What You Need to Know Before
You Start
Starts 9 June 2025 16:20
Ends 9 June 2025
00
days
00
hours
00
minutes
00
seconds
46 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Learn essential strategies for managing an inherited security department, covering OSINT tools, best practices, and key areas like compliance, user education, and vulnerability scanning.
Syllabus
- Introduction to Inherited Security Departments
- Open Source Intelligence (OSINT) Tools
- Establishing Best Practices
- Compliance and Regulatory Requirements
- User Education and Awareness
- Vulnerability Scanning and Management
- Building a Collaborative Security Culture
- Measuring and Reporting Success
- Conclusion and Next Steps
Understanding the Current Security Landscape
Assessing the State of Your Inherited Department
Overview of Popular OSINT Tools
Implementing OSINT for Security Monitoring
Developing a Security Policy Framework
Creating Incident Response Plans
Prioritizing Risk Management and Mitigation
Identifying Relevant Security Regulations
Building a Compliance Program
Designing a Security Awareness Program
Training Techniques and Engagement Strategies
Tools and Techniques for Effective Vulnerability Scanning
Analyzing and Addressing Vulnerabilities
Fostering Communication Across Departments
Encouraging Stakeholder Participation
Key Metrics for Security Performance
Reporting and Continuous Improvement
Creating a Strategic Roadmap for Security Development
Leveraging Resources for Ongoing Success
Subjects
Conference Talks