{"id":279,"date":"2020-12-07T04:53:54","date_gmt":"2020-12-07T04:53:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/amyahking\/?p=279"},"modified":"2020-12-07T04:53:54","modified_gmt":"2020-12-07T04:53:54","slug":"ciso-protections","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/amyahking\/2020\/12\/07\/ciso-protections\/","title":{"rendered":"CISO protections"},"content":{"rendered":"\n<p>As the CISO of a company some of the protections I would implement are the several types of automated tools to monitor a system. One of the most important tools I would use is the malicious code scanner to be aware of any present and unwanted codes or viruses. I would also conduct penetration testing and system assesments . I would conduct the penetration test weekly to help determine the possible consequences of a possible attack, so I can be aware and be two steps a head if it were to happen. I would also evaluate the entire system periodically to authorize and or investigate the events being performed. Most importantly as the CISO I would follow the guidelines emplaced on how to things more securely within the organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the CISO of a company some of the protections I would implement are the several types of automated tools to monitor a system. One of the most important tools I would use is the malicious code scanner to be aware of any present and unwanted codes or viruses. I would also conduct penetration testing&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/amyahking\/2020\/12\/07\/ciso-protections\/\">Read More<\/a><\/div>\n","protected":false},"author":18629,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/amyahking\/wp-json\/wp\/v2\/posts\/279"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/amyahking\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/amyahking\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amyahking\/wp-json\/wp\/v2\/users\/18629"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amyahking\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/amyahking\/wp-json\/wp\/v2\/posts\/279\/revisions"}],"predecessor-version":[{"id":285,"href":"https:\/\/sites.wp.odu.edu\/amyahking\/wp-json\/wp\/v2\/posts\/279\/revisions\/285"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/amyahking\/wp-json\/wp\/v2\/media?parent=279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amyahking\/wp-json\/wp\/v2\/categories?post=279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amyahking\/wp-json\/wp\/v2\/tags?post=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}