Security Technology & Operations - Storyboard

Simplify Identity and Access Management – Phase 3: Create an RBAC Maintenance Plan

This phase of the blueprint Simplify Identity and Access Management covers best practices regarding exception handling and maintaining the RBAC system over time.

Select and Implement a SIEM Solution – Phases 1-3

Security Information and Event Management (SIEM) technology provides a great deal of visibility into an organization's networks and can identify extremely sophisticated...

Develop Foundational Security Operations Processes – Phases 1-3

Threat management has become resource-intensive, requiring continuous monitoring, collection, and analysis of significant volumes of event data. Implement a...

Develop Foundational Security Operations Processes – Phase 1: Assess Your Current State

Assess current prevention, detection, analysis, and response capabilities.

Implement and Optimize an Effective Security Management Metrics Program – Phase 3: Track and Report Metrics

Move forward with your metrics program confidently through consistent tracking and reporting.

Build a Vendor Security Assessment Service – Phases 1-3

This storyboard will help you build or improve your vendor security assessment service using a risk-based approach to maximize efficiency.

Build a Vendor Security Assessment Service – Phase 1: Define Governance and Process

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you determine your business requirements and build your process to meet them.

Develop Your Security Outsourcing Strategy – Phase 1: Determine What to Outsource

This phase of the blueprint, Develop Your Security Outsourcing Strategy, will help you determine what responsibilities or functions you should outsource and the cost...

Integrate Threat Intelligence Into Your Security Operations – Phase 3: Optimize the Intelligence Analysis Process

Design a threat intelligence analysis process that complements your existing security operations.

Integrate Threat Intelligence Into Your Security Operations – Phase 4: Design a Collaboration and Feedback Program

Stand up an intelligence dissemination and feedback program.
GET HELP Contact Us
×
VL Methodology