On average, how many phishing messages do you receive per week? (Includes email, SMS, voicemails, etc.)
0-110%
2-568%
6-1014%
11 or more6%
509 PARTICIPANTS
3k views
Content you might like
If you deal with physical security in your role, what lifecycle management process do you currently use?
Asset management tool28%
Facilities inventory system57%
Excel or manual process10%
None3%
Has anyone drafted an SOW for a cloud-based SIEM with setup, migration, and maintenance? I’m working on a FedRAMP-authorized SIEM SOW, migrating from on-prem Splunk, covering data, searches, alerts, dashboards, and models. Scope includes Environment Setup: Cloud provisioning, configuration, testing. Connectors/Parsers: Custom data source integration. Content Development: Rules, use cases, threat feeds. Performance Tuning: Query/index optimization. Runbooks: Operational procedures. Also required: 24x7 support, maintenance, lifecycle and application management, role-based training, and documentation. Must comply with NIST SP 800-53, CJIS, and FedRAMP Moderate+. Goal: Secure, scalable SIEM for rapid deployment. I may be missing elements, so suggestions are welcome. Please share redacted SOWs or tips if possible.
Does your contract lifecycle management tool deliver on their AI/ML promises?
Yes65%
No34%