Secure File Exchange/ Firewall &
Deception Fraud Prevention IPS/IDS/NGIPS Unified Threat Management Voice Sec.
Storage Outbound
Secure Config/Hardening
Web Security Gateway Anti-Virus/Malware
Cloud/Vendor Security
CA/PKI WAF NAC Endpoint Sec. Suites
DLP
Hardware/Embedded
DDoS
Secure Access
IoT/SCADA/ICS
Infrastructure Mainframe/Midrange
Email Mobile Sec. Suites
Perimeter
Monitoring Multi-Factor Auth.
Network Endpoint Password/Privilege/Identity Management
Cyber Insurance
Security
Incident Response Application Sec.
Operations
Sec. Analytics Data Compliance Frameworks
Governance
Backup/Recovery
Threat Intelligence
Force Forensics
Multipliers
Bounty Support
Encryption
Brand/Reputation Protection
Comprehensive DR/BC Vulnerability Mgt.
Penetration Testing Data Destruction
SIEM Identity/Access Management
GRC Suite
File Integrity Monitoring
Insider Threat Content/Intellectual Property
Protection
Breach and Attack
Simulation
Value Added Resellers
Sec. Industry Analysis
Research & Development
Managed Security Services
Recruiting/Internships/ Consulting/ Information Assurance/ Complexity Reduction
Succession Planning Professional Training / Conferences Risk Management
Services
Licen se - This wor k is licen sed under Crea tive Comm ons Attr ib ution-Share Alike 4.0 htt ps:/ /creativecommons .or g/licenses/by-s a/4.0/
At tr ibution — You mus t give appropr iate credit, pro vide a link to t helicens e, and indicate if changes were made . You may do s o in an y r easonable manner ,
but n ot in any way that sugges ts t he licens or end ors es you or your use .
ShareA like — If you rem ix, tr ansf orm, or b uild u pon the mat erial, you mus t dis tribut e your contr ibutions under t he same license as the or iginal .
No addition alr est riction s — You may not apply legal term s or t ech nological meas ures that legally r est rict oth ers f rom doing anyth in gt he licens e permit s.
Copyr ight 2018 Jos hua C G eno
Network
Protocol
Secure File Containers
Exchange/Storage Encryption/DRM Virtualization
Cloud/Vendor
Cloud/ Security
Intermediary Compliance
Internal 3rd Party/VPC
CASB
Monitoring External
AI/Correlated/Analytics
Virtual/SDN
Volumetric
Layer 3
Endpoint
Net2Net DDoS Layer 7
Secure Access
Application Cloud/API
Integration/Automation Hardware (NAC)
HoneyPots
Deception Protocol (DNS, OSPF,BGP)
HoneyNets
Infrastructure
Packet Broker
HoneyCredentials
Cloud Virtual / SDN / Micro-segmentation
Filtering
Internal
DMARC
Email Automatic
Cloud/aaS CA/PKI
Provisioning Licen se - This wor k is licen sed under Crea tive Comm ons Attr ib ution-Share Alike 4.0 htt ps:/ /creativecommons .or g/licenses/by-s a/4.0/
Infrastructure Protection At tr ibution — You mus t give appropr iate credit, pro vide a link to t helicens e, and indicate if changes were made . You may do s o in an y r easonable manner ,
but n ot in any way that sugges ts t he licens or end ors es you or your use .
External ShareA like — If you rem ix, tr ansf orm, or b uild u pon the mat erial, you mus t dis tribut e your contr ibutions under t he same license as the or iginal .
No addition alr est riction s — You may not apply legal term s or t ech nological meas ures that legally r est rict oth ers f rom doing anyth in gt he licens e permit s.
Copyr ight 2018 Jos hua C G eno
Perimeter
Layer 3
Layer 7 Signature
Firewall
Virtual/SDN/Cloud IPS/IDS/NGIPS Behavior
Endpoint Deception
Web Security Enterprise Anti-fraud
Gateway
Cloud Fraud
Integrated
Prevention
Analytics
Enterprise
NAC Cloud/Virtual
Mobile
Enterprise
Unified Threat
Management
Cloud
Basic Keywords
Content Discovery/
DLP
Tagging
Cloud/Virtual/CASB
Application
API/In App
WAF Appliance
Cloud/Virtual
Licen se - This wor k is licen sed under Crea tive Comm ons Attr ib ution-Share Alike 4.0 htt ps:/ /creativecommons .or g/licenses/by-s a/4.0/
At tr ibution — You mus t give appropr iate credit, pro vide a link to t helicens e, and indicate if changes were made . You may do s o in an y r easonable manner ,
but n ot in any way that sugges ts t he licens or end ors es you or your use .
ShareA like — If you rem ix, tr ansf orm, or b uild u pon the mat erial, you mus t dis tribut e your contr ibutions under t he same license as the or iginal .
No addition alr est riction s — You may not apply legal term s or t ech nological meas ures that legally r est rict oth ers f rom doing anyth in gt he licens e permit s.
