Chief Information Security Officer (CISO)
A CISO is an executive focused on implementing, maintaining, and continually updating an organization’s cybersecurity posture. They’re typically the most senior-level person at an organization charged with cybersecurity, and they work alongside a suite of other C-level executives.
The cybersecurity buck stops with the CISO, and their team is responsible for preventing cybersecurity incidents and—if and when they occur—responding to those incidents.
Depending on their organizational maturity and how far they’ve come on their cybersecurity journey, not all organizations will have a CISO in place. In some cases, this role is filled by a lower-level security professional or an IT team member. Many small businesses outsource IT and security altogether to a managed service provider (MSP) or managed security service provider (MSSP). Sometimes this is done via a virtual CISO (vCISO), a role some MSPs and MSSPs have started providing to clients who need CISO level support but do not plan to bring the role in-house.
Continuous Monitoring
Once organizations have adopted controls to protect their data and systems, they need to ensure that those measures continue to work. Continuous monitoring means keeping an eye on an organization’s system/environments, assessing whether controls continue to be effective, and addressing any gaps.
The National Institute for Standards and Technology (NIST), includes continuous monitoring as part of a six-step risk management framework. They have released an FAQ with more details, definitions, and context around the role of continuous monitoring in managing risk.
Controls
In cybersecurity, controls are the processes, tools, and policies in place to prevent or limit the reach of a cybersecurity incident.
Cloud Computing
Cloud computing refers to software and services hosted on remote servers, rather than on local servers, machines, or endpoints.
Cyber Hygiene
Cyber hygiene, or cybersecurity hygiene, refers to a set of practices organizations and individuals perform regularly to ensure the safe handling of critical data, secure networks, and enterprise-wide assets. By maintaining properly functioning devices, organizations can better protect themselves from malware, cyberattacks, or data breaches.
Learn more about cyber hygiene >>
Cyber Resiliency
Cyber resiliency is the ability of an IT system to remain operational and provide services in the event of unexpected disruptions, outages, or other unforeseen circumstances. It is the capacity for a system to recover from a disruption quickly and effectively and return to normal functionality.
Learn more about cyber resiliency >>
Cryptography
Cryptography is a field focused on the processes, technologies, and approaches used to secure information as it moves from one party to another. Cryptography protects information—such as emails and files—from being read by people outside the sender and recipient. For example, encryption and decryption are two cryptography techniques that scramble and unscramble code according to a cipher, rendering information unreadable to outside parties. Cryptographical approaches are considered best practices in cybersecurity.
Cybersecurity
Cybersecurity, broadly speaking, is the field or practice of securely managing and protecting the confidentiality, integrity, and availability of devices, environments, assets, and data from bad actors. These bad actors can be external (such as hackers) or internal (such as disgruntled employees, partners, or vendors).
Learn more about what is cybersecurity >>
Cybersecurity Framework
A cybersecurity framework is an organized, formalized set of processes, procedures, best practices, and requirements designed to ensure a high level of security. There are numerous frameworks globally. For example, one of the most well-known is the National Institute of Standards and Technology (NIST)’s Cybersecurity Framework.
Cyber Threat Intelligence and Information Sharing
Cyber threat intelligence (CTI) is the process of collecting, analyzing, and integrating information about existing or potential threats to an organization’s digital infrastructure. It’s a crucial step in developing effective cybersecurity management protocols against an ever-changing landscape of cyber threats and a vital component of an organization's overall security apparatus.
Learn more about cyber threat intelligence >>