A Security hole in an application can cause not only major financial loss but also loss of customer confidence, trust and reputation severely impacting the business. This webinar looks at well-established industry practices to identify and secure applications from breaches while adhering with regulatory compliances.
There are many different methodologies for implementing and testing security controls in an IT system to ensure that it is operating under an “acceptable level of risk.” Many of these methodologies require the use of software to aid in this measurement. While the execution of technical tools is important, it can sometimes place a financial burden on an organization (especially a small business) that may not have the resources to purchase the software or hire trained personnel to run the tools and conduct an analysis of the results.
This presentation provides an overview of a security testing methodology developed by the Federal Government through the Department of Commerce’s National Institute of Standards and Technology (NIST) Computer Security Division that is available for use by the security community at no cost. The NIST methodology allows an organization to test their security posture by analyzing controls that are listed in 18 different security categories.
Attendees will:
1. Be presented a comprehensive security testing approach that limits the need for using automated tools
2. Take away an understanding of National Institute of Standards and Technology (NIST) security controls and learn how to apply them to their information systems
3. Be shown techniques for documenting testing results
4. Be apprised of best practices for conducting security testing of information systems
Tom Hasman, Senior Information Security Analyst, SRA International
Tom is Senior Information Security Analyst on the Information Assurance team for SRA International. Tom specializes in Security Tests & Evaluations in support of the government’s Certification & Accreditation process.
He performs risk assessments and makes recommendations to clients for prioritizing and mitigating vulnerabilities. Tom also develops security policies and procedures for government clients.
The Best Windows Phone Apps 2013: A Designers CollectionTheresa Neil
Theresa Neil is working on the Second Edition of the Mobile Design Pattern Gallery to be published by O'Reilly Media January, 2014. Enjoy this research material collected from 300+ Windows Apps in 2013.
A Security hole in an application can cause not only major financial loss but also loss of customer confidence, trust and reputation severely impacting the business. This webinar looks at well-established industry practices to identify and secure applications from breaches while adhering with regulatory compliances.
There are many different methodologies for implementing and testing security controls in an IT system to ensure that it is operating under an “acceptable level of risk.” Many of these methodologies require the use of software to aid in this measurement. While the execution of technical tools is important, it can sometimes place a financial burden on an organization (especially a small business) that may not have the resources to purchase the software or hire trained personnel to run the tools and conduct an analysis of the results.
This presentation provides an overview of a security testing methodology developed by the Federal Government through the Department of Commerce’s National Institute of Standards and Technology (NIST) Computer Security Division that is available for use by the security community at no cost. The NIST methodology allows an organization to test their security posture by analyzing controls that are listed in 18 different security categories.
Attendees will:
1. Be presented a comprehensive security testing approach that limits the need for using automated tools
2. Take away an understanding of National Institute of Standards and Technology (NIST) security controls and learn how to apply them to their information systems
3. Be shown techniques for documenting testing results
4. Be apprised of best practices for conducting security testing of information systems
Tom Hasman, Senior Information Security Analyst, SRA International
Tom is Senior Information Security Analyst on the Information Assurance team for SRA International. Tom specializes in Security Tests & Evaluations in support of the government’s Certification & Accreditation process.
He performs risk assessments and makes recommendations to clients for prioritizing and mitigating vulnerabilities. Tom also develops security policies and procedures for government clients.
The Best Windows Phone Apps 2013: A Designers CollectionTheresa Neil
Theresa Neil is working on the Second Edition of the Mobile Design Pattern Gallery to be published by O'Reilly Media January, 2014. Enjoy this research material collected from 300+ Windows Apps in 2013.
Many say fat chance. But different roles played by different individuals early on in a child's life can play significant roles in helping the child's health.
Depends on who you ask. Two research films, using less than scientific methods, often come up with different values. Here are the most recent brand values for selected companies.
Many claim that they are a social media specialists but they lack the skill to do the job efficiently, so what are the character of being the worlds greatest social media marketer?
As rapidly evolving digital technologies work to empower communities while disrupting industries and services, it's hard for managers to admit that they have fallen behind in their digital strategies. As leading providers in leadership education for the new digital disruption, hyper island has developed these tips for company managers in advance of their new NYC leadership program to set them on the path to the digital domination and higher revenues.
Many say fat chance. But different roles played by different individuals early on in a child's life can play significant roles in helping the child's health.
Depends on who you ask. Two research films, using less than scientific methods, often come up with different values. Here are the most recent brand values for selected companies.
Many claim that they are a social media specialists but they lack the skill to do the job efficiently, so what are the character of being the worlds greatest social media marketer?
As rapidly evolving digital technologies work to empower communities while disrupting industries and services, it's hard for managers to admit that they have fallen behind in their digital strategies. As leading providers in leadership education for the new digital disruption, hyper island has developed these tips for company managers in advance of their new NYC leadership program to set them on the path to the digital domination and higher revenues.