O slideshow foi denunciado.
Seu SlideShare está sendo baixado. ×

rapid_const_pres.pptx

Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Próximos SlideShares
Prés kais
Prés kais
Carregando em…3
×

Confira estes a seguir

1 de 7 Anúncio

Mais Conteúdo rRelacionado

Mais recentes (20)

Anúncio

rapid_const_pres.pptx

  1. 1. Concept
  2. 2. The four key objectives of security operations: • Minimize attacker dwell time to the point where attackers are incapable of achieving their objectives. • Limit lateral movement of attackers in the network. • Prevent re-entry into the network after the closure of an incident. • Understand attacker motivation and capabilities.
  3. 3. Developing and implementing ad hoc detection and prevention measures that combine business context with live threat intelligence. Another interesting consequence is that it is sometimes possible to write specific detections that focus on the business model or tactics of an attacker. The active defense process, during business as usual, assumes that the business is compromised, and the focus is on detecting and evicting adversaries before they achieve their objectives to avoid the consequences of a successful breach.
  4. 4. Strategic: The strategic layer focuses proactively on the integration of security into the business strategy and business processes.
  5. 5. Development
  6. 6. Rapid Construction
  7. 7. THANK YOU

×