Your SlideShare is downloading. ×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Develop Your Network Security Roadmap to Lower Incident Costs and Increase Efficiency


Published on

Save over $100,000 in consulting fees with a streamlined and accelerated process. …

Save over $100,000 in consulting fees with a streamlined and accelerated process.

Your Challenge
IT security and/or network managers are frequently stuck in fire-fighting mode, and are rarely able to dedicate the time to proactive planning.
Compliance and well-publicized breaches are providing increased motivation for IT departments to focus on a forward-thinking plan, but they often have the misconception that it requires outside help.
Unnecessary costs are often a result for organizations when they continue to not take their own actions or utilize the information that they already possess.

Our Advice

Critical Insight
Creating a roadmap does not have to be overly complicated.
If you get the right people in the room who will work hard, this project does not need a month to complete – you could finish a roadmap in two days using information your organization already possesses.
Consulting firms will just ask you questions you know you should be asking yourself – save the money.

Impact and Result
The short-term impact is that the process will prevent a lot of headaches and costs that an organization will experience if they attempt to create a roadmap through a consulting group.
The long-term impacts include increased protection against risks, fewer problems with network breaches, less time spent firefighting, and security costs evening out and eventually lowering as issues are proactively addressed.

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Project Title (This is infographic copy) Develop your network security roadmap to lower incident costs & increase efficiency This is the main title of the infographic. It can be the title of the blueprint, but doesn’t have to be. Ensure the project title is unique enough to identify the specific blueprint. Project Tagline (This is infographic copy) Save over $100,000 in consulting fees with a streamlined and accelerated process Insert the tagline of your Blueprint project or create a custom tagline for the infographic. This should be slightly longer then the Project Title, but no longer than 20 words. Member Understanding (This is infographic copy) I’m an IT security or network manager and: • My team and I are constantly in security fire-fighting mode • Our security strategy is to add solutions piecemeal and I know it would cost us less if we planned better • Despite our attempts to patch the “leaks,” we’re dealing with more problems than we need to. There are definitely gaps in our architecture – which is leading to higher costs in network maintenance and lost productivity throughout the whole company • I keep getting surprised by new threats As an IT security or network manager, to solve these problems I need to: • Understand what my organization currently has in place and optimize it • Identify what we’re missing and develop a plan to address those gaps • Prepare a strategy to secure business buy-in to justify costs and create a more comprehensive security plan This statement is used to identify the target audience and the challenge they are trying to overcome Specifically identify the member/role. Should be adapted from our initial member understanding document. Max length at the analyst’s discretion. Overall Insight (This is infographic copy) Key insight: If you get the right people in the room who will work hard, this project will not require a month to complete – you could finish it in 2 days. This overall insight is the central idea of the Blueprint. The overall insight should also drive the overall creative vision of the document. A well-crafted insight statement is key here. Try to make this statement short and sweet. Sub-Insights (This is infographic copy) • Completing a roadmap proactively instead of reactively (e.g. after an incident) keeps stakeholders impressed instead of unhappy. • APTs – the threat landscape is more unpredictable than ever. You can’t afford not to plan. • Increased focus on meeting compliance regulations due to the unpredictable threat landscape encourages planning. • Mobile device landscape – security must be applied beyond your perimeter, which means you’ll be dealing with different threats. • Cloud proliferation – how do you secure end-to-end? Include insights relating schools of thoughts, drivers/trends/change, value creation, etc. Be sure to include data points, complications, unique approaches, etc. that enhance or support the overall insight. Project Steps (This is infographic copy) Insights by Step • Step 1: Conduct current state analysis • Risk tolerance plays a larger role than you think in where your roadmap will end up. • Step 2: Establish an organization’s threat landscape • Your present-day threats don’t always inform your future; be prepared. • Step 3: Determine roadmap deployment priorities • Your roadmap must be informed by not only what you currently have in place, but by your business and compliance requirements as well. • Step 4: Communicate to stakeholders • Buy-in won’t necessarily come easily; you need to sell your roadmap using their language. See Project Steps Table Below A set of steps used to solve the member challenge. Our solution to the clients’ problem. These steps should align with the respective project steps and guided implementations.