Security Technology & Operations - Storyboard
Topics
Types of Content
Discover and Classify Your Data – Phases 1-3This storyboard will help you define and develop your data classification program, from formalizing the program to discovering your data and finally implementing data... |
|
Discover and Classify Your Data – Phase 1: Formalize the Classification ProgramThis phase of the blueprint will help you understand the importance of data classification and aid you in developing a classification scheme that meets your... |
|
Discover and Classify Your Data – Phase 2: Discover the DataThis phase of the blueprint will help you perform and manage data discovery. |
|
Discover and Classify Your Data – Phase 3: Classify the DataThis phase of the blueprint will help you assign proper classifications to your data and track meaningful metrics to continually improve the program. |
|
Simplify Identity and Access Management – Phases 1-4This storyboard will help you lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. Simplify your identity... |
|
Integrate Threat Intelligence Into Your Security Operations – Phases 1-4Intelligence-driven computer network defense is a risk management strategy that addresses the threat component of risk, incorporating analysis of adversaries, their... |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 1: Plan for a Threat Intelligence ProgramAssess your organization's unique threat landscape, current capabilities, and define an ideal target state. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 2: Design an Intelligence Collection StrategyDesign a threat intelligence collection strategy that best supports your organizational needs. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 3: Optimize the Intelligence Analysis ProcessDesign a threat intelligence analysis process that complements your existing security operations. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 4: Design a Collaboration and Feedback ProgramStand up an intelligence dissemination and feedback program. |
|