The Cybersecurity 3-Layer Wedding Cake
See Bill Frank’s biography and contact information at the end of this article.
This article is Part Two of my series on managing cyber-related business risks. In Part One, I discussed the relationship between Defensive Controls and Performance Controls. Defensive Controls directly block threats. Performance Controls measure the effectiveness of Defensive Controls and suggest improvements.