As technology evolves, cyber threats and vulnerabilities multiply. With time, companies and organizations became increasingly concerned about this. Hence, some methods, procedures, and technological disciplines were created to prevent, manage, and recover from such threats. Some of them include the following:
- BCP/DR planning
- Cyber risk assessment
- Strategic governance frameworks
- Cyber resilience
- Governance, Risk, and Compliance (GRC)
- Cyber perimeter establishment
- Threat intelligence gathering
- Continuous threat tracking
These methods, procedures, and technological disciplines can be separated into three overlapping groups, as shown in the following diagram:

Let's go over each of these disciplines one by one.
BCP/DR
BCP shows how a specific company continues to operate its business after something disruptive occurs. It is the first step that defines the parameters (see the following list) that will be used in the process of DR; for example, a cyberattack...