CISO Workplace User Guide
Welcome to the CISO Workplace Modules User Guide! This guide is designed to help you navigate and utilize the powerful tools and functionalities offered within the CISO Workplace Modules to enhance your organization's cyber security posture.
Dashboard Overview
Upon logging in, you'll be greeted by the dashboard, your central hub for monitoring and managing your organization's cybersecu...
Cyber Detection and Response
This section provides tools for proactive threat detection and swift response, including Cyber Incident Monitoring, Security Or...
Cyber Governance
Ensure compliance and effective governance with features such as Security Compliance, Privacy Compliance, Governance and Manage...
Cyber Risk Management
Identify, assess, and manage cyber risks with modules covering Social Engineering, Supply Chain Risk Management, Virtual Penetr...
Identity and Data Governance
Secure identities and data with Privileged Account Review, Data Security Posture Management, Identity and Access Review, and Da...
Cyber Resiliency
Ensure business continuity and resilience against cyber threats with Business Continuity Management, Disaster Recovery Planning...
Attack Surface Management
Attack Surface Management (ASM) is a cybersecurity practice focused on the continuous discovery, analysis, prioritization, reme...
Culture and Awareness
This section describes the modules that promote strong culture and heightened awareness that can significantly reduce the risk...
Infrastructure Security
Infrastructure security involves protecting critical systems and assets, such as networks, data centers, and power grids, from ...