CYBERSECURITY PROCESS
4D-R2 Philosophy / D2. DEFEND
D.2
Defend (you are here)
Organization’s personnel, information, intellectual property, and assets.
Detailed information of an incident to authorized personnel to obtain further instructions to potentially.

Perform
Blue Team investigates
Red & Purple Teams are deployed to assist
Initial Investigation
Lock down procedures
Communication to Leadership
Research
Global Incidents
Industry Feeds
Vendor Forums
Internal & External
Locations
Headquarters
Satellite Offices/Additional Branch locations
Homes (Telecommuter)
Networks
Physical
Wireless
Remote Access
Virtual Private Network (VPN)
Servers
Physical
Cloud (AWS/IBM/AZURE)
Additional Assets
Employees
IT Equipment
Monies
Consumer Data
Market Data
Telecommunications
Emergency Services
Citizen Data
Sensitive Gov’t Data
Government Equipment
Consumer Equipment
Military Data/Equipment
Hospitals
Dental
Mental Health