The paper defines each layer, offers examples of enabling technologies, related standards, and types of professional security services that implement the enabling technologies. It also notes where adequate enabling technologies or standards still need to be developed, or where policies need to be set and implemented to allow information to be exchanged between layers fast enough to keep up with the speed of emerging threats.
Read this whitepaper to:
- Understand of the model we need for cybersecurity;
- Learn that cybersecurity is an integral part of an ecosystem in which ICT architectures are made secure and sustainable by design;
- Discover the benefits of the security stack: serves as a guide for integration efforts; creates forcing-pressures for collaboration; and, establishes that no single layer can effectively contend with the sophisticated attacks of our present day and into the future.