Security - Storyboard

Mature Your Privacy Operations – Phases 1-6

Use this storyboard to guide your privacy program maturation. This project should be started after the completion of Build a Data Privacy Program.

Mature Your Privacy Operations – Executive Brief

Use the Executive Brief of this storyboard to guide your privacy program maturation. This project should be completed after Build a Data Privacy Program.

Threat Preparedness Using MITRE ATT&CK® – Phases 1-3

This storyboard will help you to adequately prepare against the tactics, techniques, and sub-techniques that a malicious attacker may use to gain access to and compromise...

Threat Preparedness Using MITRE ATT&CK® – Phase 1: Attack Tactics and Techniques

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you understand all of the attack tactics and techniques that a malicious attacker may use to...

Threat Preparedness Using MITRE ATT&CK® – Phase 2: Threat Preparedness Workbook Mapping

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will allow you to map your various security protocols against their impacts to understand how prepared...

Threat Preparedness Using MITRE ATT&CK® – Phase 3: Execute Remediation and Detective Measures

This part of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you plan your next threat modeling session with actionable remediation efforts.

Embed Privacy and Security Culture Within Your Organization – Phases 1-3

Privacy and security culture comes from having members of the organization understand how privacy and security help promote organizational success and what their role is.

Assess the Viability of M365/O365 Security Add-Ons – Phases 1-3

Follow this methodology to assess whether Microsoft's add-on security tools are viable in your environment. This considers cost, effectiveness, and fit & posture.

Implement Risk-Based Vulnerability Management – Phases 1-4

This is the main storyboard of a risk-based approach to vulnerability management and the reduction of your risk surface.

Identify the Components of Your Cloud Security Architecture – Phase 4: Cloud Security Strategy Planning

This part of the blueprint Identify the Components of Your Cloud Security Architecture explores additional considerations when moving to the cloud – in particular, the...
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us