6Threats, vulnerabilities, and mitigations (22%)
23Automation and orchestration
7Threat actors and motivations
24Incident response
8Threat vectors and attack surfaces
25Data sources
9Vulnerabilities
26Security program management and oversight (20%)
10Malicious activity
27Security governance
11Mitigation techniques
28Risk management
12Security architecture (18%)
29Third-party risk
13Architecture models
30Security compliance
14Enterprise infrastructure
31Audits and assessments
15Data protection
32Security awareness
16Security operations (28%)
33About Author
17Computing resources