www.busterCyber.com


Cybersecurity Domains


  • Executive Summary
  • Cybersecurity Events
  • Deep-Dive Research
  • Qualifications
  • CyberSec Education
  • CyberSec Framework
  • Project/Program Mgmt

busterCyber



Experience



Foundational - Starting Points

ISC2 CISSP Common Body of Knowledge - 8 Security Domains

BuCy Developed Useful, Repeatable & Sustainable Real-World Frameworks

Initiate, Plan, Build, Run, Respond



security and risk management





busterCyber Framework & Domain Experience Overview



GRC tools are most effective when you have a solid understanding of your risks, threats, and attack vectors. These are specific to your business, the technologies you use to run your business, and the supply chain you need to support your business.



asset security





busterCyber Framework & Domain Experience Overview



Asset protection is most effective when you know what assets you have, how much each is worth to your business, and the value each asset has if it is no longer available. There is an acronym used in the security business called CIA. Is your asset confidential? Can you ensure the integrity of the asset when you need it? Is the asset available to your business at any time? Confidentiality, Integrity, and Availability (CIA) are key components of a secure environment.



Security Architecture & Engineering





busterCyber Framework & Domain Experience Overview



Security should be considered as early as possible. Computer systems and the business environment where they will be used will benefit from a risk, threat, and attack assessment before the design phase. There are many considerations that should be made when developing a system architecture and engineering solutions to support the business needs. A full lifecycle approach that includes cybersecurity will minimize risks.



Communications and Network Security





busterCyber Framework & Domain Experience Overview



Communications involves your telecommunications services for you business. Networks are generally understood to involve communications among the computer systems in the business and externally. There are specific risks, threats, and attacks that target communications systems and network systems. A deep dive is essential for understanding the scope of security relating to communications and networks.



Identity and Access Management





busterCyber Framework & Domain Experience Overview



Identities and Access



Security Assessment and Testing





busterCyber Framework & Domain Experience Overview



Assessments and Testing



Security Operations





busterCyber Framework & Domain Experience Overview



Securing the Operations



Software Development Security





busterCyber Framework & Domain Experience Overview



Secure Software Development






bustercyber