Four step Cybersecurity process and more

When  organizations were implementing systems, security was an afterthought… now after couple of decades we are talking of implementing the cybersecurity framework in which privacy and civil liberties is kind of after thought as it shows up in an appendix by itself. It could also be that it is so important, that we do not want another  BAH contractor breach a.k.a NSA  .. which could have been avoided if the  cybersecurity Framework were in place.

Four step  Cybersecurity process

Step 1.  Cyber Hygiene  a.k.a awareness – Train and educate your intangible assets – PEOPLE

Step 2. Cyber Process a.k.a Business –   Know and document details of your Business – PROCESSES

Step 3  Cyber Policies a.k.a Regulation ( compliance) – Is you Business in compliance – POLICIES

Step 4  Cyber Products a.k.a Technologies – Using technology to solve business issues – PRODUCTS

At every step, identify the risk and a risk mitigation strategy ….

Today marked the first day of the 5 Cybersecurity Framework  Webcast:

North Carolina State University will host a live webcast of the morning sessions. The webcast will be made available for playback after the event.

Day 1:

Day 2:


Draft Agenda (Nov. 8, 2013)

Related Project(s):

Cybersecurity Framework website:

News 10 new results for cyber security
Cybersecurity and Counter-Terrorism Expert Richard Clarke MarketWatch

Richard Clarke – former Cybersecurity Czar and National Coordinator for Security,  and governments on cybersecurity and counterterrorism, Clarke will present 
See all stories on this topic »
Cyber security roundtableThe Advocate

The MHCC cyber security division hosted a roundtable discussion on emergency management on Tuesday as part of its “Cyber Security Speaker Series.”.
See all stories on this topic »
Lockheed Martin—Cybersecurity Is A Cool Career For Girls (STEM)SatNews Publishers

[SatNews] University of Maryland College Park will welcome more than 350 middle school students at the Cool Careers in Cybersecurity for Girls Workshop 
See all stories on this topic »
Cyber security expert Melissa Hathaway warns governments invest ABC Online

A former cyber security advisor to President Barack Obama and George W Bush is warning computer hackers are becoming more sophisticated and pose an 
See all stories on this topic »
Hanover handles UK cybersecurity for MicrosoftPRWeek

LONDON: Hanover is putting together a policy roundtable on cybersecurity for Microsoft after securing all of its UK public affairs business earlier this year.
See all stories on this topic »
Chertoff Says US Disengaging Won’t Ease Cybersecurity RisksBusinessweek

Michael Chertoff, who was Homeland Security secretary under President George W. Bush, provides his outlook for the cybersecurity industry in the Nov. 18 issue 
See all stories on this topic »
Websense Security Labs Reveals Eight Cybersecurity Predictions Broadway World

SAN DIEGO, Nov. 14, 2013 /PRNewswire/ This year, cybersecurity took center stage with nation-state attacks, numerous high-profile data breaches and 
See all stories on this topic »
Cyber security laws hailedPeninsula On-line

SINGAPORE: Experts said Singapore’s cyber security laws are robust, especially after amendments to the Computer Misuse Act in 2013. Still, they caution that 
See all stories on this topic »
Tenable Network Security Named a Deloitte 2013 Technology Fast Fort Mills Times

COLUMBIA, Md. — Tenable Network Security today announced it was named a Deloitte Technology Fast 500™ Award Winner for 2013, and was included on a 
See all stories on this topic »
Experts propose better cybersecurity information-sharing modelsTechTarget

BOSTON — Better cybersecurity information sharing has long been a priority for the security industry, but significant hurdles have always halted the progress of 
See all stories on this topic »
Blogs 9 new results for cyber security
Cybersecurity Legislation Gets Renewed Push From Financial Firms Ryan Tracy

Top financial-industry lobbyists pressed senators to move forward with cybersecurity legislation, part of an effort to re-energize a campaign that has lost steam 
Washington Wire
Bridging the Cyber Security Skills Gap | IBM Curiosity ShopIBM Curiosity Shop

With cyber security threats growing in number, complexity, and scale each year, future IT security and business leaders need a broader range of skills than ever 
IBM Curiosity Shop
Purdue Cybersecurity Experts Assist In Cyber Attack Drill | News Network Indiana

A nationwide cyber attack drill is underway, testing how the power grid could be compromised and Purdue Cyber Forensics members are involved.
WFIU Local News Podcast
Authorities investigating cybersecurity incidents targeting Dissent

U.S. authorities are investigating a series of cybersecurity incidents targeting the website at the center of President Obama’s healthcare law,
Steve Daines Questions Cybersecurity Official About Risks in Jon King

Today, November 13, Montana Congressman Steve Daines questioned Roberta Stempfley, the Assistant Secretary of the Department of.
News Talk KGVO Radio
Uncertainty over UR cybersecurity | Campus TimesMatt Shinseki

Student life, from loans and job applications to Facebook posts and Amazon purchases, has increasingly moved online. But with the rise of the Internet, a new 
Campus Times
Summary of Cyber Security Awareness Seminar, Lahore University DRF_Admin

The second Cyber Security Awareness Seminar was held at LUMS in collaboration with the Cyber Security Task Force and the Pakistan Information Security 
Digital Rights Foundation
Webinar series on cybersecurity for journalists offered© 2011, All rights reserved.

The webinar series, offered by the National Press Foundation, consists of three courses: “Protecting Information,” “Protecting Whistleblowers and Other Sources”
We All Need This: Invincea Launches Small Business Offering To FedCyberTeam

Lack of access to advanced security technology common to larger enterprises makes  In addition, organized cyber-crime now targets small business financial For the Federal Cyber Security and Cyber Operations Practitioners

1 Comment

Filed under Soft Skills

One response to “Four step Cybersecurity process and more

  1. Reblogged this on From the Desk of Amitabh B Ghosh and commented:

    ” We want that education by which character is formed, strength of mind is increased, the intellect is expanded and by which one can stand on one’s own feet.” – Swami Vivekananda