Cyber & IT Supervisory Forum - November 2023

Internal Use Only

Discussion Questions 1. What tools might the organization employ to receive threat information? 2. How might the organization receive, prioritize, and act in response to information on new threats and vulnerabilities facing the company and its controls? 3. When and how should executive management and the Board receive information on the results of threat monitoring? 4. What are some of the key monitoring practices that an organization might utilize for servers, backup systems, workstations, networks, and other endpoints?

Instructions • Discuss each of the questions at your table • Be prepared to provide a summary to the group • Table Discussion: 13 minutes; Summary Report: 7 minutes

13

Internal Use Only

Inject 2 Incident Response Time: 30 minutes Table Discussion: 20 minutes, Summary Report: 10 minutes

14

Made with FlippingBook - Online catalogs