{"meta":{"title":"Securing your organization","intro":"Build skills to help you prevent vulnerabilities and address alerts in your organization.","product":"Security and code quality","breadcrumbs":[{"href":"/en/code-security","title":"Security and code quality"},{"href":"/en/code-security/tutorials","title":"Tutorials"},{"href":"/en/code-security/tutorials/secure-your-organization","title":"Secure your organization"}],"documentType":"subcategory"},"body":"# Securing your organization\n\nBuild skills to help you prevent vulnerabilities and address alerts in your organization.\n\n## Links\n\n* [Best practices for preventing data leaks in your organization](/en/code-security/tutorials/secure-your-organization/best-practices-for-preventing-data-leaks-in-your-organization)\n\n  Learn guidance and recommendations to help you avoid private or sensitive data present in your organization from being exposed.\n\n* [Running a security campaign to fix alerts at scale](/en/code-security/tutorials/secure-your-organization/best-practice-fix-alerts-at-scale)\n\n  Launch a focused security campaign to remediate a specific class of security alerts, such as cross-site scripting (XSS), across your organization.\n\n* [Prioritizing Dependabot and code scanning alerts using production context](/en/code-security/tutorials/secure-your-organization/prioritize-alerts-in-production-code)\n\n  Focus remediation on real risk by targeting Dependabot and code scanning alerts in artifacts deployed to production, using metadata from external systems and integrations like Dynatrace, JFrog Artifactory, Microsoft Defender for Cloud, or your own CI/CD workflows.\n\n* [Interpreting secret risk assessment results](/en/code-security/tutorials/secure-your-organization/interpreting-secret-risk-assessment-results)\n\n  Understand the results from your secret risk assessment and prioritize leak remediation.\n\n* [Interpreting code security risk assessment results](/en/code-security/tutorials/secure-your-organization/interpreting-code-security-risk-assessment-results)\n\n  Understand the results from your code security risk assessment and prioritize vulnerability remediation.\n\n* [Organizing remediation efforts for leaked secrets](/en/code-security/tutorials/secure-your-organization/organizing-remediation-efforts-for-leaked-secrets)\n\n  Systematically organize and manage the remediation of leaked secrets using security campaigns and alert assignments.\n\n* [Protecting against security threats](/en/code-security/tutorials/secure-your-organization/protect-against-threats)\n\n  What steps should I take now, in the near future, and on an ongoing basis to reduce exposure to security threats across my organizations on GitHub?\n\n* [Preparing for a security incident](/en/code-security/tutorials/secure-your-organization/preparing-for-security-incidents)\n\n  Ensure you have the tools and processes in place to respond effectively to a security incident.\n\n* [Responding to a security incident](/en/code-security/tutorials/secure-your-organization/responding-to-security-incidents)\n\n  Respond strategically to a security incident affecting organizations or repositories in your GitHub enterprise."}