Security - Storyboard
Topics
Types of Content
Build, Optimize, and Present a Risk-Based Security Budget – Phase 3: Present the BudgetThis phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you take your completed budget and communicate the value of security to... |
|
Integrate Threat Intelligence Into Your Security Operations – Phases 1-4Intelligence-driven computer network defense is a risk management strategy that addresses the threat component of risk, incorporating analysis of adversaries, their... |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 1: Plan for a Threat Intelligence ProgramAssess your organization's unique threat landscape, current capabilities, and define an ideal target state. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 2: Design an Intelligence Collection StrategyDesign a threat intelligence collection strategy that best supports your organizational needs. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 3: Optimize the Intelligence Analysis ProcessDesign a threat intelligence analysis process that complements your existing security operations. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 4: Design a Collaboration and Feedback ProgramStand up an intelligence dissemination and feedback program. |
|
Storyboard: Establish an Effective System of Internal IT Controls to Mitigate RisksThis Blueprint will help you establish a well-designed system of internal controls that helps the IT department operate as intended by mitigating its greatest risks. |
|