This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

User:Legacy15

From OWASP
Jump to: navigation, search

CISSP, CEH, CDFE, CDMC • Develop cyber processes and procedures that align with information security, information assurance, and regulatory compliance. The processes and procedures also produce actionable information, which when collected, can be utilized to uncover possible threat vectors of the agency or company. • Develop incident response guidance to establish an effective management process for technical vulnerabilities, define and establish the roles and responsibilities associated with technical vulnerability management. These areas include vulnerability monitoring, risk assessment, patching, asset tracking, and any coordination of responsibilities. Also, define a timeline to react to notifications of potentially relevant vulnerabilities. • Develop mechanisms to enable the types, volumes, and costs of information security incidents to be quantified and monitored. The information gained from evaluations of information security incidents is used to identify vulnerabilities, to include, recurring or high impact incidents.