CYBERSECURITY PROCESS

4D-R2 Philosophy / D2. DEFEND

Internal/External threats and vulnerabilities.
D.2
Defend (you are here)
Organization’s personnel, information, intellectual property, and assets.
Detailed information of an incident to authorized personnel to obtain further instructions to potentially.
Internal/External Threat(s).
IT/Cyber personnel,
Management, C-Suite.
Organization’s policies, security training, and infrastructure.
Detect

Internal/External threats and vulnerabilities.

Defend

Organization’s personnel, information, intellectual property, and assets.

Disseminate

Detailed information of an incident to authorized personnel to obtain further instructions to potentially 

Destroy

Internal/External Threat(s).

Regroup

IT/Cyber personnel, Management, C-Suite.

Reforge

Organization’s policies, security training, and infrastructure.

Perform

Blue Team investigates
Red & Purple Teams are deployed to assist
Initial Investigation
Lock down procedures
Communication to Leadership

Research

Global Incidents
Industry Feeds
Vendor Forums

Internal & External

Locations

Headquarters
Satellite Offices/Additional Branch locations
Homes (Telecommuter)

Networks

Physical
Wireless
Remote Access Virtual Private Network (VPN)

Servers

Physical
Cloud (AWS/IBM/AZURE)

Additional Assets

Employees
IT Equipment
Monies
Consumer Data
Market Data
Telecommunications
Emergency Services
Citizen Data
Sensitive Gov’t Data
Government Equipment
Consumer Equipment
Military Data/Equipment
Hospitals
Dental
Mental Health