Security - Storyboard
Topics
Types of Content
Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phases 1-5This blueprint will comprehensively evaluate your hosted cloud risk profile to determine what unique security controls your organization requires to secure its cloud... |
|
Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 1: Determine Your Cloud Risk ProfileThis phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you determine your organization’s rationale for cloud adoption and what... |
|
Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 2: Identify Your Cloud Security RequirementsThis phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you use the Cloud Security CAGI Tool to perform four unique assessments... |
|
Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 3: Evaluate Vendors From a Security PerspectiveThis phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you learn how to assess and communicate with cloud vendors with... |
|
Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 4: Implement Your Secure Cloud ProgramThis phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you turn your security requirements into specific tasks and develop... |
|
Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 5: Build a Cloud Security Governance ProgramThis phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you build the organizational structure of your cloud security... |
|
Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phases 1-3This storyboard will help you to take a proactive approach to identifying the needed technical skills for your future environment and to systematically decide how to... |
|
Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 1: Identity Skill Needs for Target StateThis phase of the blueprint will help you define your security initiative skill needs. |
|
Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 2: Identify Technical Skill GapsThis phase of the blueprint will help you align role requirements with future initiative skill needs. |
|
Close the InfoSec Skills Gap: Develop a Skills Sourcing Plan for Future Work Roles – Phase 3: Develop a Sourcing Plan for Future Work RolesThis phase of the blueprint will help you decide how to acquire skills. |
|