Security Technology & Operations - Storyboard

Develop and Implement a Security Incident Management Program – Phase 2: Operate

Operate with efficiency and effectiveness as new incidents are handled.

Simplify Identity and Access Management – Phases 1-4

This storyboard will help you lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. Simplify your identity...

Simplify Identity and Access Management – Phase 1: Audit and Classify Existing Data

This phase of the blueprint Simplify Identity and Access Management will assist you with auditing your user directory in order to lay the foundations for implementing a...

Simplify Identity and Access Management – Phase 2: Implement a Risk- and Role-Based Access Control Model

This phase of the blueprint Simplify Identity and Access Management will guide readers through the process of creating and implementing a RBAC model.

Integrate Threat Intelligence Into Your Security Operations – Phases 1-4

Intelligence-driven computer network defense is a risk management strategy that addresses the threat component of risk, incorporating analysis of adversaries, their...

Integrate Threat Intelligence Into Your Security Operations – Phase 1: Plan for a Threat Intelligence Program

Assess your organization's unique threat landscape, current capabilities, and define an ideal target state.

Integrate Threat Intelligence Into Your Security Operations – Phase 2: Design an Intelligence Collection Strategy

Design a threat intelligence collection strategy that best supports your organizational needs.

Integrate Threat Intelligence Into Your Security Operations – Phase 3: Optimize the Intelligence Analysis Process

Design a threat intelligence analysis process that complements your existing security operations.

Develop a Security Operations Strategy – Phase 2: Develop Maturity Initiatives

Begin developing and prioritizing gap initiatives in order to achieve the optimal state of operations.

Build Your Security Operations Program From the Ground Up – Phase 2: Assess Your Current State

This phase of the blueprint, Build Your Security Operations From the Ground Up, will help you assess the maturity of your prevention, detection, analysis, and response...
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us