Copyr ight 2018 Jos hua C G eno
Endpoint
Mobile
Baseline Scans/
Voice Sec. Application Manual Remediation
Secure Config/
Infrastructure Hardening
Continuous Hardening/
Automatic Remediation
Signature
Anti-Virus/ Legacy Device
Behavior
Malware Security
Mainframe/
Dynamic Midrange
Security Suites
Traditional Device Security
Endpoint Sec.
Mobile Mobile Sec.
Suites App/Data Security
Suites
Cloud/ Communications
Virtual Security
Trusted
Hardware/ Execution Architecture
Embedded IoT/SCADA/ICS
(Hardware and Trusted (Data Acquisition, SD-LAN (Wired &
Execution Platform Processing, Transmitting, Wireless)
Environment) IoT/Embedded and Storage)
Integration
Devices
Password
Management
Factors
Multi-Factor Password/Privilege/Identity Privilege
Auth. Management Management
Integration/
Federation Identity Licen se - This wor k is licen sed under Crea tive Comm ons Attr ib ution-Share Alike 4.0 htt ps:/ /creativecommons .or g/licenses/by-s a/4.0/
Management At tr ibution — You mus t give appropr iate credit, pro vide a link to t helicens e, and indicate if changes were made . You may do s o in an y r easonable manner ,
but n ot in any way that sugges ts t he licens or end ors es you or your use .
ShareA like — If you rem ix, tr ansf orm, or b uild u pon the mat erial, you mus t dis tribut e your contr ibutions under t he same license as the or iginal .
No addition alr est riction s — You may not apply legal term s or t ech nological meas ures that legally r est rict oth ers f rom doing anyth in gt he licens e permit s.
Copyr ight 2018 Jos hua C G eno
Data
Enterprise Internal Intl./Federal/State
Frameworks
Forensics External/Cloud Compliance
Application Sec. Mobile Industry Frameworks
Proactive Frameworks
Cloud/aaS Reactive Consultants/Assessors/
Registrars
Retention/ At-Rest
Data Destruction/Discovery In-Motion
Destruction Encryption
Voice/Video/RTSP
External Providers
Cloud
Identity Management
Enterprise Change Logging
Access Management
Vulnerability Cloud/aaS File Integrity Change Auditing
Mgt. Monitoring Identity/Access
Integration - Endpoint Federated Identity
Management
Vuln./Patch Detection & Privileged Identity
Management Response Management/Governance
DRM
Content/Intellectual
Property Protection
Protection
Providers
Licen se - This wor k is licen sed under Crea tive Comm ons Attr ib ution-Share Alike 4.0 htt ps:/ /creativecommons .or g/licenses/by-s a/4.0/
At tr ibution — You mus t give appropr iate credit, pro vide a link to t helicens e, and indicate if changes were made . You may do s o in an y r easonable manner ,
but n ot in any way that sugges ts t he licens or end ors es you or your use .
ShareA like — If you rem ix, tr ansf orm, or b uild u pon the mat erial, you mus t dis tribut e your contr ibutions under t he same license as the or iginal .
No addition alr est riction s — You may not apply legal term s or t ech nological meas ures that legally r est rict oth ers f rom doing anyth in gt he licens e permit s.
Copyr ight 2018 Jos hua C G eno
Governance Traditional
(post-event)
Response (non-
Passive Advanced Analysis
integrated)
(predictive)
Threat Intelligence Active Incident Workflow Support Sec.
Response Analytics AI / Cognitive
Integrated Integrated Response and
Workflow (SOAR)
Connectors/
Threat Hunting Integrations
User Behavior
Analytics
Brand/IP
Monitoring Insurance
Brand/Reputation Cyber
Protection Domain Insurance Cyber Risk
Management Transfer
Compliance
Breach and People Attacks Standard
GRC Automation/ Attack Technology Attacks
Suite WorkFlow Simulation Virtual/Cloud
Process/Procedure
Cloud Hosted Connectors/
Attacks
SIEM Integrations
Analytics
Intelligence
Exchange
External Workflow
Support
Ethical Hacking Detection
Penetration Insider (Analytics)
Testing Threat
Automated Tools Prevention
Disclosure
Bounty Support
Reimbursement Licen se - This wor k is licen sed under Crea tive Comm ons Attr ib ution-Share Alike 4.0 htt ps:/ /creativecommons .or g/licenses/by-s a/4.0/
At tr ibution — You mus t give appropr iate credit, pro vide a link to t helicens e, and indicate if changes were made . You may do s o in an y r easonable manner ,
but n ot in any way that sugges ts t he licens or end ors es you or your use .
ShareA like — If you rem ix, tr ansf orm, or b uild u pon the mat erial, you mus t dis tribut e your contr ibutions under t he same license as the or iginal .
No addition alr est riction s — You may not apply legal term s or t ech nological meas ures that legally r est rict oth ers f rom doing anyth in gt he licens e permit s.
Copyr ight 2018 Jos hua C G eno