{"id":2991,"date":"2019-01-07T11:11:55","date_gmt":"2019-01-07T16:11:55","guid":{"rendered":"http:\/\/chrisgrundemann.com\/?p=2991"},"modified":"2021-07-08T11:10:19","modified_gmt":"2021-07-08T15:10:19","slug":"making-sense-cybersecurity","status":"publish","type":"post","link":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/","title":{"rendered":"Making Sense of Cybersecurity"},"content":{"rendered":"\n<p>I have spent the past 18-24 months deep inside the rabbit hole that is Enterprise InfoSec (Information Security). <a href=\"https:\/\/chrisgrundemann.com\/index.php\/category\/security\/\">Cybersecurity<\/a> has always been a part of my work as an infrastructure engineer and architect. This singular focus was new though. In order to help my company, colleagues, and clients truly see the world of the 21st century through the lens of security, I had to both narrow and broaden my own perspective. Narrow in the sense that security became my paramount goal. Broad in the sense that security goes far beyond firewalls, networks, infrastructure, and even technology. <\/p>\n\n\n\n<p>Now, as I pull my head up from that work, it&#8217;s time to share what I&#8217;ve found with a wider audience and community. Yep &#8211; that&#8217;s YOU.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Beyond the Firewall<\/h2>\n\n\n\n<p>First up is essentially a white paper covering the history and significance of cybersecurity (InfoSec). It also provides some high-level deployment advice. I call it a &#8220;Pillar Paper&#8221; because we define security as the first of four &#8220;pillars&#8221; of IT infrastructure. The others being networking, compute\/storage, and WiFi\/mobility. More on those in the future!<\/p>\n\n\n\n<p>Staying focused on security, here are a few snippets from the <a href=\"https:\/\/www.myriadsupply.com\/about\/library\/content\/Myriad_Pillar_Paper_Security.pdf\">Security Pillar Paper<\/a>:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Security is likely top of mind already for any organization. Not only are attacks becoming more common, the potential damage caused by each threat is reaching catastrophic levels. A perimeter firewall and an A\/V suite are no longer sufficient to protect your organization\u2019s growing assets from the rising number of attack vectors. A sophisticated and comprehensive approach to security that touches every piece of IT infrastructure and every layer of business process is required to avoid potentially crippling loss of time, money, and data.<\/p><p>&#8230;<\/p><p>Organizations need comprehensive security strategies that are closely aligned with business goals. Security must reach far beyond the firewall. Every element in your organization needs to play a key role in securing the entire IT infrastructure. People, processes, and technology must work together to maximize effectiveness and constantly evolve.<\/p><p>&#8230;<\/p><p>Security is needed now more than ever. Our dependence on information systems is at an all-time high, and so is the onslaught of malicious activity. The cyber arms race is on, whether we like it or not, and our only choice is to stay ahead of the game by taking security beyond the firewall so that our operations can flourish and our organizations can stay out of the headlines.<\/p><\/blockquote>\n\n\n\n<p>Obviously this drives home the tagline &#8220;beyond the firewall.&#8221; But what does that mean? How can you take the advice in this paper and apply it in the real world?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security Reference Model<\/h2>\n\n\n\n<p>Effective cybersecurity transcends technology into the organizational, legal, and human realms. Despite that, technology is still required. Specifically the hardware, software, and services that make up your IT security infrastructure. That&#8217;s the sweet spot between &#8220;beyond the firewall&#8221; and &#8220;beyond technology&#8221; altogether.<\/p>\n\n\n\n<p>This area is also increasingly crowded with a seemingly unstoppable wave of new products and new vendors. We want &#8220;defense in depth&#8221; not &#8220;defense in duplication&#8221; but how can we be sure? There is so much marketing buzz around so many emerging areas. It&#8217;s hard to keep it all straight.<\/p>\n\n\n\n<p>We created <a href=\"https:\/\/www.myriadsupply.com\/about\/library\/content\/Myriad_Security_Reference_Model.pdf\">a reference model of IT infrastructure security<\/a> to combat this and to help us answer a few fundamental questions:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1024\" height=\"455\" src=\"http:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58-1024x455.png\" data-orig-src=\"http:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58-1024x455.png\" alt=\"Security Reference Model\" class=\"lazyload wp-image-2989\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271024%27%20height%3D%27455%27%20viewBox%3D%270%200%201024%20455%27%3E%3Crect%20width%3D%271024%27%20height%3D%27455%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58-100x44.png 100w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58-150x67.png 150w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58-300x133.png 300w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58-500x222.png 500w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58-700x311.png 700w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58-768x341.png 768w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58-788x350.png 788w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58-900x400.png 900w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58-1024x455.png 1024w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58.png 2912w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>Cool chart, Chris, but what does it all mean?