Successfully reported this slideshow.
Your SlideShare is downloading. ×

rapid_const_pres.pptx

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Upcoming SlideShare
Prés kais
Prés kais
Loading in …3
×

Check these out next

1 of 7 Ad
Advertisement

More Related Content

Advertisement

rapid_const_pres.pptx

  1. 1. Concept
  2. 2. The four key objectives of security operations: • Minimize attacker dwell time to the point where attackers are incapable of achieving their objectives. • Limit lateral movement of attackers in the network. • Prevent re-entry into the network after the closure of an incident. • Understand attacker motivation and capabilities.
  3. 3. Developing and implementing ad hoc detection and prevention measures that combine business context with live threat intelligence. Another interesting consequence is that it is sometimes possible to write specific detections that focus on the business model or tactics of an attacker. The active defense process, during business as usual, assumes that the business is compromised, and the focus is on detecting and evicting adversaries before they achieve their objectives to avoid the consequences of a successful breach.
  4. 4. Strategic: The strategic layer focuses proactively on the integration of security into the business strategy and business processes.
  5. 5. Development
  6. 6. Rapid Construction
  7. 7. THANK YOU

×