target audience: TECH BUYER Publication date: Jun 2023 - Document type: IDC PlanScape - Doc Document number: # US50672523
IDC PlanScape: Cybersecurity Architecture to Maximize Value and Trust by Design
Content
List of Tables
List of Figures
Related Links
Table of Contents
-
IDC PlanScape Figure
-
Figure: IDC PlanScape: Executive Summary of Cybersecurity Architecture to Maximize Value and Trust by Design
-
-
Executive Summary
-
Why Is Cybersecurity Architecture Important?
-
What Is Cybersecurity Architecture?
-
Who Are the Key Stakeholders?
-
How Can My Organization Take Advantage of Cybersecurity Architecture?
-
Characteristics of the Target Architecture
-
Innovation
-
Reusability
-
Replaceability
-
Purpose
-
Figure: IDC's Future of Trust Framework
-
Getting Started
-
Define the Influence That the Cybersecurity Architecture Needs to Enable
-
What Are the Standards or Reference Points for the Cybersecurity Architecture?
-
Form a Cybersecurity Architecture Team
-
Assess the Risks
-
Assess the Inventory
-
Figure: Using the NIST Framework to Assess Inventory
-
Focus on Measurement and KPIs
-
Table: Cybersecurity Architecture KPIs
-
Formulate the Cybersecurity Architecture
-
Figure: Security Portfolio Optimization
-
Socialize the Process and Results
-
Prioritize Next Steps
-
Figure: Risk Impact and Business Value
-
Implement
-
-
Advice for Technology Buyers
-
Related Research