Security - Storyboard
Topics
Types of Content
Combine Security Risk Management Components Into One Program – Phase 1: Establish the Risk EnvironmentThis phase of the blueprint will help you define responsibilities and accountabilities within your security risk management program and an organizational risk tolerance level. |
|
Combine Security Risk Management Components Into One Program – Phase 2: Conduct Threat and Risk AssessmentsThis phase of the blueprint will help you develop a methodology for conducting threat and risk assessments across any project or initiative across the IT department. |
|
Combine Security Risk Management Components Into One Program – Phase 3: Build the Security Risk RegisterThis phase of the blueprint will help you collect, analyze, and aggregate security risks in order to gain a view into the organizational risk profile. |
|
Combine Security Risk Management Components Into One Program – Phase 4: Communicate the Risk Management ProgramThis phase of the blueprint will help you report on risk based on the requirements needed within your organization. |
|
Debunk Machine Learning Endpoint Security Solutions – Phases 1-2This storyboard will help you gain awareness of how machine learning is being leveraged in endpoint security. |
|
Debunk Machine Learning Endpoint Security Solutions – Phase 1: Demystify Machine Learning ConceptsThis phase will inform you of common machine learning concepts used in endpoint security vendor marketing. |
|
Debunk Machine Learning Endpoint Security Solutions – Phase 2: Evaluate Vendors That Leverage Machine LearningThis phase will help you determine your endpoint security requirements and evaluate potential vendors. |
|
Reduce and Manage Your Organization's Insider Threat Risk – Phases 1-2Understand the variety of threats from malicious, accidental, and negligent insiders. Assess security maturity vis-à-vis insider threat. Formally develop an insider... |
|
Reduce and Manage Your Organization's Insider Threat Risk – Phase 1: Understand What Insider Threats Are and Where They Come FromThis phase of the blueprint, Reduce and Manage Your Organization's Insider Threat Risk, will help you understand the threats and controls associated with insider threat. |
|
Reduce and Manage Your Organization's Insider Threat Risk – Phase 2: Implement an Insider Threat ProgramThis phase of the blueprint, Reduce and Manage Your Organization's Insider Threat Risk, will help you implement an insider threat program and complete an employee... |
|