Читать книгу Corporate Cybersecurity - John Jackson - Страница 17

1.7 Other Security Tooling as a Priority

Оглавление

Out of all of the other potential worries for setting up a program, security tooling is a legitimate concern. Balancing a budget requires coordination with all levels of leadership and an overall evaluation of security posture. For example, establishing a bug bounty program isn’t likely a good idea if the enterprise does not have a web application firewall, or a decent endpoint protection and response solution. Coordination with the security team will have to occur, but if all other bases are covered, there’s no reason a basic bug bounty program cannot be established.

Corporate Cybersecurity

Подняться наверх