The planning is in the rear-view mirror, the implementation is complete, and your organization is nestled behind a warm layer of technological and process-based security. Pat yourselves on the back and call it "mission accomplished," right? Well, not quite. The mission of cybersecurity is never-ending, as is the adaptation and assault of cyber criminals. The final component of a successful cybersecurity plan involves monitoring and assessing the effectiveness of the plan, and updating it when necessary. This is where those performance indicators (5.4) you developed truly come into play. Based on your cybersecurity goals and objectives, those performance indicators are tied to monitoring systems, audit controls, and workflow processes. Questions worth asking include[1][2][3]:

  • Do the indicators seem to be measuring what your organization intended?
  • Are trends accurately being identified out of the data, or is the data simply confounding?
  • Are the detection settings doing their job, or are attacks getting through that shouldn't be?
  • Are appropriate cybersecurity test procedures and tools implemented and used by qualified personnel?
  • Is enough data being captured and documented?
  • Are emails and alerts actually being received and acted upon?
  • Are too many false positives being generated?

References

  1. Downing, K. (December 2017). "AHIMA Guidelines: The Cybersecurity Plan" (PDF). American Health Information Management Association. https://journal.ahima.org/wp-content/uploads/2017/12/AHIMA-Guidelines-Cybersecurity-Plan.pdf. Retrieved 23 July 2020. 
  2. Lebanidze, E. (2011). "Guide to Developing a Cyber Security and Risk Mitigation Plan" (PDF). National Rural Electric Cooperative Association, Cooperative Research Network. https://www.cooperative.com/programs-services/bts/documents/guide-cybersecurity-mitigation-plan.pdf. Retrieved 23 July 2020. 
  3. Lago, C. (10 July 2019). "How to implement a successful cybersecurity plan". CIO. IDG Communications, Inc. https://www.cio.com/article/3295578/how-to-implement-a-successful-security-plan.html. Retrieved 23 July 2020.