© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
B. ChaputEnterprise Cyber Risk Management as a Value Creator https://doi.org/10.1007/979-8-8688-0094-8_10

10. Three Vital ECRM Building Blocks

Bob Chaput1  
(1)
Belleair Beach, FL, USA
 

If we guard our toothbrushes and diamonds with equal zeal, we will lose fewer toothbrushes and more diamonds.

—McGeorge Bundy1

In this chapter, I cover the following topics and sections of your ECRM Program and Cybersecurity Strategy and related documentation: ECRM Framework, ECRM Process, and ECRM Maturity Model. Please refer to Appendix E for the complete Pro Forma ECRM Program and Cybersecurity Strategy Table of Contents.

A framework, a process, and a maturity model are three ...

Get Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.