A Journey to the Highest Cybersecurity Maturity: Part 1

“Men wanted for hazardous journey”

Vicente Aceituno Canal
1 min read2 days ago
Photo by Annie Spratt on Unsplash

This journey has a steep learning curve, and it is cold as not supremely entertaining. Some of this series of articles will be cold and uncomfortable, this is not for the meek, but those willing to go beyond what you have learnt so far, or you think you know about cybersecurity maturity.

We will start laying out the rules. Each cycle we describe will have an input, an output, and a procedure. This implies that anyone can run the cycle. There are 9 cycles in the maturity journey, and the next article will explain the first in detail. The cycles are:

  • Discovery Cycle
  • Prioritization Cycle
  • Verification Cycle
  • Remediation Cycle
  • Knowledge Management Cycle
  • Compliance Management Cycle
  • Activity Management Cycle
  • Quality Management Cycle
  • Resources Management Cycle

Are you ready? If so stay tuned and subscribe to:

--

--