CYBERSECURITY PROCESS

4D-R2 Philosophy

Internal/External threats and vulnerabilities.
Organization’s personnel, information, intellectual property, and assets.
Detailed information of an incident to authorized personnel to obtain further instructions to potentially.
Internal/External Threat(s).
IT/Cyber personnel,
Management, C-Suite.
Organization’s policies, security training, and infrastructure.
01
Detect

Internal/External threats and vulnerabilities.

02
Defend

Organization’s personnel, information, intellectual property, and assets.

03
Disseminate

Detailed information of an incident to authorized personnel to obtain further instructions to potentially 

04
Destroy

Internal/External Threat(s).

05
Regroup

IT/Cyber personnel, Management, C-Suite.

06
Reforge

Organization’s policies, security training, and infrastructure.