Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
SEIM TM and VM
- This topic has 0 replies, 1 voice, and was last updated 2 years, 11 months ago by .
SIEM (Security Information and Event Management). TM (Threat Management) and Vulnerability Assessments are at different ends of the IT security spectrum. SIEM highlights where things went wrong, whereas VA aims to proactively identify weaknesses and prevent intrusions in the first place with a daily audit. Threat Management looks at possible threats to your company or industry. ‘
Combing all three can have many rewards giving an overall view of your companies security posture. Take business lines as an example, let’s call them biz1 biz2 and biz3. Looking at biz1 and all the technology it utilizes, servers, firewall and routers and creating a profile for biz1 technology then running a vulnerability scan plus looking at the threats to the vulnerability we can actually derive mathematical scores and compare them to other business lines. This helps senior management understand the risks of the business lines and helps them understand where and when investments are needed.
You must be logged in to reply to this topic.