The Principles of Cybersecurity And Hacking: 5 Books In 1- Cybersecurity and Hacking Series by Zach Webber

The Principles of Cybersecurity And Hacking: 5 Books In 1- Cybersecurity and Hacking Series by Zach Webber

Author:Zach Webber [Webber, Zach]
Language: eng
Format: epub
Published: 2018-12-07T23:00:00+00:00


Different Maturity Objectives

Companies have different goals in the maturation of cybersecurity workforce planning capability, and they do not require reaching the optimizing state. In the same way, there seem to be trade-offs in defining what strategy to pursue. The companies may come across trade-offs and have to assess the opportunity costs, as concerns deciding in which maturity state they want to end. This decision needs to consider a number of variables. The leaders have to evaluate the effects of allocating resources, timing, implementation and return for their investments. As such, the companies need to view the maturity levels, less according to a grade or verdict, and more as an indication of the income spent on planning the workforce. Having a restricted maturity level entails the organization is at the start of its capacity growth, without the needed processes and lacking guidance, not having a lot in terms of data, and methods of analysis, which is not a show of bad planning in the workforce.

Actually, it is an indication that the company has not dedicated its resources for the full development of that facet concerning the maturity prototype, and so there are justifying circumstances for limited maturity income.

In an example, a company which does not have any cybersecurity professionals may not need a sophisticated web portal to track and monitor the cybersecurity personnel—as there is none to speak of. This company could see that it is easier for it to maintain a simple database to track the limited personnel that has been aligned to cybersecurity, and so realize their resources would be better used for the purposes of other chances. This company could opt to not reach the optimizing maturity level—considering it relates to the enabling of technology. At the same time, the company which already has a strong workforce capability planning for its mission, may not feel that it is needed to come up with a separate process of tracking, analyzing, and managing the cybersecurity workforce. Actually, the company may just include the cybersecurity workforce as part of the populations being tracked, and this makes sure the workforce planners utilize the cybersecurity information for the purposes of planning and making the right decisions. In the end, the company may not go to the level of optimized maturity in process and analytics as defined according to the CMM, as it is able to meet the planning needs through another avenue.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.