Integrated Strategy to Protect and Defend your Enterprise
Credits to Meena.R

Integrated Strategy to Protect and Defend your Enterprise

The Unified Enterprise Defense structure was developed by Capgemini to outline and characterize all of the important elements that an organization must develop and integrate cohesively, to have an effective strategy for protecting and defending an enterprise from all cybersecurity threats.

What they have done is that they have integrated evidence-based approaches and frameworks such as ISO, NIST and CMMI into their

Unified Enterprise Defense strategy.

This strategy drives a comprehensive evaluation for how an organization both protects and defends the enterprise through proper visibility and effective leverage of threat intelligence.

This model spans four major states; Foundational, Reactive, Proactive and Adaptive. Using these states as a measurement scale Capgemini’s

Cybersecurity Defense Maturity Evaluation evaluates 13 domains with an emphasis on the following cybersecurity functions:

Emerging security capabilities

The enterprise has started to build out capabilities for foundational areas of security aligned to risk. Operations take place in a distributed manner, and a standardized model and consistent approach have not been defined and do not focus on network defense functions.

@) Defined security operations

The enterprise has a baseline of repeatable security operations and may have a dedicated team for network defense. Workloads are cyber response activities, preventing effective defensive operations. Threat intelligence may be leveraged in an ad-hoc capacity.

@) Integrated defensive operations

The enterprise has aligned both aspects of securing the enterprise and defending the enterprise into a well-defined industry model. Threat intelligence is integral to daily operations and feeds detective and defensive strategies.

@) Adaptive intelligence operations

The enterprise has established a mature cyber defense program. Operations continue to mature and adapt through automation efficiencies and partnerships as the threat landscape changes. Custom capabilities are established and threat intelligence managed to the degree that historical data trending enables the security organization to stay ahead of adversaries.

It can provide your company an understanding of their existing cybersecurity posture, visibility to and providing a plan for addressing gaps along with a benchmark capability to continually measure your cybersecurity effectiveness.

要查看或添加评论,请登录

Saravind Rajan (PMP? , ITIL4?)的更多文章

  • Why Is SIEM So Important For Information Security?

    Why Is SIEM So Important For Information Security?

    Successful attacks on computers/network systems rarely look like real attacks. It is only in hindsight that you would…

  • What do your Business need Disaster Recovery Plan?

    What do your Business need Disaster Recovery Plan?

    A disaster recovery plan (DRP) is a highly organised documented strategy that “describes how an organisation can…

  • What are the types of Penetration Testing?

    What are the types of Penetration Testing?

    White Box Penetration Testing: White box penetration testing involves sharing full network and system information with…

  • Holistic View of Penetration Testing

    Holistic View of Penetration Testing

    We all know what is Penetration Testing. If you want to gain assurance in your organisation’s vulnerability assessment…

  • What is proactive vs reactive cyber security?

    What is proactive vs reactive cyber security?

    Proactive cyber security involves identifying and addressing security risks before an attack occurs, whereas reactive…

  • What is Spam-Filtering?

    What is Spam-Filtering?

    Approximately 60-70% emails received are SPAM now a days. The spam filters are very crucial though they don't provide…

  • What is an Attack Vector?

    What is an Attack Vector?

    What is an Attack Vector? In the context of information security, an attack vector is a specific path, method, or…

  • What is QOS

    What is QOS

    What is QoS? It is Quality of Service. You would always want a kind of guarantee that--your network would be able to…

  • How Does NTA Improve Your Security

    How Does NTA Improve Your Security

    What is Network Traffic Analysis (NTA)? Network Traffic Analysis is about analyzing all the entities or devices that…

    1 条评论
  • What is DNS Poisoning?

    What is DNS Poisoning?

    How Does a DNS Work? Every time when you type an address of a website into your browser, the following things happen:…

社区洞察

其他会员也浏览了