Keith
@kwm
Spot on. To elaborate a bit:
1) Know what you're protecting (data).
2) Know how #1 can be accessed (systems, via identities).
3) Know the observable events associated with #2.
4) Build and/or buy in an order that makes sense to obtain #3.
5) Detect, respond, improve. https://twitter.com/mattifestation/status/1012682384662257664
6/29/2018, 8:52:16 AM
Favs: 56
Retweets: 23
link