You are on page 1of 1

Secure Application

CASB Federated Identity Data Protection Network Design Development
Baseline Configuration

Cloud Security
Secure System Build
Security Architecture
Physical Security
Access Control
Cryptography
Assets Inventory
COBIT
Identity Management Security Engineering Vulnerability
scan Blueteam Social Engineering
ISO/IEC 4th Party Risk
SANS/CSC
NIST
Privileged Access Identity & Access
Management Management 3rd Party Risk
Certification
Conferences Framework Redteam Application
Training and Standard
Risk Assessment Penetration test
Career Development
Infrastructure
Data-Centric Risk
Source Code Scan Data-Flow Map
Peer Groups Self Study Assessment

Industry Specific
DR Blackbox Whitebox
Cybersecurity Domains
Detection Protection Federal
Recovery
Laws and Regulations
Governance
State
BCP Prevention
Security Operation Executive Management Involvement
Audit
Threat Intelligence Risk Informed
Active Defense
SIEM
Reports and Scorecards
User Education Company's Written Supervisory Procedures (WSPs)
Vulnerability Data Leakage
SOC Management
External Compliance & Enforcement KPIs/KRIs
Internal
Incident Response Policy
Guideline
Breach Notification Training (new skills) Procedure
Contextual IOCs Intel. Sharing
Standard
Containment Investigation
Awareness (reinforcement)

Eradication Forensics