Chapter 11: Security Management Techniques
As you have discovered thus far, there are many elements that need to work together in improving the security posture of enterprise networks and the organization as a whole. During the course of this book, you have learned about the principles and importance of implementing a Defense-in-Depth (DiD) approach to defend against the latest cyberattacks and threats. One such element that is commonly overlooked and sometimes forgotten in the industry is the need to implement policies, procedures, and guidelines for managing assets, configuring mobile and portable computing devices, and maintaining patch levels and vulnerabilities within the organization.
While many organizations work continuously to ensure all aspects of DiD are implemented and enforced, some companies sometimes forget some of the essential things such as managing the patch levels on all their devices and even proactively looking for vulnerabilities on their network. Being in...