There are no items in your cart
Add More
Add More
Item Details | Price |
---|
Mon Nov 4, 2024
"Plan Your Organization's Cybersecurity Initiatives" - Author: Rishabh Gupta
Below table provides a starting point to evaluate and map out essential security technologies within a layered defense strategy. To make the most of this resource, organizations can first assess each solution’s purpose, process, and focus, then map these to specific control types, such as preventive, detective, and compensatory controls etc. Aligning these tools with frameworks like the Cyber Kill Chain and MITRE ATT&CK tactics and techniques can further clarify how each solution fits within the broader security landscape, identifying which tools address specific attack stages and threat vectors.
From there, an effective planning exercise involves collaborating with key stakeholders—including security analysts, IT managers, compliance officers, and executive sponsors—to evaluate the solutions based on organizational needs. This includes categorizing tools into "must-have" and "good-to-have" groups, prioritizing solutions based on business requirements, budget constraints, and identified risks. With these insights, teams can develop actionable initiatives and create a phased implementation timeline, ensuring the right technologies and solutions are brought in with the expertise needed for maximum effectiveness.
By following this structured approach, organizations can build a robust security architecture that aligns with both their strategic goals and their commitment to comprehensive cyber defense.
Rishabh Gupta
Cyber Security Expert (based in UAE)
Has worked for companies such as McKinsey & Company, Emirates Group, Ernst & Young, Wipro etc.
Master in Cyber Security from Indian Institute of Information Technology - Allahabad