Manage the data lifecycle

THE PROGRAM

  • Managing assets and appropriate asset retention
  • Providing secure resources/components and associated service levels
  • Manage data lifecycle and appropriate retention
  • Control physical and logical access
  • Manage identification and authentication of people, devices and services
  • Manage the identity and access provisioning lifecycle
  • Perform configuration management
  • Apply the fundamental concepts of security operations
  • Managing incidents
  • Apply and maintain detection and prevention measures
  • Implement and manage patches and vulnerabilities
  • Participate in business continuity planning and exercises
  • Identify the most sensitive information and servers and maintain a network diagram
  • Keep an exhaustive inventory of privileged accounts and keep it up to date
  • Identify by name each person accessing the system and distinguish between user/administrator roles
  • Compliance and other requirements and KPIs/KRIs
  • Physical security
  • Development methodologies

Ready to Start?