:: History ::
HackFormers - July 6, 2012 (Philip J Beyer)
:: Summary ::
No security program can perfectly eliminate all risk.
The reality of Christianity is abundant eternal life.
:: Abstract ::
A perfect security program would be proactive, adaptable, thorough, and would eliminate all risk. The perfect security program is a myth. It doesn't exist. No matter how hard we work as security professionals, there will always be someone with more money, time, skill, or all of the above. Rather than despair or bury our collective heads in the sand, let's work together to build a realistic security program.
In contrast, the abundant Christian life is a reality. It does exist. Furthermore, it is freely available to everyone regardless of wealth, intelligence, social status, or all of the above. Rejoice! Eternal life starts NOW!!
1 of 49
Download to read offline
More Related Content
The Myth of a Perfect Security Program ... The Reality of Eternal Life
1. The Myth of a Perfect
Security Program
The Reality of Eternal Life
www.HackFormers.org
42. Wonder
"I give you thanks that I am
fearfully, wonderfully made..."
- Psalm 139:14 (NAB)
www.HackFormers.org
43. Accept
"But to those who did accept him
he gave power to become children
of God..." - John 1:12 (NAB)
www.HackFormers.org
44. Believe
"Whoever believes in the Son has
eternal life..." - John 3:36 (NAB)
www.HackFormers.org
45. Believe
"Amen, amen, I say to you, whoever
believes has eternal life. I am the
bread of life." - John 6:47-48 (NAB)
www.HackFormers.org
46. Abundant
"... I came so that they might have
life and have it more abundantly."
- John 10:10 (NAB)
www.HackFormers.org
47. Know
"Now this is eternal life, that they should know
you, the only true God, and the one whom
you sent, Jesus Christ." - John 17:3 (NAB)
www.HackFormers.org
48. Go Forth
"You belong to God, children, and you have
conquered them, for the one who is in you is greater
than the one who is in the world." - 1 John 4:4 (NAB)
www.HackFormers.org
49. This work is licensed under a Creative
Commons Attribution-NonCommercial-
ShareAlike 3.0 Unported License
#23: A solid Program has a Framework.\n- SANS Top 20, NIST 800-53, CoBIT\n- ISO 27002\n- Risk Assessment\n- Security Policy\n- Governance\n- Asset Management\n- HR Security\n- Physical Security\n- Operations Management\n- Access Control\n- Systems Acquisition, Development, and Maintenance\n- Incident Management\n- Business Continuity\n- Compliance\n
#28: Risk analysis is hard\nMagnitude can be incalculable\nRisk is uncertain (possible vs. probable vs. predictable)\n
#29: I assert that even the most mature Security Programs cannot be perfect.\n
#30: Threat agents acting against your organization's assets are a reality.\nAny Security Program should assume compromise as a mindset.\n
#31: Your organization will experience a loss event.\nAny Security Program should be prepared to manage the event.\n
#32: Risk assessment performed annually or less often is worthless.\nAny Security Program should be designed to continually assess risk.\n
#33: "If everything is a priority, then nothing is a priority."\nAny Security Program should prioritize efforts and resources based on risk.\n