Acquisition and Procurement
Managing goods and services
Managing goods and services
Alert, monitor, and scan
Enhancing resource utilization
Verifying software integrity and authenticity
Internal and external assessments
Sample tasks to automate
When to Automate and Orchestrate
Change Management Process and Owners
Consistently managing security controls
Encrypting data at rest and in motion
Classifications, Ownership, and Lifecycle
Identify, monitor, and protect sensitive data
Generally Accepted Privacy Principles (GAAP)
Securing data
Framework for ensuring C-I-A
States, Types, and Classifications of Data
Sanitizing and destroying data
Combining into one comprehensive system
Centralizing and Investigating Logs
Tools for Logs
Management Reviews and Approval
BYOD, COPE, and CYOD
Packet Captures and the sorts
Simulated cyber attack
Protecting and Mishandling Data
Phase 1 of Penetration Testing
Disclosing information in confidence
Security Content Automation Protocol
Understanding of potential threats
Measuring efficiency with metrics
Common security policies
Security Information and Event Management
A central point of access
Simple Network Management Protocol
Hardening and Securing the Infrastructure
Potential security from external entities
Enhanced security features in real-time
Internal and external assessments
Managing patches
Assessing vendors
Assessing vendors
Identifying Vulnerabilities
Response and Remediate
Vulnerability Scans