Build Your Security Operations Program From the Ground Up – Phase 2: Assess Your Current State

Author(s): Marc Mazur

As part of Info-Tech's threat collaboration environment, each process needs to build upon and support one another. This phase will take you through a current gap maturity assessment of your security operations capabilities including:

  • Planning and direction
  • Prevention
  • Detection
  • Analysis
  • Response
  • Automation

Use this phase as part of the full blueprint, Build Your Security Operations From the Ground Up.