Cyber Security Management
                
                
                Computer security or information technology security (IT security)
                is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
                The field is becoming more important due to increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions,
                and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.
                
                
            
            
                
                    Cyber Security
 Governance
                
                
                    - 
                        Policy Management
                    
- 
                        Training and Awareness
                    
- 
                        Security Baselines
                    
- 
                        Management Reporting
                    
- 
                        Enterprise Security Dashboard
                    
- 
                        Auditing
                    
- 
                        Compliance
                    
- 
                        Product Evaluation
                    
- 
                        Data Governance
                    
- 
                        PKI & SSO
                    
- 
                        AI, Robotics and Machine Learning
                    
- 
                        UBA & UEBA
                    
- 
                        On-boarding and Exiting Process
                    
 
            
                
                    Cyber Security
 Technical
                
                
                    - 
                        Firewall Management
                    
- 
                        WAF & Wi-Fi
                    
- 
                        IPS & IDS
                    
- 
                        EDR & MDR (Malware)
                    
- 
                        CASB
                    
- 
                        Data Protection
                    
- 
                        DLP & Encryption
                    
- 
                        Threat Management (TI & TH)
                    
- 
                        Vulnerability Scanning
                    
- 
                        Privileged Access
                    
- 
                        PKI & SSO
                    
- 
                        AD Management
                    
- 
                        Email Security and Continuity
                    
 
            
                
                    Security Operations
                
                
                    - 
                        ITSM Tooling Integration
                    
- 
                        SIEM
                    
- 
                        FIM
                    
- 
                        SOAR
                    
- 
                        Monitoring and Escalations
                    
- 
                        L1 & L2 Support
                    
- 
                        CSIRT
                    
- 
                        Forensic and Malware Analysis
                    
- 
                        L3+ Support