<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">More on the Model<\/h2>\n\n\n\n<p>I&#8217;ve done my best to answer that in a 6-part series over on the <a href=\"https:\/\/orangematter.solarwinds.com\/author\/chris-grundemann\/\">Orange Matter<\/a> blog. For you, it probably makes the most sense to start with the last post, where I &#8220;describe how this model fits within the broader ecosystem of cybersecurity countermeasures and provide some advice on how to put it all into practice:&#8221;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><a href=\"https:\/\/orangematter.solarwinds.com\/you-are-here-a-reference-model-for-it-infrastructure-security\/\">https:\/\/orangematter.solarwinds.com\/you-are-here-a-reference-model-for-it-infrastructure-security\/ <\/a><\/p><\/blockquote>\n\n\n\n<p>To understand the gap that this model fills I summarized some other useful cybersecurity models and frameworks in the first post of the series:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><a href=\"https:\/\/orangematter.solarwinds.com\/you-are-here-making-sense-of-modern-infosec\/\">https:\/\/orangematter.solarwinds.com\/you-are-here-making-sense-of-modern-infosec\/<\/a><\/p><p><\/p><\/blockquote>\n\n\n\n<p>From there you can deep dive into each of the four domains and their categories in the remaining four posts:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><a href=\"https:\/\/orangematter.solarwinds.com\/you-are-here-perimeter-security\/\">Perimeter<\/a>&nbsp;\u2013 Network Security, Email Security, Web Security, DDoS Protection, Data Loss Prevention, and Ecosystem Risk Management<br><a href=\"https:\/\/orangematter.solarwinds.com\/you-are-here-endpoint-application-security\/\">Endpoint &amp; Application<\/a>&nbsp;\u2013 EPP \/ EDR, Patch &amp; Vulnerability Management, Encryption, Secure Application Delivery, Mobile Device Management, and Cloud Governance<br><a href=\"https:\/\/orangematter.solarwinds.com\/you-are-here-identity-access-security\/\">Identity &amp; Access<\/a>&nbsp;\u2013 SSO (IAM), Privileged Account Management, Multi-Factor Authentication, CASB, Secure Access (VPN), and Network Access Control<br><a href=\"https:\/\/orangematter.solarwinds.com\/you-are-here-visibility-control\/\">Visibility &amp; Control<\/a>&nbsp;\u2013 Automation &amp; Orchestration, SIEM, UBA \/ UEBA, Device Management, Policy Management, and Threat Intelligence<br><\/p><\/blockquote>\n\n\n\n<p>In short, this security reference model provides a framework for answering three critical questions: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Which tools provide defense in depth, and which are just causing duplication?<\/li><li>How do I compare competing products and the protections they provide?<\/li><li>Does my current security infrastructure provide the protection I need?<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity Roadmap<\/h2>\n\n\n\n<p>Of course, to really answer those questions, you must look beyond technology.<\/p>\n\n\n\n<p><em>Beyond technology!? What are you talking about now? <\/em><\/p>\n\n\n\n<p>I recently heard this point confirmed by a panel of CISOs at an <a href=\"https:\/\/www.evanta.com\/ciso\/summits\/new-york#overview\">executive summit in NYC<\/a>. All panelists agreed that the most important thing for a new CISO to learn was not any technology, tool, or technique. Their unequivocal advice was to learn the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Business\">business<\/a>.<\/p>\n\n\n\n<p>Knowing your business is a crucial part of securing your organization. It&#8217;s only one part though. You also need to know your applications, your users, your goals, and your data. Cybersecurity is a journey of constant improvement. It&#8217;s a journey that must be tailored to your organization. To guide this journey you need a roadmap. Your roadmap should clearly define the starting point (your current state), the finish line (your ideal state), and a prioritized series of steps to get you from here to there.<\/p>\n\n\n\n<p>This is important. So, we devised <a href=\"https:\/\/www.myriadsupply.com\/about\/library\/content\/Myriad_Cybersecurity_Roadmap.pdf\">a three part experience<\/a> to help Myriad&#8217;s clients figure it all out:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1024\" height=\"487\" src=\"http:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.39.41-1024x487.png\" data-orig-src=\"http:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.39.41-1024x487.png\" alt=\"Cybersecurity Workshops\" class=\"lazyload wp-image-2994\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271024%27%20height%3D%27487%27%20viewBox%3D%270%200%201024%20487%27%3E%3Crect%20width%3D%271024%27%20height%3D%27487%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.39.41-100x48.png 100w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.39.41-150x71.png 150w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.39.41-300x143.png 300w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.39.41-500x238.png 500w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.39.41-700x333.png 700w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.39.41-736x350.png 736w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.39.41-768x365.png 768w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.39.41-900x428.png 900w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.39.41-1024x487.png 