|
T0263
|
Identify security requirements specific to an information technology (IT) system in all phases of the system life cycle. |
2 |
|
T0264
|
Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc. |
3 |
|
T0282
|
Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate. |
2 |
|
T0337
|
Supervise and assign work to programmers, designers, technologists and technicians, and other engineering and scientific personnel. |
3 |
|
T0356
|
Coordinate with organizational manpower stakeholders to ensure appropriate allocation and distribution of human capital assets. |
2 |
|
T0429
|
Assess policy needs and collaborate with stakeholders to develop policies to govern cyber activities. |
3 |
|
T0445
|
Design/integrate a cyber strategy that outlines the vision, mission, and goals that align with the organization’s strategic plan. |
3 |
|
T0509
|
Perform an information security risk assessment. |
2 |
|
T0001
|
Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk. |
3 |
|
T0002
|
Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program. |
2 |
|
T0004
|
Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements. |
5 |
|
T0006
|
Advocate organization's official position in legal and legislative proceedings. |
2 |
|
T0025
|
Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders. |
4 |
|
T0066
|
Develop and maintain strategic plans. |
3 |
|
T0130
|
Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information. |
2 |
|
T0134
|
Lead and align information technology (IT) security priorities with the security strategy. |
2 |
|
T0135
|
Lead and oversee information security budget, staffing, and contracting. |
2 |
|
T0148
|
Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency. |
2 |
|
T0151
|
Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure that they provide the intended level of protection. |
2 |
|
T0227
|
Recommend policy and coordinate review and approval. |
2 |
|
T0229
|
Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered. |
4 |
|
T0229
|
Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered. |
4 |
|
T0248
|
Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals. |
3 |
|
T0254
|
Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies. |
2 |
|
T0763
|
Conduct long-range, strategic planning efforts with internal and external partners in cyber activities. |
4 |
|
T0871
|
Collaborate on cyber privacy and security policies and procedures |
2 |
|
T0872
|
Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation |
2 |
|
T0927
|
Appoint and guide a team of IT security experts. |
1 |
|
T0928
|
Collaborate with key stakeholders to establish a cybersecurity risk management program. |
1 |