Strategy, Security, Architecture, Operations Franklin Donahoe Strategy, Security, Architecture, Operations Franklin Donahoe

The Emergence of User Adaptive Risk Management

This article discusses the emergence of User Adaptive Risk Management (UARM) as an evolution of traditional Security Awareness and Training (SA&T). It highlights how UARM uses AI and User Behavior Analytics to move beyond basic awareness to real-time, individualized risk mitigation. The article also touches on the potential benefits and challenges of UARM, including privacy concerns and the importance of integration with existing security systems, while referencing companies like Dune Security as innovators in the field.

Read More
Architecture, Strategy, Technology Franklin Donahoe Architecture, Strategy, Technology Franklin Donahoe

A Library of Architectural Frameworks for IT and Cybersecurity Professionals

This document provides a comprehensive overview of key architectural frameworks for IT and Cybersecurity professionals. It covers Enterprise Architecture (EA) frameworks like TOGAF and the Zachman Framework, which focus on holistic enterprise design and management. It also details Cybersecurity frameworks and models including SABSA, the NIST Cybersecurity Framework (CSF), and Zero Trust Architecture (ZTA), offering guidance on managing cyber risk and designing secure systems.

Each framework is analyzed regarding its description, uses, pros and cons, practical application examples, and links to associated governing bodies and official guidance resources. The document aims to serve as a reference library for understanding these frameworks and their applications in improving business efficiency and establishing resilient security postures.

Read More
Strategy, Architecture, Security, Technology, Operations Franklin Donahoe Strategy, Architecture, Security, Technology, Operations Franklin Donahoe

Next-Generation Security Operations Architecture and Delivery for the Enterprise

This article discusses the evolution of Security Operations Centers (SOCs) from traditional models to next-generation architectures. It highlights the limitations of traditional SOCs, driven by siloed tools and manual processes, and explores the drivers pushing organizations towards more advanced approaches. The report delves into the technological advancements revolutionizing the SOC technology stack, including headless SIEM, XSIAM, XDR, SOAR integration, and the use of AI. It also examines the changes in the SOC operating model and talent landscape, as well as the impact on traditional SOC platforms. Finally, it provides strategic recommendations for CISOs and SOC leaders to navigate this evolution and build more resilient security postures.

Read More
Strategy, Architecture, Security, Technology, Operations Franklin Donahoe Strategy, Architecture, Security, Technology, Operations Franklin Donahoe

Embracing an Operation-Centric Security Model for Modern Threat Defense

This article discusses the shift from traditional, reactive cybersecurity models focused on Indicators of Compromise (IOCs) to a more proactive, operation-centric approach that emphasizes Indicators of Behavior (IOBs). It explores the limitations of traditional models, the advantages of the operation-centric model, the necessary technology stack, implementation considerations, and the key roles and skills required for successful operation. The article advocates for understanding the "attack narrative" and utilizing frameworks like MITRE ATT&CK to proactively defend against modern cyber threats.

Read More
Strategy, Architecture, Technology, Security, Operations Franklin Donahoe Strategy, Architecture, Technology, Security, Operations Franklin Donahoe

Zone Architecture in Enterprise IT and Security

This article discusses Zone Architecture as a strategy for dividing an organization's network into distinct segments based on criteria like business function or data sensitivity. It covers the definition, core principles, advantages (such as reduced attack surface and improved scalability), and challenges of implementing Zone Architecture.

The article also explores various implementation approaches, its role in achieving business objectives, and how it enhances data protection and cybersecurity. It provides reference architectures for on-premises and Azure cloud environments, and discusses extending Zone Architecture to multi-cloud and hybrid environments. The conclusion emphasizes strategic considerations and future trends like micro-segmentation and integration with Zero Trust models.

Read More