An effective cyber security management regime requires the integrated operation of a professional cyber security team to undertake activities that include risk assessment, vulnerability detection, mitigating security controls, measurement of their effectiveness and finally the visibility and reporting of residual risk.
Download the PDF now to discover the top 10 questions about cyber security management that will assist Directors and senior Executives in interpreting cyber security information and prompt deeper inquiry where KPIs clearly point to the need for more detail.