<

Challenges Impairing Cyber Security Operations in Threat Hunting | Muneeb Imran Shaikh

Posted on
3,110 Points
10 Views
1 Endorsement
Last Modified:
Published
Experience Level: Advanced
38:20
Muneeb Imran Shaikh
Strategy, Governance & Risk Consultant | Cyber Threat Intelligence Specialist | Privacy ISO27701 LI |ISO 27001 LI | COBIT 2019
This video is part of the recorded Webinar from Muneeb Imran Shaikh, an expert in Information Security Governance, Risk & Cyber Threat Intelligence.

The Webinar was conducted to discuss the fundamental issues that need to be resolved before team embark on their journey to Treat Hunting.

https://www.linkedin.com/in/muneebimranshaikh/
https://www.experts-exchange.com/members/MuneebImran-Shaikh.html
1
0 Comments
Any organization's cybersecurity strategy should aim to protect the (CIA) confidentiality, integrity, and availability of its information systems. Altogether, these three elements are referred to as the CIA triad.
BCP must be kept updated with a well-established communication method, regularly reviewed, and re-tested. BCP should be clear and detailed enough that employees can follow it step by step.