CYBERSECURITY PROCESS

4D-R2 Philosophy / D.4 DESTROY

Internal/External threats and vulnerabilities.
Organization’s personnel, information, intellectual property, and assets.
Detailed information of an incident to authorized personnel to obtain further instructions to potentially.
D.4
Destroy (you are here)
Internal/External Threat(s).
IT/Cyber personnel,
Management, C-Suite.
Organization’s policies, security training, and infrastructure.
Detect

Internal/External threats and vulnerabilities.

Defend

Organization’s personnel, information, intellectual property, and assets.

Disseminate

Detailed information of an incident to authorized personnel to obtain further instructions to potentially 

Destroy

Internal/External Threat(s).

Regroup

IT/Cyber personnel, Management, C-Suite.

Reforge

Organization’s policies, security training, and infrastructure.

Perform

Red/Black Team
Collect Intelligence e-Discovery
Communication to Leadership
Report/Terminate Threat

Threat/Attacker Base of Operations

Locations

Headquarters
Satellite Offices/Additional Branch locations
Homes (Telecommuter)
Nation State

Networks

Physical
Wireless
Remote Access Virtual Private Network (VPN)

Servers

Physical
Cloud (AWS/IBM/AZURE)

Additional Assets

ISP
IT Equipment
Bank Account Data
Geolocation/Position
Identity/Associations
Military Data/Equipment
Additional Individual Data
Electronic Devices