SFIA View: Cybersecurity strategy and architecture
Skills at a glance
Skills by category
| Category | Skill | Levels | ||||||
|---|---|---|---|---|---|---|---|---|
| Cybersecurity strategy and leadership | Strategic planning ITSP | 4 | 5 | 6 | 7 | |||
| Information security SCTY | 2 | 3 | 4 | 5 | 6 | 7 | ||
| Demand management DEMM | 4 | 5 | 6 | |||||
| Stakeholder relationship management RLMT | 4 | 5 | 6 | 7 | ||||
| Cybersecurity architecture | Requirements definition and management REQM | 2 | 3 | 4 | 5 | 6 | ||
| Enterprise and business architecture STPL | 5 | 6 | 7 | |||||
| Solution architecture ARCH | 4 | 5 | 6 | |||||
| Data management DATM | 2 | 3 | 4 | 5 | 6 | |||
| Cybersecurity governance, risk and compliance | Governance GOVN | 6 | 7 | |||||
| Risk management BURM | 2 | 3 | 4 | 5 | 6 | 7 | ||
| Audit AUDT | 2 | 3 | 4 | 5 | 6 | 7 | ||
| Information and data compliance PEDP | 4 | 5 | 6 | |||||
| Information management IRMG | 3 | 4 | 5 | 6 | 7 | |||
| Information assurance INAS | 2 | 3 | 4 | 5 | 6 | 7 | ||
| Quality management QUMG | 2 | 3 | 4 | 5 | 6 | 7 | ||
| Measurement MEAS | 2 | 3 | 4 | 5 | 6 | |||
| Cybersecurity research, intelligence and advice | Consultancy CNSL | 4 | 5 | 6 | 7 | |||
| Specialist advice TECH | 4 | 5 | 6 | |||||
| Formal research RSCH | 2 | 3 | 4 | 5 | 6 | |||
| Vulnerability research VURE | 2 | 3 | 4 | 5 | 6 | |||
| Threat intelligence THIN | 2 | 3 | 4 | 5 | 6 | |||