OWASP Chart.svg
DEVICES
USERS
DATA
NETWORKS
APPLICATIONS
RECOVER
RESPOND
DETECT
PROTECT
IDENTIFY
GOVERN
DEV-GOV
DEV-IDE
DEV-PRO
DEV-DET
DEV-RES
DEV-REC
APP-GOV
APP-IDE
APP-PRO
APP-DET
APP-RES
APP-REC
NET-GOV
NET-IDE
NET-PRO
NET-DET
NET-RES
NET-REC
DAT-GOV
DAT-IDE
DAT-PRO
DAT-DET
DAT-RES
DAT-REC
USE-GOV
USE-IDE
USE-PRO
USE-DET
USE-RES
USE-REC
vCiso: Maturity M&A Assessments, Roadmap Build
Staffing and Recruiting
SOC
Managed SIEM
Incident Response
Awareness Training
Phishing Tests
Policy Enforcement
Attack Surface Management
IAM
MFA / SSO
Email Security
PAM
Impersonation
DDoS
DNS
Network Intelligence
Firewall
Managed Firewall
Bot Management
Managed Patching
Managed EDR
Device
Backups
Cloud
Recovery
VM/DB
Backup
SSE
ZTNA
VPN
Pen Test
Code
Testing
Bug
Bounty
Managed Controls Assurance
Ransomware Negotiation
DR-aaS
Data ID and
Classification
Data Loss
Prevention
Dark Web
Scanning
Tape
Backup
Managed GRC
DR Plan and Rehearsals
API Discovery
API Protection
OT Security
Microsegmentation
DDoS Testing
OWASP Chart.svg
Carrier Name
Questions:
N/A
Premium:
N/A
Limit:
N/A
Exclusions:
N/A
Clear
ALL Carriers
Threats TTPs
Carrier 1
Carrier 2
Carrier 3
Carrier 4
Carrier 5
Carrier 6