Hi John
These are related because security isn't just technology and I am not trying to tell you anything you may already be aware of but just in case...
Change Management - so you know things are happening and hopefully in a coordinated fashioned to not break other things
Patch Management e.g IOS, System OS and application
Incident response - that is what do you do if your system indicates a breach may have occurred how do you confirm the problem exists and isn't a false alarm, isolate the issue, determine the damage, fix things and prevent further outbreaks all while dealing with users, third parties and management
Cheers,
Adam Booth
> On 2 Feb 2015, at 8:27 am, John Haddad <loserboy3000_at_hotmail.com> wrote:
>
> Good day all,
>
> we are deploying the best security measurement in our companies which includes
> the following:
>
> 1- DDOS
> 2-ISE or NAC
> 3-file encryption
> 4-data traffic encryption between the branches
> 5-phsical security to communication rooms
> 6-applying vulnerability and penetration test
> 7-two layers of firewall on internet side including layer 7 firewall
> 8-LAN firewall
> 9-IPS
> 10-secuirty coloration event
>
>
> can any person suggest more or comment about suggested high level plan.
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Mon Feb 02 2015 - 11:20:12 ART
This archive was generated by hypermail 2.2.0 : Wed Apr 01 2015 - 06:32:39 ART