Programs | Process | Customers | Team Structure |
---|---|---|---|
What are Vulnerability, Risk, AppSec, Data Protection, Policy and Procedure, MSB/SA, Metrics, Cloud
These are the key current programs for Flowers Security
|
What is Clarity or CAPPM
This is everyone's favorite place to track time!
|
What is a Security Hero
This is what we call everyone in the workforce that participates in some part of the Security Culture program
|
Who is Chris Newman
This is the newest member of the SGT
|
What are: budget, staffing requirements, key initiatives, risks, assumptions, metrics
Name 3 key components to a security program
|
What is 24 hours
This is the longest a SNOW task should remain unassigned.
|
What is due date
This is what we use to define our delivery expectations with the customer.
|
Who are Jeff, Sam, Theresa, Andreas, and Martin
These are the five security leaders
|
What is the 2 year security roadmap
This is the eventual product that is created from the 3rd party risk assessment.
|
What is Clarity Documents and SharePoint archive
These are the two locations a fact sheet should exist when a security review is finalized
|
What is 46
This is how many manufacturing plants we have (also called bakeries)
|
Who is "don't be a suckup!"
This is the best boss
|