a globaledit bite-sized webinar
Matt Glueckert
Product Manager
Enterprise Application Security
@globaledit
Ted Harrington
Independent Security Evaluators
ISE Proprietary
About ISE
- Perspective
- White Box
- Analysts
- Hackers; Cryptographers; RE
- Exploits
- iPhone; Android; Ford; Exxon; Diebold
- Research
- Routers; NAS; Healthcare
- Customers
- Companies w/valuable assets to protect
ISE Proprietary
Secure Design Principles
ISE Proprietary
Least Privilege
ISE Proprietary
Least Privilege
ISE Proprietary
Least Privilege
ISE Proprietary
Defense in Depth
ISE Proprietary
Defense in Depth
Traditional DefensesTraditional Attacks
ISE Proprietary
Defense in Depth
ISE Proprietary
Psychological Acceptability
ISE Proprietary
Psychological Acceptability
CONFLICT IS GOOD!
ISE Proprietary
Psychological Acceptability
ISE Proprietary
Psychological Acceptability
ISE Proprietary
Psychological Acceptability
ISE Proprietary
Mitigating Risk
ISE Proprietary
Threat Model
Assets
Adversaries
Architecture
ISE Proprietary
Threat Model
Asset Value: Asset Value:
ISE Proprietary
Adversary Motivation
ISE Proprietary
Assessment Methodology
ISE Proprietary
Assessment Methodology
contact@globaledit.com
facebook.com/globaledit
@globaledit
Retouching Workflow
February 10th
2pm ET
Next Snackinar

How to Effectively Secure your Assets