Cyber Security

CIR Team: Maintain Strong Cyber Security Processes and Functions

Written by Moh Heng Goh | Nov 13, 2022 7:44:26 AM

CIR Team

Maintain Strong Cybersecurity Processes and Functions

With roles and responsibilities identified, the activities to be performed by the respective team to ensure the organization can manage the cyber security program effectively are as spelt out in Figure 3-5. As organizations vary in size, nature, business processes, and the like, processes/functions must be customized to the organization's needs.

 

Processes/ Functions

Information Security

IT Security

Cyber Security

  • Emulate attacks to find flaws within defences so rectification can be made.
  • Defend against Red Team/ cyber security attacks to constantly improve security posture.
  • Exchange information continuously between the Red and Blue Teams to improve continually.
  • Purple team (if necessary) facilitates continuous integration.

-

-

  • Identify critical organizational and technological infrastructures.
  • Identify cyber security threats that affect these infrastructures.
  • Identify business functions that are utilizing these infrastructures.
  • Develop mitigation/response measures.

-

-

  • Manage Information Risk
  • Value Asset Inventory
  • Manage Third-Party Risks
  • Gather Threat Intelligence and Analysis
  • Take advantage of Analytics
  • Execute Data Management
  • Perform Process Optimisation and Agile Controls

-

-

Figure 3-5: Process and Functions Undertaken by the Type of Teams

Common Processes/ Functions Performed by the Three Teams


  • Perform risk assessment
  • Identify business functions and impacts
  • Develop/Implement mitigation/response measures
  • Test and exercise plan
  • Engage with third parties
  • Audit plan and third parties' plan
  • Create awareness
  • Build culture

Related Concept to Cybersecurity Coverage by IT Teams

Type of Coverage by IT Team Team Composition Maintain Strong Cybersecurity Processes and Functions Skill Sets and Long-Term Challenges Back To: Team Handling CIR

 

Do You Want to Continue BCM Training onsite or online?

Competency-based Course
Certification Course

Goh, M. H. (2017). A Manager's Guide to Business Continuity Management for Cyber Security Incidents, 2nd Edition. GMH Pte Ltd.

Reference: Chapter 3 What Are the Typical IT Teams Handling Security for IT? 3.5 Processes and Functions

Note: This version was the draft 2nd Edition being updated in 2023. The numeric in the square bracket [X-X] cross-refers to the actual chapter and section in the 1st Edition.