CYBERSECURITY PROCESS

4D-R2 Philosophy

Internal/External threats and vulnerabilities.
Organization’s personnel, information, intellectual property, and assets.
Detailed information of an incident to authorized personnel to obtain further instructions to potentially.
Internal/External Threat(s).
IT/Cyber personnel,
Management, C-Suite.
Organization’s policies, security training, and infrastructure.
Detect

Internal/External threats and vulnerabilities.

Defend

Organization’s personnel, information, intellectual property, and assets.

Disseminate

Detailed information of an incident to authorized personnel to obtain further instructions to potentially 

Destroy

Internal/External Threat(s).

Regroup

IT/Cyber personnel, Management, C-Suite.

Reforge

Organization’s policies, security training, and infrastructure.