RETIRED CONTENT
Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.An ineffective and incomplete asset security strategy can result in:
- Data theft and breaches
- Security related breach costs
- Compliance violations
A strong asset security strategy with focus on critical assets can:
- Reduce data privacy violations
- Reduce data leakage or theft
- Reduce help desk ticket submission
- Improve overall security spending
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Module 1: Asset Identification, Evaluation, and Critical Asset Lifecycle Analysis
The Purpose
- Comprehensively identify all digital assets within the organization and classify them based on enterprise value.
- Find out which need to be secured based on their value as determined by the enterprise.
- Classify the organizations digital value to realize what is most important to the sustainability and viability of the organization.
Key Benefits Achieved
- Identify all relevant assets to the organization.
- Arrive upon a final enterprise value of each asset based from a comprehensive evaluation.
- Realize the complete life cycle nature of digital assets through touch point identification and medium cross over.
Activities: | Outputs: | |
---|---|---|
1.1 | Identity your enterprise risk tolerance level |
|
1.2 | Identify your digital assets |
|
1.3 | Evaluate the enterprise value of the data to the organization |
|
1.4 | Swim lane analysis of critical assets |
|
Module 2: Current Security Assessment and Gap Prioritization
The Purpose
- Realize the benefit of data life cycle analysis.
- Understand actual movement of your digital assets.
- Document and identity life cycle movements of digital assets.
Key Benefits Achieved
- Analyze current asset security systems in place to gain hard understanding of how assets are currently secured.
- Identify the current requirements of asset security based on architectural, organizational, and security requirements.
- Prioritize gaps and solutions based on importance, achievability, and the enterprise determined risk tolerance level.
Activities: | Outputs: | |
---|---|---|
2.1 | Current Asset Security Analysis |
|
2.2 | Risk Tolerance Identification |
|
2.3 | Enterprise Requirements Understanding |
|
2.4 | Gap Identification |
|
2.5 | Gap Prioritization |
|
Module 3: Asset Security Optimization Plan
The Purpose
- Evaluate your current digital asset security measures to understand your current capability and maturity levels.
- Determine your starting point of asset security effectiveness.
- Identity your security gaps.
- Prioritize your security gaps.
Key Benefits Achieved
- Create an action plan that secures the organization's digital assets, meets the organizations requirements, aligns with its priorities, and increases its dollar spend effectiveness.
- Effectively implement each security system ensuring high end-user acceptance and senior management buy-in.
Activities: | Outputs: | |
---|---|---|
3.1 | Encryption Implementation |
|
3.2 | DLP Implementation |
|
3.3 | Endpoint Security |
|
3.4 | End-User Education |
|
3.5 | Web Application Firewall, Application Penetration Testing and Cove Verification Implementation |
|
Module 4: Asset Security Governance Plan
The Purpose
- Develop an asset security action plan to effectively meet your asset security requirements.
- Develop and establish asset security requirements for implementation and completion.
- Ensure sustainable asset security.
Key Benefits Achieved
- Creation of a governance plan to ensure sustainable asset security through effective maintenance and revision.
- Keep up to date with new asset threats.
- Determine when to review and when to revise.
- Measure success continually.
Activities: | Outputs: | |
---|---|---|
4.1 | Asset Security Governance Plan Creation |
|
4.2 | Device inventory process |
|
4.3 | Threat intelligence sharing program |
|
4.4 | Ownership and responsibility allocation |
|
4.5 | Review and revision process creation |
|