IT Security & Technology Strategy Dashboard
60 prompts
Create a comprehensive cybersecurity policy framework for a mid-sized organization
Cybersecurity Fundamentals
Create a security governance framework aligned with industry best practices
Create a security baseline configuration guide for common IT systems
Create a firewall rule management and review process
Network Security
Create a network security monitoring and traffic analysis framework
Create a DDoS mitigation and response plan
Create a cloud security architecture for multi-cloud environments
Cloud Security
Create a cloud data encryption and key management strategy
Create a cloud workload protection platform (CWPP) evaluation criteria
Create a comprehensive incident response plan with escalation procedures
Incident Response & Forensics
Create an incident response playbook for ransomware attacks
Create a security incident timeline reconstruction process
Create a third-party vendor security assessment questionnaire
Risk Management & Compliance
Create a security risk appetite statement and tolerance levels
Create a security risk quantification model using FAIR methodology
Create an identity and access management (IAM) strategy and roadmap
Identity & Access Management
Create a single sign-on (SSO) architecture and implementation guide
Create an identity lifecycle management process
Create a data loss prevention (DLP) strategy and deployment plan
Data Protection & Privacy
Create a data retention and disposal policy
Create a data privacy by design framework
Create a security architecture framework and standards
Security Architecture
Create a container security architecture and deployment guide
Create a security architecture decision record (ADR) template
Create a vulnerability scanning and assessment schedule
Vulnerability Management
Create a vulnerability disclosure and responsible disclosure policy
Create a vulnerability management metrics and reporting dashboard
Create a threat intelligence program and operational framework
Threat Intelligence
Create a threat actor profiling and attribution process
Create a threat hunting hypothesis development framework
Create a 24/7 security monitoring and alerting framework
Security Operations
Create a security operations metrics and KPIs dashboard
Create a security operations tool integration architecture
Create a secure software development lifecycle (SDLC) framework
Application Security
Create a API security testing and validation framework
Create a application security training program for developers
Create a security-as-code framework and implementation guide
DevOps & DevSecOps
Create a CI/CD pipeline security controls and gates
Create a DevSecOps toolchain evaluation and selection framework
Create a server security hardening baseline and configuration guide
Infrastructure & Operations
Create a backup and disaster recovery security controls guide
Create a infrastructure-as-a-service (IaaS) security configuration checklist
Create a technology evaluation and selection framework
Technology Strategy
Create a technology architecture governance framework
Create a technology innovation security review process
Create a comprehensive security awareness training program curriculum
Security Awareness & Training
Create a security awareness campaign and communication strategy
Create a security awareness content library and resources
Create a red team exercise planning and execution guide
Penetration Testing & Red Teaming
Create a network penetration testing methodology
Create a continuous penetration testing program
Create a SIEM deployment and configuration strategy
Security Monitoring & SIEM
Create a security monitoring dashboard and visualization framework
Create a security monitoring alert fatigue reduction strategy
Create an endpoint security policy and configuration management process
Endpoint Security
Create an endpoint security monitoring and alerting framework
Create an endpoint security metrics and compliance dashboard
Create a business continuity plan (BCP) for IT systems
Business Continuity & Disaster Recovery
Create a business impact analysis (BIA) for critical IT services
Create a disaster recovery runbook and procedures library
99 prompts
Develop a defense-in-depth security strategy with multiple layers of protection
Write a cybersecurity risk assessment methodology for IT infrastructure
Develop a cybersecurity maturity model assessment tool
Write a cybersecurity strategy document for digital transformation initiatives
Develop a cybersecurity incident classification and severity matrix
Develop a network intrusion detection and prevention system (IDS/IPS) deployment plan
Write a VPN security policy and implementation guide
Develop a wireless network security hardening checklist
Write a network access control (NAC) deployment strategy
Develop a cloud security posture management (CSPM) strategy
Write a cloud security shared responsibility model documentation
Develop a cloud security incident response playbook
Write a cloud security configuration management process
Develop a cloud security risk assessment methodology
Develop a security incident response team (SIRT) structure and roles
Write a malware analysis and reverse engineering methodology
Develop a security incident communication and notification process
Write a threat hunting methodology and operational procedures
Develop a computer forensics evidence collection and preservation guide
Develop a security risk register and tracking system
Write a compliance gap analysis methodology for GDPR, HIPAA, PCI-DSS
Develop a business impact analysis (BIA) template for IT systems
Write a regulatory compliance monitoring and reporting framework
Develop a security audit and assessment scheduling system
Develop a privileged access management (PAM) implementation plan
Write an access review and certification process for user accounts
Develop an identity governance and administration (IGA) framework
Write a role-based access control (RBAC) design methodology
Develop a zero-trust identity verification framework
Develop a data encryption strategy for data at rest and in transit
Write a privacy impact assessment (PIA) methodology
Develop a database security hardening checklist
Write a GDPR compliance implementation guide
Develop a data breach notification and response procedure
Develop a security reference architecture for enterprise systems
