Skip to the content Skip to the Navigation
CyberLadder.io
  • Home
  • Background
  • The Framework
    • Introduction
    • Stage 1: Identify & Document
    • Stage 2: Plan
    • Stage 3: Implement
    • Stage 4: Educate & Test
  • Threats
  • Common Mistakes
  • Cautionary Tales
  • Glossary

Stage 2: Plan

  1. HOME
  2. Stage 2: Plan
  1. Steering Committee
  2. Roles & Responsibilities
  3. Device Management Strategies
  4. Workgroups Vs Active Directory Domains
  5. Mobile Device Management (MDM)
  6. Mobile Application Management (MAM)
  7. Cloud Computing
  8. Virtualization & Containerization
  9. Identity & Access Management (IAM)
  10. Federation & Single Sign On (SSO)
  11. Managed Security Service Providers (MSSPs)
  12. Cyber Insurance
  13. Cybersecurity Project Management
  14. Capacity Planning
  15. Requirements Gathering
  16. Network & Computer Hardware Upgrades
  17. Reviewing & Upgrading Operating Systems
  18. Refresh Cycles
  19. Communication Channels
  20. Maintenance Windows & Blackout Periods
  21. Staging Environment
  22. Scope Statement
  23. Program Charter
  24. Security Roadmap
  25. Metrics & Key Indicators

An UMPI Capstone Project
More About UMPI

Homepage

Cybersecurity Program

YourPace Programs

Apply

Further Reading

NIST Cybersecurity Framework

MITRE ATT&CK

CISA Homepage

Center for Internet Security (CIS)

ISO/IEC 27001:2022

Copyright © CyberLadder.io All Rights Reserved.

Powered by WordPress & Lightning Theme by Vektor,Inc. technology.

MENU
  • Home
  • Background
  • The Framework
    • Introduction
    • Stage 1: Identify & Document
    • Stage 2: Plan
    • Stage 3: Implement
    • Stage 4: Educate & Test
  • Threats
  • Common Mistakes
  • Cautionary Tales
  • Glossary