Cyber Security Landscape








 

*** Mitigation Methods - Manage Threats & Vulnerabilities ***

BlaBlaBlaLine1

BlaBlaBlaLine2

BlaBlaBlaLine3

 

Mapped Buisness Risks
Brand Damage Data/Secret Loss Service Disruption  

 

Mapped Cyber Risks
Data Security / Loss Extortion Human Error Basic Security Hygiene Identity/Password Protection Insider Threat  

 

Mapped Attack Methods
BotNet Attack Denial Of Service Attack Business Email Impersonation Identity Comprimise Malware Attack Phishing Attack
Ransomware Attack Rootkit Attack Targeted Attack  

 

Mapped Solution Categories
Application Security Cloud Security iOT/OT Security Logs Mgt Vulnerability / Attack Surface Detection  

 

Mapped Functions
Application Security Testing Automated Security Controls Testing Cloud Access Broker (inline) Cloud Access Broker (API/OOB) Cloud Container Security Cloud Discovery
Cloud DLP (Inline) Cloud DLP (API/OOB) Cloud Infra-as-a-Service Security DDoS Protection Deception External/Digital Risk Review
API Mgt IOT Device Visibility Logging Agent Log Collector Cloud Network Threat Analytics ICS/OT Device Visibility
User-Application Access /Zero-Trust VPN Vulnerability Scanning Web Application Firewall (WAF)  

 

 

Last Updated: 03202020-11:28:25