Architecture is not THIS! #cybersecurity #infosec #CISO #CIO #SecArch

preview_player
Показать описание
If you're a security architect, one of the things you need to decide on pretty quick is what kind of architect you're going to be. If you're simply sprinkling controls on an existing solution architecture, then, well...

...you might want to ask yourself some tough questions about the value you really bring to your organization.

In this clip, I describe how NOT to do security architecture.

If you'd like to do something different, then use the links below as a place to start.

If you liked this video, please hit the Like button, hit subscribe so you don't miss any new content, and feel free to share it with other people you believe need to hear this message.

I'm out to change our industry, but I can't do it alone. Are you willing to help me?

ABOUT THE PROGRAM

The Security Architecture Accelerator™ is a self-paced program consisting of video lessons to help build the critical skills required to transition from infrastructure architect to being able to build a true enterprise security architecture. This program doesn’t try to complete this journey all at once, however. It simply lays the groundwork with practical examples and instruction to start you on the journey.

At the end of this program, you will:

* Understand the roles of the security architect and how they fit into the overall structure of your security program beyond managing the infrastructure
* Articulate how security architecture forms the basis of the effective security program and describe how enterprise security architecture differs from the common practice of security architecture in most organizations today
* Create abstract, conceptual models of the way value is delivered in your organization to achieve specific objectives the business cares about and identify the appropriate mitigation strategies to ensure its success
* Build and maintain your enterprise security architecture using lightweight documentation created by an agile and iterative approach
* Communicate effectively with your security customers in their language to give them the level of confidence they require that they’ll get what they want
* Effectively support secure project delivery by building the right models at the right time to ensure security requirements are identified and implemented
* Measure the value of your security architecture in business terms to demonstrate to your security customers how security helps them achieve their goals and objectives

The full program outline includes:

PART 1: Understanding Security Architecture

Lesson 0: Introduction
Lesson 1: Clarifying the Role of "Security Architecture"
Lesson 2: Getting Clear about Security Architecture
Lesson 3: Connecting Architecture to the Organization
Lesson 4: Getting from Implementation to Architecture
Lesson 5: True Security
Lesson 6: Understanding Risk
Lesson 7: Designing for Resilience

PART 2: Building Security Architecture

Lesson 8: Identifying Your Architecture Customers
Lesson 9: Creating Your Security Strategy
Lesson 10: Creating Your Enterprise Security Architecture
Lesson 11: Creating Your Security Capabilities
Lesson 12: Supporting Project Delivery
Lesson 13: Demonstrating the Value of Security
Lesson 14: Strategies for Security Architecture Success
Lesson 15: Next Steps

Рекомендации по теме