In response to mounting network security challenges, the Department of Homeland Security created the Continuous Diagnostics and Mitigation, or CDM, program.
The Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program is organized into four distinct phases designed to address each layer of agency cybersecurity. The official rollout of the first three phases have already been completed by DHS. Collectively, they focused on asset and user management. Phase 4 addresses a different aspect – data. This is arguably the most critical component of CDM because data underlies every function and capability of network protection.
This course examines what comprises CDM Phase 4 and explains how your agency can become prepared to protect its most critical data by walking through three critical steps. Once agencies have walked through these three steps – discovered, categorized and applied governance to their data – they will have achieved the ultimate goal of CDM Phase 4 – data protection.
This course was informed by Pat Park, VP of Federal at STEALTHbits. To learn more, check out:
- 3 Ways Sensitive Information Escapes Your Access Control
- 5 Steps for Cleaning Up Active Directory
- 5 Steps to Building a Successful Data Access Governance Program