IBM Security Maturity Review Assessment
The IBM Security Maturity Review (SMR) is designed to help Li9 Customers evaluate the maturity of their organization’s security program against benchmarks and best practices gathered from IBM’s worldwide customers.
The SMR Session begins with a program overview and evaluation of a company’s risk management strategy. The session covers selected topics and domains as listed below:
- Cloud security
- Collect, normalize, correlate security information
- Analyze information, incident identification, triage
- Incident response
- Threat hunting and investigation
- Fraud protection
- Identity management and governance
- Access management
- Privileged access management
- Endpoint security
- Mobile management
- Network security
- Application security
- Data governance
- Data and file activity monitoring
Request Info about the Security Assessment
A Sr Level IBM Security Architect along with other technical experts facilitate a remote workshop. The session normally lasts from six to eight hours based on the number of domains to be covered.
Li9 Customer Participation
Key participants typically include the chief Information security officer (CISO) or other security leader, the head of a security operations center (SOC) and security architects who can cover the domains listed earlier. IT operations leaders, enterprise architects and others are welcome to participate.
What to expect?
The workshop focuses on high level architectural and policy concepts. For each area, we capture your existing practices to help you benchmark your current state and targeted best practices, along with specific actions to advance your program.
You will receive a report that documents your maturity level and specific, recommended next steps for each domain area.
This no-fee workshop is a joint investment as part of our partnership with our customers. The lessons learned will help prioritize and align your security initiatives to business goals and enhance your visibility into your security posture.
“[The IBM SMR] provided immediate value to our security team as we communicate risks and priorities to senior management.” — CISO, International Energy Provider
“Other vendors have come in saying they would do something like this and just push a product. Instead, this will help with our entire security program.” — Director of Security, Regional Healthcare Provider