{"id":33058,"date":"2020-01-30T17:00:28","date_gmt":"2020-01-30T17:00:28","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=90524"},"modified":"2020-01-30T17:00:28","modified_gmt":"2020-01-30T17:00:28","slug":"changing-the-monolith-part-3-whats-your-process","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/","title":{"rendered":"Changing the Monolith\u2014Part 3: What\u2019s your process?"},"content":{"rendered":"<p>In my 25-year journey, I have led security and privacy programs for corporations and provided professional advisory services for organizations of all types. Often, I encounter teams frantically running around in their own silos, trying to connect the dots and yet unsure if those are the <em>right<\/em> dots. Connecting the dots becomes exponentially difficult in an environment where everyone is trying to achieve a different goal.<\/p>\n<p>Here are a few tips to create teams unified around a common mission:<\/p>\n<h3>1. Define the mission and implement it like any other business plan<\/h3>\n<p><a href=\"https:\/\/medium.com\/microsoft-cybersecurity\/what-we-lose-without-a-vision-1a08238dadb8\" target=\"_blank\" rel=\"noopener noreferrer\">First, you must know what you are trying to achieve<\/a>. Are you protecting trade secrets? Limiting reputation damage? Reducing the chance of unauthorized access to sensitive data? Complying with all local, regional, and national data protection laws? Trying to keep employees safe? Keep patients, passengers, customers, and business partners safe? Is the answer \u201cAll the above?\u201d Define an order of risk magnitude.<\/p>\n<p>Focus on what success looks like, identify quick wins, and get the opinions of executive leadership. What do they view as success? Don\u2019t settle for unrealistic answers such as \u201cWe want 100 percent security.\u201d Explain what is realistic and offer your approach as a business plan.<\/p>\n<h3>2. Define success\u2014be able to articulate what it is and how it can be measured<\/h3>\n<p>When you start any endeavor, how do you determine when it is finished? While information security has a lifecycle that never ends, certain foundations must be established to foster a culture of security and privacy. Success could look like reducing risk to trade secrets, reducing the impact of third-party risk, or protecting an organization\u2019s reputation.<\/p>\n<p>However, success is defined for your mission, success needs to be measurable. If you can\u2019t summarize success during an elevator pitch, a monthly CEO report, or a board presentation, you haven\u2019t defined it appropriately.<\/p>\n<h3>3. Leverage a methodology and make it part of the game plan<\/h3>\n<p>Think of the methodology as a game plan. There aren\u2019t enough people, not enough time, and a finite amount of money. Attempting to do everything all at once is a fool\u2019s errand. The moment you know what you\u2019re trying to achieve, it allows you to create a plan of attack. The plan should follow a proven set of steps that move in the right direction.<\/p>\n<p>A popular methodology right now is the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2018\/12\/17\/zero-trust-part-1-identity-and-access-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust<\/a> model, which has been waiting in the wings for its big debut for over a decade. <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2018\/06\/14\/building-zero-trust-networks-with-microsoft-365\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust<\/a> has made it to the spotlight largely because the conventional perimeter has been deemed a myth. So, what is your approach to achieving security, compliance, and privacy once you have chosen a methodology?<\/p>\n<div class=\"interruption interruption-icon-type\">\n<div class=\"interruption-icon-container\"><img decoding=\"async\" class=\"interruption-icon\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/ZeroTrust-thumbnail.png\"><\/div>\n<div class=\"interruption-content-wrap\">\n<h3 class=\"interruption-title\">Zero Trust<\/h3>\n<p class=\"interruption-text\">Reach the optimal state in your Zero Trust journey.<\/p>\n<p><a class=\"interruption-link c-glyph\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/zero-trust\">Learn more<\/a><\/div>\n<\/div>\n<h3>4. Market the plan<\/h3>\n<p>One of the main hurdles I constantly witness is that the larger the organization, the more <em>isolated<\/em> the business units\u2014especially in IT. In many cases, cybersecurity leadership does not engage in regular communication within factions of IT. To name a few, there are application development, user support, database teams, infrastructure, and cloud teams. And almost always outside their purview resides HR, Legal, Finance, Procurement, Corporate Communications, and Physical Security departments.<\/p>\n<p>In a previous role, I found success by <a href=\"https:\/\/medium.com\/microsoft-cybersecurity\/how-to-change-the-security-monolith-people-process-and-technology-part-1-people-d36b5685b690\" target=\"_blank\" rel=\"noopener noreferrer\">borrowing employees from some of these other departments<\/a>. Not only to help build political capital for the cybersecurity team, but to land the <a href=\"https:\/\/medium.com\/microsoft-cybersecurity\/the-unsung-heros-journey-what-comics-online-content-and-security-have-in-common-c51bcacf18bf\" target=\"_blank\" rel=\"noopener noreferrer\">security awareness message<\/a> with the populace and connect with the aforementioned units within IT and business leadership. To do the same, start by building a plan and define your message. Repeat the message often enough so it\u2019s recognized, and people are energized to help drive the mission forward.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-3-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90525\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-3-1.png\" alt width=\"2475\" height=\"1651\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-3-1.png 2475w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-3-1-300x200.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-3-1-768x512.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-3-1-1024x683.