RETIRED CONTENT
Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.Organizations need a network security roadmap because of:
- APTs – the threat landscape is more unpredictable than ever. You can’t afford not to plan.
- An increased focus on meeting compliance regulations due to the unpredictable threat landscape.
- Mobile device landscape – security must be applied beyond your perimeter, which means you’ll be dealing with different threats.
- Cloud proliferation – secure your networks end-to-end.
If you have a network security roadmap, there is:
- Increased preparedness (for the annual budget cycle and the ability to defend security).
- Increased security against risk.
- Proactive posture towards the threat landscape.
- Future-looking agenda to address security goals in the long-term.
- Minimized number of potential breaches.
- Minimized impact of potential breaches.
- Minimized cost and time of responding to breaches and dealing with potential network downtime (and subsequent employee and client dissatisfaction and business grief).
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Module 1: Conduct Current State Analysis
The Purpose
- Understand risk tolerance levels.
- Discuss organizational reality.
- Establish how much risk your organization is willing to accept.
Key Benefits Achieved
- Determine risk tolerance level.
- Understand that risk encompasses business and IT.
Activities: | Outputs: | |
---|---|---|
1.1 | Establish risk tolerance level (high, moderate, or low). |
|
1.2 | Establish organizational reality. |
|
Module 2: Establish Organization’s Threat Landscape
The Purpose
- Understand current threat landscape.
- Predict future threats.
- Understand value of third-party pen-testing.
Key Benefits Achieved
- Establishes baseline of how well you’re handling current threats, and forces you to think more into the future and be more anticipatory of threats.
Activities: | Outputs: | |
---|---|---|
2.1 | Understand the threat landscape. |
|
2.2 | Anticipate future threat landscape. |
|
Module 3: Determine Roadmap Deployment Priorities
The Purpose
- Determine next steps in the form of a prioritized roadmap – what do we deploy and when?
Key Benefits Achieved
- Map business requirements to security needs, bridging an important gap in organizations.
- Create a roadmap with your organization’s needs in mind.
Activities: | Outputs: | |
---|---|---|
3.1 | Determine business requirements. |
|
3.2 | Establish security priorities. |
|
3.3 | Document currently deployed security tools. |
|
Module 4: Obtain Business Buy-in
The Purpose
- It is one thing to create a roadmap, but business ultimately decides whether to pay for any implementations you request.
Key Benefits Achieved
- Demonstrate that you have taken business needs into consideration and addressed them within your roadmap to achieve stakeholder support.
Activities: | Outputs: | |
---|---|---|
4.1 | Understand business needs. |
|
4.2 | Establish a communication strategy to sell the roadmap to business stakeholders. |
|