Cybersecurity Program Management

Enterprise-Wide Visibility into the State of Cybersecurity

ProcessUnity’s Cybersecurity Program Management (CPM) is a single, comprehensive platform for centrally managing an organization’s entire cybersecurity program with prepackaged mapped content, automated workflows, assessments and dynamic reporting. The solution enables the CISO to inventory and assess high-value assets; map them to threats, risks, policies and control standards; automate reviews; and capture evidence of compliance — all on a predefined schedule 

Cybersecurity Program Management Compliance Dashboard

Track various different control issues by categories and review status to understand the effectiveness of your controls or areas that need to be addressed in the Compliance Dashboard.

High-Value Asset Dashboard

Monitor the status of your high-value assets across your facilities, systems and applications to understand the state-of-the-state across your critical assets using the High-Value Asset Risk Dashboard.

Cybersecurity Program Management Personal Dashboard

Obtain real-time visibility into threats, risks, policies and general status across your cybersecurity risk program via the Personal Dashboard. This dashboard can be tailored to track the key metrics that are relevant to each individual depending on their role.

Cybersecurity Program Management Threat Dashboard

Gain actionable insights to your threat-related activities and status via drill-down reports in the Threat Dashboard

Schedule Dashboard

Review all upcoming schedules and activities related to your cybersecurity risk program using the Schedule Dashboard.

Asset Assessments for Review Report

Manage all asset assessments and monitor the review process via the Asset Assessments for Review Report.

Projects By Priority Report

View all projects that are being managed in the system to understand priority, budget, responsible parties, status and drill-down to access any related documentation for these projects via the Projects By Priority Report.

Key Benefits

  • Get a complete, up-to-date view of your cybersecurity preparedness
  • Identify and track cybersecurity-related projects across the organization
  • Maintain one schedule for cyber reviews, assessments, remediation and training validation
  • Monitor both internal and third-party assets in a single cybersecurity program
  • Establish an answer bank of cybersecurity responses tied to a central control framework

Self-Configuring Control Framework

ProcessUnity’s intelligent Cybersecurity Program Architect automatically scopes an organization’s program  mapping threats, risks, controls and regulations  via a step-by-step guided assessment. The system self-configures an annual review schedule complete with pre-built content, workflow triggers, notifications and reminders. Based on this schedule, ProcessUnity CPM manages program activities throughout the year — using hands-free automation to alert stakeholders at appropriate times to make sure tasks are completed and evidence is captured.  

ProcessUnity CPM leverages a pre-built meta-model based on the Secure Controls Framework (SCF) mapped to the most common security frameworks, including NIST Cybersecurity Framework (CSF), NIST 800-53 and ISO 27002. Cybersecurity Program Architect uses this meta-model to intelligently select from more than 800 control standards to ensure appropriate coverageThe CISO has the option to specify the cadences of program activities, including threat, risk, and control rating reviews, asset and third-party assessments and training validation  

The scoping process culminates with the Cybersecurity Program Blueprint, a customized, board-ready report with specific coverage recommendations, mapped threats, risks, controls, and policies, an annual schedule of activities and suggested next steps to mature thprogram. 

For optimal flexibility, ProcessUnity’s configuration engine lets the CISO personalize the configuration to meet organization-specific needs by identifying assets, owners, and any additional threats, risks, controls and policies.  

Automated Workflows & Assessments

Automated workflows and assessments keep cybersecurity program activities moving forward on time throughout the year. The predefined schedule triggers the distribution of assessments and reviews to assigned stakeholders, tracks completion status, and sends reminders when tasks are running late.  

ProcessUnity CPM automates: 

  • Threat Reviews
  • Risk Evaluations
  • Control Reviews
  • Policy Reviews
  • Change Reviews
  • Incident Reviews
  • Training Program Validation
  • Issue Remediation
  • Facility Assessments
  • Application Assessments
  • System Assessments
  • Baseline Assessments

Dynamic Reporting & Dashboards

Powerful reporting gives the CISO real-time visibility into their cybersecurity program. Interactive dashboards offer immediate insight into the status of threats, risks, policies, controls, issues and incidents — with the ability to drill down into details as needed 

Preconfigured, out-of-the-box reports include:

  • Threat History & Trending
  • Risk Remediation Status
  • Policy Control Coverage
  • Controls Effectiveness
  • Top third Parties at Risk
  • Current Cyber Review Requests
  • Risk Prioritized Projects
  • Top High-Value Assets at Risk
  • Organization Training Coverage
  • Due diligence requests
  • Issues Summary Status
  • Major Incidents Status

Custom reporting lets the CISO create tailored reports for the C-suite, risk committee, the board of directors and other key stakeholders. Plus, with the click of a button, the CISO can export a customized, board-ready report on the state of the entire cybersecurity program that covers all relevant risks, threats, control reviews, assets, issues, incidents, projects and policies.