Write a API security architecture and best practices guide
Develop a serverless security architecture framework
Write a security design patterns catalog
Develop a security architecture maturity assessment model
Develop a patch management policy and deployment strategy
Write a vulnerability prioritization framework using CVSS and business impact
Develop a third-party vulnerability assessment process
Write a zero-day vulnerability response procedure
Develop a automated vulnerability scanning integration strategy
Develop a threat intelligence platform (TIP) evaluation and selection criteria
Write a threat intelligence sharing and collaboration framework
Develop a indicators of compromise (IOC) management system
Write a threat intelligence feed integration strategy
Develop a threat intelligence maturity model
Develop a security operations runbook and playbook library
Write a security event correlation and analysis methodology
Develop a security automation and orchestration (SOAR) strategy
Write a security operations center (SOC) maturity assessment
Develop a security operations continuous improvement process
Develop a application security testing (AST) strategy including SAST, DAST, IAST
Write a software composition analysis (SCA) and dependency management process
Develop a web application firewall (WAF) configuration and tuning guide
Write a secure code review checklist and methodology
Develop a bug bounty program framework and operational procedures
Develop a container security scanning and validation process
Write a infrastructure-as-code (IaC) security scanning methodology
Develop a secrets management strategy for DevOps environments
Write a shift-left security implementation roadmap
Develop a DevSecOps culture and training program
Develop a operating system security configuration management process
Write a data center security physical and logical controls framework
Develop a change management security review process
Write a capacity planning security considerations guide
Develop a server lifecycle security management process
Develop a digital transformation security strategy
Write a emerging technology security assessment methodology
Develop a IT service management (ITSM) security integration strategy
Write a technology refresh and modernization security plan
Develop a technology portfolio management security framework
Develop a phishing simulation and training program
Write a role-based security training program for different job functions
Develop a security champions program to empower employees
Write a security training needs assessment methodology
Develop a security awareness program maturity model
Develop a penetration testing scope and rules of engagement template
Write a web application penetration testing checklist
Develop a social engineering testing framework
Write a penetration testing report template and delivery process
Develop a penetration testing vendor selection and management process
Develop a security log management and retention policy
Write a SIEM tuning and optimization process
Develop a log source onboarding and normalization process
Write a SIEM performance and capacity planning guide
Develop a security monitoring metrics and reporting framework
Develop a mobile device management (MDM) and security framework
Write an endpoint security hardening checklist for workstations
Develop a patch management strategy for endpoints
Write an endpoint security incident response playbook
Develop a bring-your-own-device (BYOD) security policy
Develop a disaster recovery plan (DRP) with RTO and RPO objectives
Write a crisis management and communication plan for IT incidents
Develop a disaster recovery site selection and management framework
Write a business continuity and disaster recovery exercise program
Develop a business continuity and disaster recovery governance framework
41 prompts
Design a security awareness program for employees covering phishing and social engineering
Design a security control framework based on NIST Cybersecurity Framework
Design a network segmentation strategy to isolate critical systems
Design a zero-trust network architecture implementation roadmap
Design a network security assessment and penetration testing methodology
Design a cloud access security broker (CASB) implementation plan
Design a cloud security compliance framework (SOC 2, ISO 27001)
Design a digital forensics investigation workflow
Design a post-incident review and lessons learned framework
Design a cybersecurity risk management framework aligned with ISO 27005
Design a security control testing and validation process
Design a multi-factor authentication (MFA) deployment strategy
Design a password policy and management system
Design a data classification and labeling system
Design a data backup and recovery security framework
Design a microservices security architecture pattern
Design a security architecture review and approval process
Design a vulnerability management program and lifecycle process
Design a vulnerability remediation tracking and SLA framework
Design a threat modeling methodology for applications and systems
Design a threat landscape analysis and reporting process
Design a security operations center (SOC) structure and staffing model
Design a security operations escalation and on-call procedures
Design a secure coding standards and guidelines document
Design a application security architecture review process
Design a DevSecOps pipeline integration strategy
Design a DevSecOps metrics and security dashboards
Design a network infrastructure security architecture
Design a infrastructure monitoring and alerting security framework
Design a technology roadmap aligned with business objectives
Design a technology vendor management and security assessment process
Design a security awareness metrics and measurement framework
Design a security awareness gamification framework
Design a penetration testing methodology and framework
Design a purple team exercise coordination framework
Design a security event correlation rules and use cases library
Design a security analytics and machine learning use cases
Design an endpoint detection and response (EDR) deployment strategy
Design an application whitelisting and control framework
Design a backup and recovery testing methodology
Design a high availability and redundancy architecture