Articles
Welcome to our articles page. You will find articles on various aspects of Information Security and Business Continuity promulgated here. This is done on an ongoing basis for free of cost for your education. We emphasize your cooperation to refrain from redistributing our content for commercial purposes without our prior written consent. However, you are free to use it for your personal (educational and research) purposes or to implement a certain roadmap or strategy in your organization.
We partner with CyAlpha — a Calgary-based Cyber consulting firm, to offer you the above services.
Security Data Analytics and Reporting, Developing reporting viewpoints: CISO
The security reporting viewpoint used by CISOs consists of views such as the state of security compliance, security posture and cybersecurity trends. These views must be meaningful to the CISO and thereby help them make decisions that retain or improve organizational cybersecurity posture. This also helps the CISO demonstrate the effectiveness of the organization's security investments to the board of directors (or whoever they’re reporting to).
Security Data Analytics and Reporting: Organizational requirements
Reporting expectatoin varies depending on the owership and industry of an organization. This article will focus on how SDAR expectations and requirements differ, based on organizational type.
Security Data Analytics and Reporting: Stakeholders
The first step a business must take when implementing SDAR is to identify who its stakeholders are. Next, the business should analyze their stakeholders’ high level requirements, technology domains and viewpoints. Finally, the business can tie all this together and implement SDAR.
This article will explore the different types of stakeholders an organization can have and their respective responsibilities.
SIEM, SOAR and SDAR
SDAR is quite robust and can be a useful cybersecurity tool, even without accompanying SIEM and SOAR systems.
Security Data Analytics and Reporting: Business Expectations and value - Part 1
There are several distinct people and entities that are connected to an organization, each of which have their own unique expectations of the business. These same stakeholders also expect a convenient and secure experience when they interact with the business’ technology.