Security, Risk & Compliance

Get Started. It's Free
or sign up with your email address
Security, Risk & Compliance by Mind Map: Security, Risk & Compliance

1. Security Technology & Operations

1.1. Endpoint Security

1.1.1. Defend Against Ransomware (SS)

1.1.2. Debunk Machine Learning Endpoint Security Solutions (SS)

1.2. Identity & Access Mgmt.

1.2.1. Simplify Identity and Access Management

1.2.2. Reduce IT Admin Risks and Costs with PAM (SS)

1.3. Security Processes & Operations

1.3.1. Develop a Sec Ops Strategy

1.3.2. Optimize Security Mitigation Effectiveness Using STRIDE

1.3.3. Develop and Deploy Sec Policies

1.3.4. Establish an Effective System of Internal Controls to Mitigate Risks (CIO)

1.3.5. Implement and Optimize an Effective Security Mgmt. Metrics Program (SS)

1.3.6. Forge an Ironclad Reporting Strategy for Security Metrics (SS)

1.3.7. Develop Your Security Outsourcing Strategy (SS)

1.3.8. Develop Foundational Security Operations Process (SS)

1.3.9. Improve InfoSec Practices in the Small Enterprise (SS)

1.3.10. Understanding Regulation with Blockchain Technology (SS)

1.3.11. Embed Security into the DevOps Pipeline (SS)

1.4. Threat Intelligence & Incident Response

1.4.1. Build a Vendor Security Assessment Service

1.4.2. Develop and Implement a Security Incident Mgmt Program

1.4.3. Design and Implement a Vulnerability Mgmt. Program

1.4.4. Design a Tabletop Exercise to Support Your Security Operation (SS)

1.4.5. Integrate Threat Intelligence Into Your Sec Operations (SS)

1.4.6. Master Your Security Incident Response Comms Program (SS)

1.5. Secure Cloud & Network Architecture

1.5.1. Select and Implement an Intrusion Detection and Prevention System

1.5.2. Identify Opportunities to Mature the Security Architecture (SS)

1.5.3. Embed Security into the DevOps Pipeline

1.5.4. Ensure Cloud Security in IaaS, PaaS, and SaaS Environments (SS)

2. Security Risk, Strategy & Governance

2.1. Data Privacy

2.1.1. Comply with the Sec Reqs of HIPAA or SOX

2.1.2. Discover and Classify Your Data

2.1.3. Fast Track Your GDPR Compliance Efforts

2.1.4. Build a Privacy Program (SS)

2.1.5. Comply with the California Consumer Privacy Act (CCPA) (SS)

2.1.6. Demonstrate Data Protection By Design for IT Systems (SS)

2.2. Governance, Risk & Compliance

2.2.1. Combine Sec Risk Mgmt Components into One Program

2.2.2. Build a Business-Driven IT Risk Mgmt. Program (CIO)

2.2.3. Select and Implement a Governance, Risk and Compliance (GRC) Solution

2.2.4. Optimize Security Mitigation Effectiveness Using STRIDE

2.2.5. Develop and Deploy Security Policities

2.2.6. Cute PCI Compliance and Audit Costs in Half

2.2.7. Fast Track Your GDPR Compliance Efforts

2.2.8. Identify the Best Framework for Your Security Policies (SS)

2.2.9. Implement a Security Governance and Management Program (SS)

2.2.10. Implement Security Governance with a Security Steering Committee (SS)

2.2.11. Develop Necessary Documentation for GDPR Compliance (SS)

2.2.12. Reduce and Manage Your Organization's Insider Threat Risk (SS)

2.2.13. Satisfy Customer Requirements for Information Security (SS)

2.2.14. CISO Time Study (SS)

2.3. Security Strategy & Budgeting

2.3.1. Build an Information Sec Strategy

2.3.2. Develop a Security Awareness and Training Program That Empowers End Users

2.3.3. Build, Optimize and Present a Risk-Based Security Budget

2.3.4. Hire or Develop a World-Class CISO

2.3.5. Fast Track Your GDPR Compliance Efforts

2.3.6. Manage Third-Party Service Security Outsourcing (SS)

2.3.7. Develop Your Security Outsourcing Strategy (SS)

2.3.8. Improve Security Governance with a Security Steering Committee (SS)

2.3.9. 2020 Security Priorities Report (SS)

2.3.10. Align Your Security Controls to Industry Frameworks for Compliance (SS)

2.3.11. Dive into Five Years of Security Strategies (SS)