From the course: SIEM: Event Management with Splunk Security

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Prioritize your security goals

Prioritize your security goals

- Designating high impact cybersecurity goals for a new initiative doesn't have to be a complex process. Let's take a closer look at why risk assessments and inventory lists are such powerful resources. First, we'll take a look at the Payment Card Industry's risk assessment guidelines which are provided in their website. PCI is a great example to lean on since all companies need to protect customer payment information. Using PCI's prioritized approach tool, we're going to create a quick spreadsheet to organize and prioritize our goals. In the field, this is oftentimes referred to by auditors as a control matrix. You can find the PCI prioritized approach tool in the exercise files of this course containing Splunk and PCI links. Let's prioritize three goals from our spreadsheet. Since everyone needs backups, let's use incident response from PCI's tool section 12.10.1 as our first priority as a good use case example.…

Contents