SANS Institute Provides Guidance on Improving Cyber Defense Using the MITRE ATT&CK Framework. (2020, July 13). PR Newswire. This resource covers recommended methods of leveraging the MITRE ATTCK knowledge base to improve security operations and threat intelligence capabilities.
Department of Health and Human Services. (n.d.). Health industry cybersecurity practices: Managing threats and protecting patients. This resource provides a starting point of basic cybersecurity practices to implement in health care organizations.
Department of Health and Human Services. (n.d.). Top 10 tips for cybersecurity in health care. This resource highlights the top ten tips that organizations in healthcare can adopt to maintain a healthy cybersecurity strategy.
Kovacs, L. (2019). National cybersecurity strategy framework. AARMS: Academic & Applied Research in Military & Public Management Science, 18(2), 65–76. This resource focuses on national cybersecurity challenges to identify some unified elements which could be the main pillars of an effective national cybersecurity strategy.
Siegel, C. A., & Sweeney, M. (2020). Cyber strategy: Risk-driven security and resiliency. Auerbach Publications. This resource provides a process and roadmap for any company to develop its unified cybersecurity and cyber resiliency strategies.
Read Chapter 1: Why Cybersecurity and Cyber Resiliency Strategies Are Mandatory for Organizations Today.
Read Chapter 2: The 6 STEPs in Developing and Maintaining a Cybersecurity and Cyber Resiliency Strategy.
Parada, I. (2018). Cyberstrategy of United States - Chronology process in the light of the goals. Military Science Review / Hadtudományi Szemle, 11(3), 137–153. This resource examines the U.S. strategy and how to systemize the documents adopted at the NATO meeting, which are related to the cyber defense efforts.
U.S. Department of Defense, Office of Prepublication, and Security Review. (2020, February 20). Cybersecurity reference and resource guide. This resource provides an overview of useful, readily available references to support security cooperation across the U.S. government, commercial sector, and U.S. allies and partners, such as information regarding cybersecurity norms, best practices, policies, and standards.
Read pages 48-49.
Elghazaly, M. (2020, August 31). How to build a strategic and effective GRC operating model. ISACA. This resource highlights four steps that organizations use to increase the maturity of their GRC program.