![]() |
Cyber Security Landscape
|
|
*** Functions - Customer Identity (CIAM) *** BlaBlaBlaLine1 BlaBlaBlaLine2 BlaBlaBlaLine3
|
![]() |
| Mapped Buisness Risks | ||||||
| Brand Damage | Data/Secret Loss | Service Disruption | ||||
| Mapped Cyber Risks | ||||||
| Data Security / Loss | Extortion | Human Error | Basic Security Hygiene | Identity/Password Protection | Insider Threat | |
| Mapped Attack Methods | ||||||
| BotNet Attack | Denial Of Service Attack | Business Email Impersonation | Identity Comprimise | Malware Attack | Phishing Attack | |
| Ransomware Attack | Rootkit Attack | Targeted Attack | ||||
| Mapped Mitigation Methods | ||||||
| Limit & Control Access | Protect Data | Manage Identities & Passwords | Block Threats & Attacks | Enable Visibility | ||
| Mapped Solution Categories | ||||||
| Data Security | Event Detection & Response | Identity Mgt | Insider Threat/Behavior Mgt | Privileged Access | ||