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-3-1-293x195.png 293w\" sizes=\"auto, (max-width: 2475px) 100vw, 2475px\"><\/a><\/p>\n<h3>5. Teamwork in the form of governance<\/h3>\n<p>Once \u201cinter-IT\u201d and business relationships are established, <a href=\"https:\/\/medium.com\/microsoft-cybersecurity\/governing-the-modern-cyber-security-landscape-5c787b50d2ff\" target=\"_blank\" rel=\"noopener noreferrer\"><em>governance<\/em> can commence\u2014that ultimately means creating process and policy<\/a>. Involve as many stakeholders as possible and document everything you can. Make everyone aware of their role in the mission and hold them accountable.<\/p>\n<p>Take for example a mobile device policy. Whose input should be solicited? At a minimum, you should involve HR, Legal, Finance, the CIO, and the user community. What do they want and need? When everyone agrees and all requirements are negotiated, it\u2019s amazing how quickly a policy is ratified and becomes official.<\/p>\n<p>Cybersecurity, privacy, compliance, and risk management should be managed like any other business; and any business values process. Without process, product doesn\u2019t get manufactured or shipped, patients don\u2019t heal, and the supply chain grinds to a halt. Without process, there can be no consensus on how to protect the organization.<\/p>\n<h3>Stay tuned<\/h3>\n<p>Stay tuned for the next installment of my series, Changing the Monolith: People, Process, and Technology. In the meantime, check out the first two posts in the series, on people:<\/p>\n<p>Also, bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a> to keep up with our expert coverage on security matters and follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/01\/30\/changing-the-monolith-part-3-whats-your-process\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization.<br \/>\nThe post Changing the Monolith\u2014Part 3: What\u2019s your process? appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33059,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[2564,6871,3677],"class_list":["post-33058","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity-policy","tag-data-governance","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Changing the Monolith\u2014Part 3: What\u2019s your process? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Changing the Monolith\u2014Part 3: What\u2019s your process? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-30T17:00:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-3-whats-your-process.png\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-3-whats-your-process\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-3-whats-your-process\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Changing the Monolith\u2014Part 3: What\u2019s your process?\",\"datePublished\":\"2020-01-30T17:00:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-3-whats-your-process\\\/\"},\"wordCount\":834,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-3-whats-your-process\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/changing-the-monolith-part-3-whats-your-process.png\",\"keywords\":[\"Cybersecurity Policy\",\"Data governance\",\"Zero Trust\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-3-whats-your-process\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-3-whats-your-process\\\/\",\"name\":\"Changing the Monolith\u2014Part 3: What\u2019s your process? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-3-whats-your-process\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-3-whats-your-process\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/changing-the-monolith-part-3-whats-your-process.png\",\"datePublished\":\"2020-01-30T17:00:28+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-3-whats-your-process\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-3-whats-your-process\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-3-whats-your-process\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/changing-the-monolith-part-3-whats-your-process.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/changing-the-monolith-part-3-whats-your-process.png\",\"width\":150,\"height\":150},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-3-whats-your-process\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Policy\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity-policy\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Changing the Monolith\u2014Part 3: What\u2019s your process?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Changing the Monolith\u2014Part 3: What\u2019s your process? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/","og_locale":"en_US","og_type":"article","og_title":"Changing the Monolith\u2014Part 3: What\u2019s your process? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-30T17:00:28+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-3-whats-your-process.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Changing the Monolith\u2014Part 3: What\u2019s your process?","datePublished":"2020-01-30T17:00:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/"},"wordCount":834,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-3-whats-your-process.png","keywords":["Cybersecurity Policy","Data governance","Zero Trust"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/","url":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/","name":"Changing the Monolith\u2014Part 3: What\u2019s your process? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-3-whats-your-process.png","datePublished":"2020-01-30T17:00:28+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-3-whats-your-process.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-3-whats-your-process.png","width":150,"height":150},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-3-whats-your-process\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Policy","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity-policy\/"},{"@type":"ListItem","position":3,"name":"Changing the Monolith\u2014Part 3: What\u2019s your process?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33058"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33058\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33059"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}