← @kwm Twitter archive

Keith

@kwm

Spot on. To elaborate a bit:

1) Know what you're protecting (data).

2) Know how #1 can be accessed (systems, via identities).

3) Know the observable events associated with #2.

4) Build and/or buy in an order that makes sense to obtain #3.

5) Detect, respond, improve. https://twitter.com/mattifestation/status/1012682384662257664

6/29/2018, 8:52:16 AM

Favs: 56

Retweets: 23