Security Technology & Operations - Storyboard
Topics
Types of Content
Design a Tabletop Exercise to Support Your Security Operation – Phase 3: DevelopIn order to ensure a seamless and well facilitated tabletop exercise, time needs to be dedicated to create briefings, guides, reports, and exercise injects. |
|
Design a Tabletop Exercise to Support Your Security Operation – Phase 2: DesignTo properly design a tabletop exercise, organizations must review their existing threat landscape and incident history in order to identity topics, scope, objectives. |
|
Design a Tabletop Exercise to Support Your Security Operation – Phase 1: PlanTabletop planning starts with the evaluation of needs to ensure proper execution. |
|
Design a Tabletop Exercise to Support Your Security Operation – Phases 1-5The use of a Tabletop Exercises is an excellent way to test the effectiveness of an organizations overall security program, the investment of technology controls, and the... |
|
Develop a Security Operations Strategy – Phase 3: Define Operational InterdependenciesFormalize all operational initiatives by developing a sourcing strategy, measurement program, and implementation roadmap unique to your organization. |
|
Develop a Security Operations Strategy – Phases 1-3Threat management has become resource-intensive, requiring continuous monitoring, collection, and analysis of significant volumes of event data. Implement a next-gen... |
|
Develop a Security Operations Strategy – Phase 1: Assess Operational RequirementsAssess current prevention, detection, analysis, and response capabilities. |
|
Develop a Security Operations Strategy – Phase 2: Develop Maturity InitiativesBegin developing and prioritizing gap initiatives in order to achieve the optimal state of operations. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 3: Optimize the Intelligence Analysis ProcessDesign a threat intelligence analysis process that complements your existing security operations. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 2: Design an Intelligence Collection StrategyDesign a threat intelligence collection strategy that best supports your organizational needs. |
|