2022-04-05T07:39:00Z
Syed S - PeerSpot reviewer
Program Manager - Information Security at Gulf International Bank
  • 221
Published:

How important is project management to the execution of cyber security projects?

Search for a product comparison in GRC
1
PeerSpot user
1 Comment
BV
Sr.Dir/Managing Principal Technology Consulting at a consultancy with 10,001+ employees
Real User
Top 10
2022-04-13T20:12:57Z
Apr 13, 2022

Cybersecurity had been recognized as a Fifth War Domain a while back: Land, Sea, Air, Space, Cyber. 


As such, planning for war is important since it provokes managers to THINK. 


While the plans that these managers develop are mostly useless since these plans become mostly irrelevant when the Cyber Battle ensues. Preparedness, counterintelligence, logistics, skills, adaptability, and distributed decision-making become more important as compared to PMI principles and best practices ( 'the disciplined agile' should be included and focused on as part of the adaptability;-)).

Learn what your peers think about Trend Micro Cloud One . Get advice and tips from experienced pros sharing their opinions. Updated: August 2023.
734,024 professionals have used our research since 2012.
Related Questions
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Dec 15, 2022
Hi community members, What are the main differences between SOC 1, SOC 2, and SOC 3 compliance? Thanks.
See 2 answers
CM
Car Detailer at Five Star Auto Sales
Sep 3, 2022
The difference is how the data is given and exactly what information of the that data is given. And I love that it answered so many questions simply. 
Akitra - PeerSpot reviewer
Marketing at AKITRA
Dec 15, 2022
SOC 1 is a financial audit report, SOC 2 is a security and controls report and SOC 3 report is similar to SOC 2 drafted to be presented to a general audience.
Terry  Ramabulana - PeerSpot reviewer
Director at Skxprotiviti
Feb 24, 2023
Hi community members, I'm the Director of a Consultancy firm. At the moment, I'm looking for automated software for both external and internal audit purposes. It should be able to assist with governance, risk management and compliance (GRC). Which software/solution would you recommend? why?
2 out of 3 answers
EB
Director of Community at PeerSpot (formerly IT Central Station)
Mar 31, 2022
Hello @Alex Alexandre, @Carlos Arturo Quiroga Quiroga, @AdhishP, @Sameh Hablas , @Dani Bachour ​and @Vivek Shah, Can you please assist here? Thank you!
BS
Principal Consultant at Aligne Technologies
Nov 21, 2022
Hi Terry, You may want to look at MetricStream which is one of the market leaders in the Enterprise GRC space and apart from the various risk modules, also has Audit management software.
Related Articles
Liam Brandt - PeerSpot reviewer
User at Catalyic Consulting (Pvt.) Ltd
Jun 14, 2023
What role does a cybersecurity services provider play in governance, risk, and compliance (GRC)? As businesses face more cyber threats in our digital world, they must manage risks, ensure compliance with regulations, and establish effective governance practices. Cybersecurity service providers help businesses to achieve their GRC goals. Governance, risk, and compliance (GRC) are critical fun...
See 2 comments
Remy Ma - PeerSpot reviewer
Network Security Services at ACE Managed Securty Services
Mar 23, 2023
Cybersecurity services providers are critical in helping organizations manage the complexities of governance, risk, and compliance (GRC). Cybersecurity services help organizations mitigate their risk from cyber threats by providing solutions such as incident response, vulnerability management, network security monitoring, and  Email Cloud Security. These services ensure organizations are able to comply with pertinent regulations, identify and address vulnerabilities, and protect the organization from malware attacks. Moreover, cybersecurity services providers can also help organizations build a comprehensive security plan that takes into account their specific needs and budget. These plans provide management with insights into areas of risk exposure, allowing them to make informed decisions about which security measures need to be implemented in order for their organization to remain compliant. Finally, cybersecurity services providers can help organizations strengthen their ability to detect and address potential threats quickly and effectively. This is done by providing high-quality threat intelligence feeds that supply information on malicious actors and the latest malware variants. These services also allow organizations to develop comprehensive cyber security awareness programs for employees so they are better equipped to spot suspicious activity.
Elvis Moreland - PeerSpot reviewer
Chief Information Security Officer (vCISO) at BlueCyren.com
Jun 14, 2023
To build business assurance capabilities you have to start with the right People, Process, and Technical Standards. In order to effectively plan, design, deploy, and manage People, Processes, and Technical Standards you will have to utilize a proven GRC control set and framework construct.
RC
Enterprise Architect at CDPL
Dec 15, 2021
Privacy Concerns in an RPA Implementation Program. The biggest concern we (as RPA solution implementors) have faced when interacting with clients and customers were: 1. Regulatory and Compliance issues. 2. InfoSec and Security issues. 3. Audit Issues. Regulatory and Compliance Issues: There is a huge penalty if the wrong data gets updated and emails are sent to customers by the regulatory...
Related Articles
Liam Brandt - PeerSpot reviewer
User at Catalyic Consulting (Pvt.) Ltd
Jun 14, 2023
Governance Risk and Compliance: The Role of Cybersecurity Services Providers
What role does a cybersecurity services provider play in governance, risk, and compliance (GRC)...
RC
Enterprise Architect at CDPL
Dec 15, 2021
Privacy issues and regulatory laws to be complied with when implementing an RPA program
Privacy Concerns in an RPA Implementation Program. The biggest concern we (as RPA solution imple...
Download Free Report
Download our free Trend Micro Cloud One Report and get advice and tips from experienced pros sharing their opinions. Updated: August 2023.
DOWNLOAD NOW
734,024 professionals have used our research since 2012.