CISOs End to End Security Operations – ( Part 1)