0% found this document useful (0 votes)
460 views

Cybersecurity Domainsv 2dot0

The document outlines key areas of cybersecurity including secure application development, identity and access management, data protection, network design, security architecture, access control, cryptography, vulnerability management, incident response, and compliance. It also lists domains such as threat intelligence, governance, risk management, and internal/external security that are important for a comprehensive cybersecurity program.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
460 views

Cybersecurity Domainsv 2dot0

The document outlines key areas of cybersecurity including secure application development, identity and access management, data protection, network design, security architecture, access control, cryptography, vulnerability management, incident response, and compliance. It also lists domains such as threat intelligence, governance, risk management, and internal/external security that are important for a comprehensive cybersecurity program.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Secure Application

CASB Federated Identity Data Protection Network Design Development


Baseline Configuration

Cloud Security
Secure System Build
Security Architecture
Physical Security
Access Control
Cryptography
Assets Inventory
COBIT
Identity Management Security Engineering Vulnerability
scan Blueteam Social Engineering
ISO/IEC 4th Party Risk
SANS/CSC
NIST
Privileged Access Identity & Access
Management Management 3rd Party Risk
Certification
Conferences Framework Redteam Application
Training and Standard
Risk Assessment Penetration test
Career Development
Infrastructure
Data-Centric Risk
Source Code Scan Data-Flow Map
Peer Groups Self Study Assessment

Industry Specific
DR Blackbox Whitebox
Cybersecurity Domains
Detection Protection Federal
Recovery
Laws and Regulations
Governance
State
BCP Prevention
Security Operation Executive Management Involvement
Audit
Threat Intelligence Risk Informed
Active Defense
SIEM
Reports and Scorecards
User Education Company's Written Supervisory Procedures (WSPs)
Vulnerability Data Leakage
SOC Management
External Compliance & Enforcement KPIs/KRIs
Internal
Incident Response Policy
Guideline
Breach Notification Training (new skills) Procedure
Contextual IOCs Intel. Sharing
Standard
Containment Investigation
Awareness (reinforcement)

Eradication Forensics

You might also like