Build and run a one-person cybersecurity operating cadence across command center, vulnerability prioritization, incident readiness, trust responses, and policy governance. Use when requests involve "solo CISO", "one-person security team", weekly cyber priorities, or creating an end-to-end security operating model.
Use this skill to turn broad security goals into an executable cadence for one security owner.
Command Center for prioritization,Findings for remediation,Security Analyst for incident/threat analysis,Trust Inbox for customer assurance output,Policies for governance updates.P0, P1, P2).scripts/generate-weekly-backlog.py