SECURITY&PRIVACY

Get Started. It's Free
or sign up with your email address
SECURITY&PRIVACY by Mind Map: SECURITY&PRIVACY

1. BUSINESS

1.1. DEVICES

1.1.1. PRIVATE, C/BYOD & CORPORATE

1.1.2. MOBILE, HOME & CORPORATE

1.2. USERS

1.2.1. IDENTITY, AUTHENTICATION & AUTHORIZATION

1.3. DATA

1.3.1. BUSINESS PROCESSES

1.3.1.1. DVZA / HEALTH EXCHANGE

1.3.1.2. EPD / ECD

1.4. CISO

1.5. PARTNERS

1.5.1. ACCREDITATIE?

1.5.2. SELECTIE & BEOORDELING

1.6. Personeel

1.6.1. Kennis

1.6.2. schaarste

2. INFORMATION/APPLICATION

2.1. CLOUD

2.2. DATA

2.2.1. DVZA / HEALTH EXCHANGE

2.3. ON-PREMISES

2.4. IDENTITY, AUTHENTICATION & AUTHORIZATION

2.5. CIA/BIV

2.6. ZERO-TRUST

3. TECHNOLOGY

3.1. CUBE

3.1.1. MICROSEGMENTING

3.1.1.1. HIDS

3.1.1.2. IDS

3.1.2. IDENTITY, AUTHENTICATION & AUTHORIZATION

3.1.3. DATA MANAGEMENT

3.1.4. (MOBILE) APPLICATION MANAGEMENT

3.1.5. (MOBILE) DEVICE MANAGEMENT

3.1.6. (SECURITY) MONITORING, LOGGING & REPORTING

3.2. *** SECURITY

3.2.1. IDS/IPS

3.2.1.1. HIDS

3.2.1.2. NIDS

3.2.2. NOC/SOC

3.2.3. OUTSOURCING

3.2.4. AUDIT

3.2.5. COMPLIANCE

3.2.6. Security by Design

3.2.6.1. hardening

4. Work method

4.1. Agile

4.1.1. Selfservice

4.1.2. Continuous delivery

4.2. Waterfall

5. RISK

5.1. PROFILE (APPETITE vs IMPACT)

5.1.1. DETECT

5.1.2. RESPOND

5.1.3. RESTORE

5.1.4. INSURE/OUTSOURCE?

5.1.5. BEOORDELING & BEHANDELING

6. COMPLIANCY

6.1. ISMS

6.2. BELEID, UITVOERING & TOETSING

6.3. DATA MANAGEMENT

6.3.1. unstructured DATA

6.3.2. DATA classification

7. WET/REGELGEVING/NORMEN

7.1. ISO27001

7.2. NEN7510

7.3. AVG

7.4. MDR

7.5. NTA7516