A Good Security Program
Starts with a Risk Assessment
Drives 'Continous Improvement' mindset
Threats & Risk change over time, you can't set and forget
Five Fundamental Steps
1.
ID the crucial assets
2.
ID the value of crucial assets
3.
ID the impact of loss/harm to these assets
4.
ID the likelihood of loss or harm to assets
5.
Prioritize mitigation activities to be implemented
NIST Framework
We identify where you are in your framework and help with solutions at each phase
Identify
This is where it all begins: a cybersecurity gameplan and strategy are defined, and budget is allocated based on Risk appetite
Protect
People, Processes and Technology, as defined by the Identify process, are put in place to Protect the Critical Assets
Detect
People, Processes and Technology, as defined by the Identify process, are put in place to quickly discover Threats to Critical Assets
Respond
People, Processes and Technology, as defined by the Identify process, are put in place to contain and remove Threats
Recover
People, Processes and Technology, as defined by the Identify process, are used to return to “Business as Usual” or back to acceptable levels while the Incident Response process completes