Security Playbooks Diagrams


Playbooks are best described in diagrams. In May 2017, a Google image search for ‘Security Playbooks’ did not return a good list of Security Playbooks Diagrams that can be easily used and adopted.

Ayehu’s site has a really good example of what these Diagrams could look like:

The Phantom product seems to have native Playbook support (which can be also scripted):

Threat Connect also looks interesting:


  • Create and publish multiple Security Playbooks Diagrams


  • Security teams


Back to list of all Working Sessions and Tracks

Edit this page here