Cyber security

1. Asset Inventory

2. Security Architecture

3. User Education and Training

4. Threat Detection and Response

5. Backup and Recovery

6. Vulnerability Management

7. Incident Management

8. Third-Party Risk Management

9. Security Metrics and Reporting