Session2 Cybersecurity Management Competency Framework
Session2 Cybersecurity Management Competency Framework
Building
Controls to
Enforce
(Governance)
Belief on Cybersecurity Competency
Building
People
• Value
Product Policy
• Risk
• Control
Provide
Process
r
Belief on Cybersecurity Competency
Building
7. Cybercrime
https://www.officialgazette.gov.ph/.../20150812-IRR-RA...
8. Privacy Violations
https://www.privacy.gov.ph/implementing-rules.../
Cybersecurity
Body of Knowledge
(Bristol CYBOK)
https://www.ncsc.gov.uk/blog-post/full-version-of-the-cyber-security-body-of-knowledge-
published
Send now
your question messages
in the chat box.
Cybersecurity Competency Framework Guide
www.facebook.com/jmlogicconsultancy
[email protected]
+639173297993
Part 2:
Cyber Security
Risks Management
Question of Understanding
5. Services
6. People
Cyber Security Risks Assessment
Asset Source of Kind of Threat
Threat
1. Personal
2.
Organization
3. Physical
4. Virtual
CyberSecurity Risks Assessment
Asset:
CYBERCRIME SOURCE OF EXPLOITED IMPACT PROBABILI REMEDY
SECURITY VULNERABILITIES TY TREATMEN
THREAT T
1. Illegal Access
2. Illegal
Interception
3. Data Interference
4. System
Interference
5. Misuse of Device
6. Computer Fraud
7. Computer Forgery
Send now
your question messages
in the chat box.
Cybersecurity Competency Framework Guide
www.facebook.com/jmlogicconsultancy
[email protected]
+639173297993
• http://ce.sharif.edu/courses/95-96/2/ce746-
1/resources/root/Resources/ISO-IEC%2027005-2011-
Risk%20Management.pdf