information-security-strategy
Information Security Strategy Skill
Purpose
Defines the information security strategy framework for Hack23 projects, integrating risk management with compliance requirements.
Security Strategy Pillars
- Governance — Policies, procedures, roles
- Risk Management — Identify, assess, treat risks
- Compliance — ISO 27001, NIST CSF, CIS Controls
- Operations — Monitoring, incident response
- Assurance — Audits, testing, continuous improvement
Risk Management Process
- Context — Scope, stakeholders, criteria
- Assessment — Identify, analyze, evaluate risks
- Treatment — Accept, mitigate, transfer, avoid
- Monitoring — Continuous risk review
- Communication — Stakeholder reporting
More from hack23/riksdagsmonitor
osint-methodologies
OSINT collection, source evaluation, data integration, verification techniques for Swedish political intelligence
41economic-policy-analysis
Fiscal policy, budget analysis, economic forecasting, monetary policy, trade policy for political journalists
33electoral-analysis
Election forecasting models, campaign analysis, coalition prediction, voter behavior analysis for Swedish elections
25vulnerability-management
Vulnerability scanning, assessment, prioritization, and remediation processes following NIST and CIS Controls
25nist-csf-mapping
NIST Cybersecurity Framework 2.0 mapping for static HTML/CSS websites
24testing-strategy
Comprehensive testing strategy covering unit, integration, E2E, security, accessibility, and performance testing
23