Ciso Mindmap PDF
Ciso Mindmap PDF
Ciso Mindmap PDF
Operations
What Do Security
Vulnerability WAF, Antivirus, etc)
Management Media Relations
NetFlow analysis
Incident Readiness Assessment
Data Breach
Operating Systems Preparation
Automate
Security Projects Network Devices Threat
Business Case Development Hunting Update and Test
Applications
Incident Response Plan
Alignment with IT Projects MSSP integration
Databases
Set Leadership
Balance FTE and contractors Threat Detection Expectations
Code Review
capability assessment
Balancing budget for Budget Physical Security Media Relations
People, Trainings, and
Tools/Technology Cloud misconfiguration testing Business Continuity
Gap assessment
Plan
Cyber Risk Insurance Mobile Devices Prioritization to fill gaps
Forensic and IR
Technology amortization IoT SOC Operations Partner, retainer
Virtual Reality
http://rafeeqrehman.com Repository (LDAP/Active Directory, Cloud Identity, Local ID stores)
Federation
Augmented Reality
2-Factor (multi-factor) Authentication - MFA
Crypto currencies
Role-Based Access Control
BlockChain
HR Process Integration
Securing training and test data Artificial Intelligence
Integrating cloud-based identities
Adversarial attacks
IoT device identities
Chatbots and NLP
IAM SaaS solutions
Drones
Unified identity profiles
5G use cases and security
Voice signatures
Edge Computing
Password-less authentication
Face recognition
Design reviews
COSO
Certification and Accreditation
COBIT
ISO
Traditional Network Segmentation
Risk Mgmt/Control Frameworks ITIL
Micro segmentation strategy
NIST - relevant NIST standards and guidelines
Application protection
FAIR
Defense-in-depth
Visibility across multiple frameworks
Remote Access
Resource Management
Encryption Technologies
Roles and Responsibilities
Backup/Replication/Multiple Sites Governance
Security Architecture Data Ownership, sharing, and data privacy
Cloud/Hybrid/Multiple Cloud Vendors
Conflict Management
Software Defined Networking
Operational Metrics
Network Function Virtualization
Metrics and Reporting Executive Metrics and Reporting
Zero trust models and roadmap
Validating effectiveness of metrics
SASE strategy, vendors
IT, OT, IoT/IIoT Convergence
Overlay networks, secure enclaves
Explore options for cooperative SOC, collaborative infosec
SOX
Aligning with Corporate
HIPAA and HITECH Objectives
ROSI
Vulnerability Management
Access Control
Data Centric
Data Loss Prevention - DLP Approach
Risk Management
Partner Access
Encryption/Masking
Industrial Controls
Systems
PLCs
Operational Technologies
SCADA
HMIs
Risk scoring