Cyber Security Landscape








 

*** Mitigation Methods - Protect Data ***

BlaBlaBlaLine1

BlaBlaBlaLine2

BlaBlaBlaLine3

 

Mapped Buisness Risks
Brand Damage Data/Secret Loss Service Disruption  

 

Mapped Cyber Risks
Data Security / Loss Extortion Human Error Basic Security Hygiene Identity/Password Protection Insider Threat  

 

Mapped Attack Methods
BotNet Attack Denial Of Service Attack Business Email Impersonation Identity Comprimise Malware Attack Phishing Attack
Ransomware Attack Rootkit Attack Targeted Attack  

 

Mapped Solution Categories
Third Party Risk Application Security Cloud Security Data Security End-Point Security Logs Mgt
Network Security Web Security  

 

Mapped Functions
Application Security Testing Automated Security Controls Testing Cloud Access Broker (inline) Cloud Access Broker (API/OOB) Cloud Container Security Cloud Discovery
Cloud DLP (Inline) Cloud DLP (API/OOB) Cloud Infra-as-a-Service Security Database Activity Monitoring (DAM) Data Classification & Privacy Data Encryption
Data Tokenization/Masking DDoS Protection Deception User Device Mgt - Software/Patch (End-Point) User Device Mgt - Software/Patch (Mobile) Device Mgt -Software/Patch (Server)
Disk Encryption (End Point) Enterprise DLP Application Control (End Point) User Device Registration (End-Point) User Device Registration (Mobile) Detect & Respond (EDR) (End-Point)
File Integrity (FIMM) (End-Point) Media Control (End Point) Next Gen AV (End-Point) End-Point Protection (End-Point) Access Mgt / SSO API Mgt
Authentication/Directory Customer Identity (CIAM) Logging Agent Log Collector Network Access Control (NAC) Network Security Policy Auditor
Network Security Policy Orchestration SSL Decryption Network Tap Cloud Network Threat Analytics Network Threat IPS E/W Network Threat IPS N/S
Network Threat Sandbox E/W Network Threat Sandbox N/S Security Ratings (Vendor & Supplier) Micro-Segmentation Network Firewall Segmentation (East/West) Network Firewall Segmentation (North/South)
URL Filtering (Off-Net) URL Filtering (On-Net) URL Filtering/Proxy (On-Net) URL Filtering/Proxy (On-Net) User Software Self Service (End-Point) User Software Self Service (Mobile)
User-Application Access /Zero-Trust VPN End-User VPN Site-to-Site VPN Web Application Firewall (WAF) Web Isolation  

 

 

Last Updated: 03202020-11:28:25