Threat Intelligence & Incident Response - Storyboard
Topics
Types of Content
Develop and Implement a Security Incident Management Program – Phases 1-3Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident... |
|
Develop and Implement a Security Incident Management Program – Phase 1: PreparePrepare your organization for incident response with formal documentation of policies and processes, and a list of prioritized incidents. |
|
Develop and Implement a Security Incident Management Program – Phase 2: OperateOperate with efficiency and effectiveness as new incidents are handled. |
|
Select and Implement A Next Generation Endpoint Protection Solution – Phase 1: Create an Effective Endpoint Protection StrategyAssess the use-case and corresponding feature-set that best aligns with the organizational landscape. |
|
Integrate Threat Intelligence Into Your Security Operations – Phases 1-4Intelligence-driven computer network defense is a risk management strategy that addresses the threat component of risk, incorporating analysis of adversaries, their... |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 1: Plan for a Threat Intelligence ProgramAssess your organization's unique threat landscape, current capabilities, and define an ideal target state. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 2: Design an Intelligence Collection StrategyDesign a threat intelligence collection strategy that best supports your organizational needs. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 3: Optimize the Intelligence Analysis ProcessDesign a threat intelligence analysis process that complements your existing security operations. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 4: Design a Collaboration and Feedback ProgramStand up an intelligence dissemination and feedback program. |
|
Select and Implement a Next Generation Endpoint Protection Solution – Phases 1-3Endpoint protection is an ever-consolidating market of security controls. Stay up to date; define the endpoint protection strategy and feature set that best aligns with... |
|