IBM Security Maturity Review Assessment

The IBM Security Maturity Review (SMR) is designed to help Li9 Customers  evaluate the maturity of their organization’s security program against benchmarks and best practices gathered from IBM’s worldwide customers.

The SMR Session begins with a program overview and evaluation of a company’s risk management strategy. The session covers selected topics and domains as listed below:

  • Cloud security
  • Collect, normalize, correlate security information
  • Analyze information, incident identification, triage
  • Incident response
  • Threat hunting and investigation
  • Fraud protection
  • Identity management and governance
  • Access management
  • Privileged access management
  • Endpoint security
  • Mobile management
  • Network security
  • Application security
  • Data governance
  • Data and file activity monitoring

Request Info about the Security Assessment

Format

A Sr Level IBM Security Architect along with other technical experts facilitate a  remote workshop. The session normally lasts from six to eight hours based on the number of domains to be covered.

Li9 Customer Participation

Key participants typically include the chief Information security officer (CISO) or other security leader, the head of a security operations center (SOC) and security architects who can  cover the domains listed earlier. IT operations leaders, enterprise architects and others are welcome to participate. 

What to expect?

The workshop focuses on high level architectural and policy concepts. For each area, we capture your existing practices to help you benchmark your current state and targeted best practices, along with specific actions to advance your program.

What’s produced?

You will receive a report that documents your maturity level and specific, recommended next steps for each domain area.

Cost

This no-fee workshop is a joint investment as part of our partnership with our customers. The lessons learned will help prioritize and align your security initiatives to business goals and enhance your visibility into your security posture.

Customer Feedback

“[The IBM SMR] provided immediate value to our security team as we communicate risks and priorities to senior management.” — CISO, International Energy Provider

“Other vendors have come in saying they would do something like this and just push a product. Instead, this will help with our entire security program.” — Director of Security, Regional Healthcare Provider

Additional Information

Strategies for managing cybersecurity risk E-Book