logo

Chapter 09 - Secure Design Principles & Risk Management

Chapter 09 - Secure Design Principles & Risk Management
Course content
Chapter Kick-off
Secure Design Principles & Risk Management Chapter Kick-off
Trend Analysis
What is Trend Analysis?
Emerging Cybersecurity Trends
Introduction to Gartner’s Reports
XDR Capabilities Improve Accuracy and Productivity
Security Process Automation Eliminates Repetitive Tasks
Artificial Intelligence and Machine Learning
CSOs and Security-oriented Silos
Privacy is Becoming Its Own Discipline
Digital Trust and Safety Teams
Network Security Transforms from LAN to SASE
Cloud Workload Protection Controls
Zero-Trust Replaces VPNs
Secure Design Principles
Introduction Secure Design
Creating Secure Systems
Secure Design Categories
Understanding What the Network is for
Threat Model
The End-to-End Approach
Zero-Trust' of External Inputs
Reduce Attack Surfaces
Security Controls Trust
Protecting Management and Operation Environments
Collect All Relevant Security Events and Logs
Communication Flows Between Components
Segmenting Assets on a Network
Easy Compromise Recovery
Disallow Arbitrary Queries Against Your Data
Ready, Set, Lab! - Drawing a Secure Topology
Risk Management
Case Study
Risk and Cyber Risk
What Is Risk Management?
Risk Management Primary Objectives
Sorting Risks
Valuable Assets
The CIA Triad
CIA Triad Implementation
Assets' Threats
Risk Management Goals
The NIST Risk Management Framework
Categorize
Select & Implement Controls
Assess Controls
Authorize Systems
Monitor
Risk Management - Practice
Security Governance
What Is Governance?
The Organizational Structure
The Governance Framework
Security Program
The Need in Rules and Regulations
PII, PCI, and PHI Compliances
Securing Sensitive Information
Personally Identifiable Information (PII)
Payment Card Industry (PCI)
Personal Health Information (PHI)
Security Models
Intellectual Property
Employees Education
The Goal of Employees Education
Patch Management
Release Management
Backup Management
Human Firewall
Employees Awareness Training
Lucy Awareness - Tool Introduction
Lucy Awareness Program - Practice
Chapter Closure
Secure Design Principles & Risk Management Quiz
10Questions

TechDX