1. BUSINESS
1.1. DEVICES
1.1.1. PRIVATE, C/BYOD & CORPORATE
1.1.2. MOBILE, HOME & CORPORATE
1.2. USERS
1.2.1. IDENTITY, AUTHENTICATION & AUTHORIZATION
1.3. DATA
1.3.1. BUSINESS PROCESSES
1.3.1.1. DVZA / HEALTH EXCHANGE
1.3.1.2. EPD / ECD
1.4. CISO
1.5. PARTNERS
1.5.1. ACCREDITATIE?
1.5.2. SELECTIE & BEOORDELING
1.6. Personeel
1.6.1. Kennis
1.6.2. schaarste
2. INFORMATION/APPLICATION
2.1. CLOUD
2.2. DATA
2.2.1. DVZA / HEALTH EXCHANGE
2.3. ON-PREMISES
2.4. IDENTITY, AUTHENTICATION & AUTHORIZATION
2.5. CIA/BIV
2.6. ZERO-TRUST
3. TECHNOLOGY
3.1. CUBE
3.1.1. MICROSEGMENTING
3.1.1.1. HIDS
3.1.1.2. IDS
3.1.2. IDENTITY, AUTHENTICATION & AUTHORIZATION
3.1.3. DATA MANAGEMENT
3.1.4. (MOBILE) APPLICATION MANAGEMENT
3.1.5. (MOBILE) DEVICE MANAGEMENT
3.1.6. (SECURITY) MONITORING, LOGGING & REPORTING
3.2. *** SECURITY
3.2.1. IDS/IPS
3.2.1.1. HIDS
3.2.1.2. NIDS
3.2.2. NOC/SOC
3.2.3. OUTSOURCING
3.2.4. AUDIT
3.2.5. COMPLIANCE
3.2.6. Security by Design
3.2.6.1. hardening
4. Work method
4.1. Agile
4.1.1. Selfservice
4.1.2. Continuous delivery
4.2. Waterfall
5. RISK
5.1. PROFILE (APPETITE vs IMPACT)
5.1.1. DETECT
5.1.2. RESPOND
5.1.3. RESTORE
5.1.4. INSURE/OUTSOURCE?
5.1.5. BEOORDELING & BEHANDELING
6. COMPLIANCY
6.1. ISMS
6.2. BELEID, UITVOERING & TOETSING
6.3. DATA MANAGEMENT
6.3.1. unstructured DATA
6.3.2. DATA classification