Cyber Security Road Map

  • Current policies

  • Key risks and threats to business

  • Collect executive stakeholder inputs to identify risk appetite levels and acceptable risk

  • Current Cyber Security Framework

  • Current Compliance requirements/landscape for the Business ( PCIDSS, SOC 2)

  • Network Architecture

    • Segmentation

  • High Level Org chart

  • Vulnerability Management Data

  • List of current tools/technologies in use to address all cyber

  • security controls

    • Collect last 0-180 days data to review the threat landscape

  • What are stakeholders desired cyber security program state

  • Compare similar business operations (security capabilities, budget,

  • Human resources)

  • Road map plan for next 30-60-90 days, yearly review

Last updated