Data Mapping (DM) is a critical element of CyberSecurity.
DM brings intelligent decision making to the forefront. DM connects the dots between the high-level Business Risk Objectives down to the hardware, software, and people. But doing DM requires a process. The Momentum Methodology (M2) focuses discovery of connections within your organization allowing meaningful information to prioritize efforts. DM creates context to leadership and provides transparency between technologists and the business.
Data Mapping starts at the very beginning when your organization adopts the CSRP to manage to their CyberSecurity Program. M2 guides the journey and seeds critical data that is aggregated, connected, and used by CITAM, VAC, Risk Management, Audit, and other critical functions. Data Mapping continues to grow with the organization and will expand as new Cyber related initiatives become a requirement. Now Prioritization, Remediations, Vulnerabilities, Budget, Labor Resources react in a strategic manner and move from continuous tactical responses.