Cyber & IT Supervisory Forum - November 2023
Internal Use Only
Discussion Questions 1. What tools might the organization employ to receive threat information? 2. How might the organization receive, prioritize, and act in response to information on new threats and vulnerabilities facing the company and its controls? 3. When and how should executive management and the Board receive information on the results of threat monitoring? 4. What are some of the key monitoring practices that an organization might utilize for servers, backup systems, workstations, networks, and other endpoints?
Instructions • Discuss each of the questions at your table • Be prepared to provide a summary to the group • Table Discussion: 13 minutes; Summary Report: 7 minutes
13
Internal Use Only
Inject 2 Incident Response Time: 30 minutes Table Discussion: 20 minutes, Summary Report: 10 minutes
14
Made with FlippingBook - Online catalogs