Vulnerability Management
Identifying Vulnerabilities
Responsible Disclosure
Disclosing information in confidence
Vulnerability Scans
Vulnerability Scans
Vulnerability Remediation
Response and Remediate
Alerting and Monitoring
Alert, monitor, and scan
SNMP
Simple Network Management Protocol
SIEM
Security Information and Event Management
SCAP
Security Content Automation Protocol
Network Traffic Flow
Packet Captures and the sorts
Single Pane of Glass
A central point of access
Logging
Centralizing and Investigating Logs
Logging Tools
Tools for Logs
Baselines and Standards
Security Baselines and Security Standards
System Hardening
Hardening and Securing the Infrastructure
Trusted OS
Enhanced security features in real-time
Updates and Patches
Managing patches
Automation and Orchestration
When to Automate and Orchestrate
Automating Tasks
Sample tasks to automate
Integrations and APIs
Combining into one comprehensive system
Asset and Change Management
Enhancing resource utilization
Change Process and Components
Change Management Process and Owners
Acquisition and Procurement
Managing goods and services
Mobile Assets Deployment
BYOD, COPE, and CYOD