Aligning Security with Business
Wearing two hats
Wearing two hats
Adherence to laws, regulations, standards, and policies
Current performance versus desired performance
Overall management of the organization's IT resources
Policies, Standards, Procedures, and Guidelins
Managing and Prioritizing Risks
CIS, ISO, NIST etc.
Identify, assess, and prioritize risk
Risk Management Terminologies
Physical, Technical, Administrative, etc.
No one should be trusted by default