SECURITY&PRIVACY

Get Started. It's Free
or sign up with your email address
SECURITY&PRIVACY by Mind Map: SECURITY&PRIVACY

1. RISK

1.1. PROFILE (APPETITE vs IMPACT)

1.1.1. DETECT

1.1.2. RESPOND

1.1.3. RESTORE

1.1.4. INSURE/OUTSOURCE?

1.1.5. BEOORDELING & BEHANDELING

2. COMPLIANCY

2.1. ISMS

2.2. BELEID, UITVOERING & TOETSING

3. BUSINESS

3.1. DEVICES

3.1.1. PRIVATE, C/BYOD & CORPORATE

3.1.2. MOBILE, HOME & CORPORATE

3.2. USERS

3.2.1. IDENTITY, AUTHENTICATION & AUTHORIZATION

3.3. DATA

3.3.1. BUSINESS PROCESSES

3.4. CISO

3.5. PARTNERS

3.5.1. ACCREDITATIE?

3.5.2. SELECTIE & BEOORDELING

4. INFORMATION/APPLICATION

4.1. CLOUD

4.2. DATA in REST

4.3. DATA in TRANSIT

4.4. ON-PREMISES

4.5. IDENTITY, AUTHENTICATION & AUTHORIZATION

4.6. CIA/BIV

4.7. ZERO-TRUST

5. TECHNOLOGY

5.1. CUBE

5.1.1. MICROSEGMENTING

5.1.2. IDENTITY, AUTHENTICATION & AUTHORIZATION

5.1.3. DATA MANAGEMENT?

5.1.4. (MOBILE) APPLICATION MANAGEMENT

5.1.5. (MOBILE) DEVICE MANAGEMENT

5.1.6. (SECURITY) MONITORING, LOGGING & REPORTING

5.2. *** SECURITY

5.2.1. IDS/IPS

5.2.2. NOC/SOC

5.2.3. OUTSOURCING

5.2.4. AUDIT & COMPLIANCE

6. WET/REGELGEVING/NORMEN

6.1. ISO27001

6.2. NEN7510

6.3. AVG

6.4. MDR

6.5. NTA7516