1024w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.39.41.png 1820w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1024\" height=\"422\" src=\"http:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.41.44-1024x422.png\" data-orig-src=\"http:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.41.44-1024x422.png\" alt=\"Cybersecurity Roadmap\" class=\"lazyload wp-image-2995\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271024%27%20height%3D%27422%27%20viewBox%3D%270%200%201024%20422%27%3E%3Crect%20width%3D%271024%27%20height%3D%27422%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.41.44-100x41.png 100w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.41.44-150x62.png 150w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.41.44-300x124.png 300w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.41.44-500x206.png 500w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.41.44-700x288.png 700w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.41.44-768x316.png 768w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.41.44-850x350.png 850w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.41.44-900x371.png 900w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.41.44-1024x422.png 1024w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-11.41.44.png 1816w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Make Sense?<\/h2>\n\n\n\n<p>Now it&#8217;s your turn to teach me. What did I get wrong? What did I miss? What&#8217;s just not clear? How can these tools be improved?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have spent the past 18-24 months deep inside the <a href=\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/\"> &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":2989,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[24,27],"tags":[887,260,261,323,888,889,890,866,769],"class_list":["post-2991","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-technology","tag-cybersecurity","tag-framework","tag-frameworks","tag-information","tag-infosec","tag-model","tag-models","tag-security","tag-security-resources"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Making Sense of Cybersecurity (How-To) ~ Chris Grundemann<\/title>\n<meta name=\"description\" content=\"You know that Cybersecurity is critical to your organization. But how do you make sense of such a crowded landscape, full of new tech that keeps changing?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Making Sense of Cybersecurity (How-To) ~ Chris Grundemann\" \/>\n<meta property=\"og:description\" content=\"You know that Cybersecurity is critical to your organization. But how do you make sense of such a crowded landscape, full of new tech that keeps changing?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Chris Grundemann\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/chris.grundemann\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-07T16:11:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-08T15:10:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2912\" \/>\n\t<meta property=\"og:image:height\" content=\"1294\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"~Chris\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/ChrisGrundemann\" \/>\n<meta name=\"twitter:site\" content=\"@ChrisGrundemann\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"~Chris\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/\"},\"author\":{\"name\":\"~Chris\",\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f\"},\"headline\":\"Making Sense of Cybersecurity\",\"datePublished\":\"2019-01-07T16:11:55+00:00\",\"dateModified\":\"2021-07-08T15:10:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/\"},\"wordCount\":1004,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58.png\",\"keywords\":[\"cybersecurity\",\"Framework\",\"Frameworks\",\"information\",\"infosec\",\"model\",\"models\",\"Security\",\"security resources\"],\"articleSection\":[\"Security\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/\",\"url\":\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/\",\"name\":\"Making Sense of Cybersecurity (How-To) ~ Chris Grundemann\",\"isPartOf\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58.png\",\"datePublished\":\"2019-01-07T16:11:55+00:00\",\"dateModified\":\"2021-07-08T15:10:19+00:00\",\"description\":\"You know that Cybersecurity is critical to your organization. But how do you make sense of such a crowded landscape, full of new tech that keeps changing?\",\"breadcrumb\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58.png\",\"contentUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58.png\",\"width\":2912,\"height\":1294,\"caption\":\"Cybersecurity Reference Model\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/chrisgrundemann.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/chrisgrundemann.com\/index.php\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Making Sense of Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/chrisgrundemann.com\/#website\",\"url\":\"https:\/\/chrisgrundemann.com\/\",\"name\":\"Chris Grundemann\",\"description\":\"Use technology, marketing, and strategy to take your growing business to the next level.\",\"publisher\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/chrisgrundemann.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/chrisgrundemann.com\/#organization\",\"name\":\"Grundemann Technology Solutions\",\"url\":\"https:\/\/chrisgrundemann.