Cyber and Technology Risk Management Forum, Park City, UT

y Identify (Identify what to protect and threats to them) y Protect (How do you protect those assets) y Detect (How do you monitor for attacks in progress) y Respond (What actions do you take during an attack) y Recover (How do you return to normal operations)

( http://www.csbs.org/CyberSecurity/Pages/default.aspx )

Made with FlippingBook - Online Brochure Maker