daily pastebin goal
57%
SHARE
TWEET

IS job roles

opexxx Feb 14th, 2018 (edited) 87 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. IT Business Apprenticeship (IHK)
  2.  
  3. Auditor
  4. Business manager
  5. CEO/CFO/COO
  6. CIO/CTO/VP of technology
  7. CSO/CISO/VP of security
  8. Compliance officer/Risk manager
  9. Developer
  10. Enterprise architect
  11. Forensics specialist
  12. Incident responder
  13. IT manager or director
  14. Network operations administrator
  15. Security administrator/Security analyst
  16. Security architect
  17. Security manager or director
  18. System administrator/System analyst
  19. Other (Please specify)
  20.  
  21.  
  22.  
  23.  
  24.  
  25. https://www.surveymonkey.com/r/2018SANSEndpoint
  26.  
  27.  
  28. Transforming Cybersecurity
  29.  
  30. Next-gen antivirus  
  31. Next-gen antivirus Current Capability
  32.    
  33. Next-gen antivirus Important but Not Implemented
  34. Centralized dashboards for reporting, management and response  
  35. Centralized dashboards for reporting, management and response Current Capability
  36.    
  37. Centralized dashboards for reporting, management and response Important but Not Implemented
  38. Vulnerability assessment or mapping    
  39. Vulnerability assessment or mapping Current Capability
  40.    
  41. Vulnerability assessment or mapping Important but Not Implemented
  42. Anomaly detection/Heuristics    
  43. Anomaly detection/Heuristics Current Capability
  44.    
  45. Anomaly detection/Heuristics Important but Not Implemented
  46. Malwareless and fileless (and signatureless) attack detection  
  47. Malwareless and fileless (and signatureless) attack detection Current Capability
  48.    
  49. Malwareless and fileless (and signatureless) attack detection Important but Not Implemented
  50. Encryption/Data protection  
  51. Encryption/Data protection Current Capability
  52.    
  53. Encryption/Data protection Important but Not Implemented
  54. Network access controls (NAC)  
  55. Network access controls (NAC) Current Capability
  56.    
  57. Network access controls (NAC) Important but Not Implemented
  58. Anti-ransomware    
  59. Anti-ransomware Current Capability
  60.    
  61. Anti-ransomware Important but Not Implemented
  62. Threat hunting  
  63. Threat hunting Current Capability
  64.    
  65. Threat hunting Important but Not Implemented
  66. Automated incident response support and remediation workflow    
  67. Automated incident response support and remediation workflow Current Capability
  68.    
  69. Automated incident response support and remediation workflow Important but Not Implemented
  70. Vulnerability remediation automation    
  71. Vulnerability remediation automation Current Capability
  72.    
  73. Vulnerability remediation automation Important but Not Implemented
  74. Application controls (whitelisting, blacklisting, monitoring)  
  75. Application controls (whitelisting, blacklisting, monitoring) Current Capability
  76.    
  77. Application controls (whitelisting, blacklisting, monitoring) Important but Not Implemented
  78. Other  
  79. Other Current Capability
  80.    
  81. Other Important but Not Implemented
  82. Cross-correlation to reduce false positives    
  83. Cross-correlation to reduce false positives Current Capability
  84.    
  85. Cross-correlation to reduce false positives Important but Not Implemented
  86. User behavior modeling and analytics    
  87. User behavior modeling and analytics Current Capability
  88.    
  89. User behavior modeling and analytics Important but Not Implemented
  90. AI/Machine learning    
  91. AI/Machine learning Current Capability
  92.    
  93. AI/Machine learning Important but Not Implemented
  94. User activity and behavior monitoring  
  95. User activity and behavior monitoring Current Capability
  96.    
  97. User activity and behavior monitoring Important but Not Implemented
  98. EDR    
  99. EDR Current Capability
  100.    
  101. EDR Important but Not Implemented
  102. Cyber threat intelligence
RAW Paste Data
Top