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png\",\"contentUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png\",\"width\":512,\"height\":512,\"caption\":\"Grundemann Technology Solutions\"},\"image\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/ChrisGrundemann\",\"https:\/\/www.linkedin.com\/company\/grundemann\",\"https:\/\/www.linkedin.com\/in\/cgrundemann\/\",\"https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f\",\"name\":\"~Chris\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"caption\":\"~Chris\"},\"description\":\"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...\",\"sameAs\":[\"https:\/\/chrisgrundemann.com\",\"https:\/\/www.facebook.com\/chris.grundemann\",\"http:\/\/instagram.com\/chrisgrundemann\",\"www.linkedin.com\/in\/cgrundemann\",\"https:\/\/x.com\/https:\/\/twitter.com\/ChrisGrundemann\",\"https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Making Sense of Cybersecurity (How-To) ~ Chris Grundemann","description":"You know that Cybersecurity is critical to your organization. But how do you make sense of such a crowded landscape, full of new tech that keeps changing?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Making Sense of Cybersecurity (How-To) ~ Chris Grundemann","og_description":"You know that Cybersecurity is critical to your organization. But how do you make sense of such a crowded landscape, full of new tech that keeps changing?","og_url":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/","og_site_name":"Chris Grundemann","article_author":"https:\/\/www.facebook.com\/chris.grundemann","article_published_time":"2019-01-07T16:11:55+00:00","article_modified_time":"2021-07-08T15:10:19+00:00","og_image":[{"width":2912,"height":1294,"url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58.png","type":"image\/png"}],"author":"~Chris","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/ChrisGrundemann","twitter_site":"@ChrisGrundemann","twitter_misc":{"Written by":"~Chris","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/"},"author":{"name":"~Chris","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f"},"headline":"Making Sense of Cybersecurity","datePublished":"2019-01-07T16:11:55+00:00","dateModified":"2021-07-08T15:10:19+00:00","mainEntityOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/"},"wordCount":1004,"commentCount":1,"publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58.png","keywords":["cybersecurity","Framework","Frameworks","information","infosec","model","models","Security","security resources"],"articleSection":["Security","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/","url":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/","name":"Making Sense of Cybersecurity (How-To) ~ Chris Grundemann","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58.png","datePublished":"2019-01-07T16:11:55+00:00","dateModified":"2021-07-08T15:10:19+00:00","description":"You know that Cybersecurity is critical to your organization. But how do you make sense of such a crowded landscape, full of new tech that keeps changing?","breadcrumb":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#primaryimage","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58.png","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58.png","width":2912,"height":1294,"caption":"Cybersecurity Reference Model"},{"@type":"BreadcrumbList","@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/making-sense-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chrisgrundemann.com\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/chrisgrundemann.com\/index.php\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Making Sense of Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/chrisgrundemann.com\/#website","url":"https:\/\/chrisgrundemann.com\/","name":"Chris Grundemann","description":"Use technology, marketing, and strategy to take your growing business to the next level.","publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chrisgrundemann.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chrisgrundemann.com\/#organization","name":"Grundemann Technology Solutions","url":"https:\/\/chrisgrundemann.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","width":512,"height":512,"caption":"Grundemann Technology Solutions"},"image":{"@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ChrisGrundemann","https:\/\/www.linkedin.com\/company\/grundemann","https:\/\/www.linkedin.com\/in\/cgrundemann\/","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]},{"@type":"Person","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f","name":"~Chris","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","caption":"~Chris"},"description":"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...","sameAs":["https:\/\/chrisgrundemann.com","https:\/\/www.facebook.com\/chris.grundemann","http:\/\/instagram.com\/chrisgrundemann","www.linkedin.com\/in\/cgrundemann","https:\/\/x.com\/https:\/\/twitter.com\/ChrisGrundemann","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]}]}},"jetpack_featured_media_url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2018\/12\/Screenshot-2018-12-29-09.13.58.png","jetpack_shortlink":"https:\/\/wp.me\/ps8ie-Mf","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/2991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/comments?post=2991"}],"version-history":[{"count":0,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/2991\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media\/2989"}],"wp:attachment":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media?parent=2991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/categories?post=2991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/tags?post=2991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}