際際滷shows by User: danb02 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: danb02 / Wed, 18 Oct 2017 20:17:35 GMT 際際滷Share feed for 際際滷shows by User: danb02 How to Build Security and Risk Management into Agile Environments /slideshow/how-to-build-security-and-risk-management-into-agile-environments/80957007 howtobuildsecurityintoagileenvironments2-171018201736
Many organizations have adopted the agile methodology for software development and/or moved to DevOps IT support models, micro-services, containers, and the like. Often, these practices leave Information security pros tearing their hair out for lack of assurance and verification processes, or an absence of separation of duty. Insisting on traditional waterfall-based security processes may not be an option. As one security engineering staff member put it, Business developers come to central IT asking for solutions to a problem and are told it will take 6 months. Then its late. They wont be back. Risk management should be front and center in security. However, risk management is also a challenge in the iterative agile environment especially for a number of companies that use agile project management for most or all projects, even outside development. a challenge in the agile environment. In this presentation, Blum will address: 1) Challenges of implementing security and risk management in agile or DevOps models 2) Good practices for embedding security services in the pipeline 3) Developing an agile risk management framework]]>

Many organizations have adopted the agile methodology for software development and/or moved to DevOps IT support models, micro-services, containers, and the like. Often, these practices leave Information security pros tearing their hair out for lack of assurance and verification processes, or an absence of separation of duty. Insisting on traditional waterfall-based security processes may not be an option. As one security engineering staff member put it, Business developers come to central IT asking for solutions to a problem and are told it will take 6 months. Then its late. They wont be back. Risk management should be front and center in security. However, risk management is also a challenge in the iterative agile environment especially for a number of companies that use agile project management for most or all projects, even outside development. a challenge in the agile environment. In this presentation, Blum will address: 1) Challenges of implementing security and risk management in agile or DevOps models 2) Good practices for embedding security services in the pipeline 3) Developing an agile risk management framework]]>
Wed, 18 Oct 2017 20:17:35 GMT /slideshow/how-to-build-security-and-risk-management-into-agile-environments/80957007 danb02@slideshare.net(danb02) How to Build Security and Risk Management into Agile Environments danb02 Many organizations have adopted the agile methodology for software development and/or moved to DevOps IT support models, micro-services, containers, and the like. Often, these practices leave Information security pros tearing their hair out for lack of assurance and verification processes, or an absence of separation of duty. Insisting on traditional waterfall-based security processes may not be an option. As one security engineering staff member put it, Business developers come to central IT asking for solutions to a problem and are told it will take 6 months. Then its late. They wont be back. Risk management should be front and center in security. However, risk management is also a challenge in the iterative agile environment especially for a number of companies that use agile project management for most or all projects, even outside development. a challenge in the agile environment. In this presentation, Blum will address: 1) Challenges of implementing security and risk management in agile or DevOps models 2) Good practices for embedding security services in the pipeline 3) Developing an agile risk management framework <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtobuildsecurityintoagileenvironments2-171018201736-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Many organizations have adopted the agile methodology for software development and/or moved to DevOps IT support models, micro-services, containers, and the like. Often, these practices leave Information security pros tearing their hair out for lack of assurance and verification processes, or an absence of separation of duty. Insisting on traditional waterfall-based security processes may not be an option. As one security engineering staff member put it, Business developers come to central IT asking for solutions to a problem and are told it will take 6 months. Then its late. They wont be back. Risk management should be front and center in security. However, risk management is also a challenge in the iterative agile environment especially for a number of companies that use agile project management for most or all projects, even outside development. a challenge in the agile environment. In this presentation, Blum will address: 1) Challenges of implementing security and risk management in agile or DevOps models 2) Good practices for embedding security services in the pipeline 3) Developing an agile risk management framework
How to Build Security and Risk Management into Agile Environments from danb02
]]>
2243 4 https://cdn.slidesharecdn.com/ss_thumbnails/howtobuildsecurityintoagileenvironments2-171018201736-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Privileged Access Management (PAM) /slideshow/privileged-access-management-pam/54542290 privilegedaccessmanagement-151029203220-lva1-app6892
This webinar describes how you can manage the risk of privileged accounts being compromised, creating a breach of sensitive data or other assets in your organization, through privileged access management, or PAM. PAM can reduce risks by hardening your environment in ways no other solution can, but is challenging to deploy. This webinar provides an unbiased perspective on PAM capabilities, lessons learned and deployment challenges, distilling the good practices you need to be successful. It covers: - PAM definitions, core features and specific security and compliance drivers - The PAM market landscape and major vendors - How to integrate PAM with identity management, service ticketing and monitoring - Avoiding availability and performance issues]]>

This webinar describes how you can manage the risk of privileged accounts being compromised, creating a breach of sensitive data or other assets in your organization, through privileged access management, or PAM. PAM can reduce risks by hardening your environment in ways no other solution can, but is challenging to deploy. This webinar provides an unbiased perspective on PAM capabilities, lessons learned and deployment challenges, distilling the good practices you need to be successful. It covers: - PAM definitions, core features and specific security and compliance drivers - The PAM market landscape and major vendors - How to integrate PAM with identity management, service ticketing and monitoring - Avoiding availability and performance issues]]>
Thu, 29 Oct 2015 20:32:20 GMT /slideshow/privileged-access-management-pam/54542290 danb02@slideshare.net(danb02) Privileged Access Management (PAM) danb02 This webinar describes how you can manage the risk of privileged accounts being compromised, creating a breach of sensitive data or other assets in your organization, through privileged access management, or PAM. PAM can reduce risks by hardening your environment in ways no other solution can, but is challenging to deploy. This webinar provides an unbiased perspective on PAM capabilities, lessons learned and deployment challenges, distilling the good practices you need to be successful. It covers: - PAM definitions, core features and specific security and compliance drivers - The PAM market landscape and major vendors - How to integrate PAM with identity management, service ticketing and monitoring - Avoiding availability and performance issues <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/privilegedaccessmanagement-151029203220-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This webinar describes how you can manage the risk of privileged accounts being compromised, creating a breach of sensitive data or other assets in your organization, through privileged access management, or PAM. PAM can reduce risks by hardening your environment in ways no other solution can, but is challenging to deploy. This webinar provides an unbiased perspective on PAM capabilities, lessons learned and deployment challenges, distilling the good practices you need to be successful. It covers: - PAM definitions, core features and specific security and compliance drivers - The PAM market landscape and major vendors - How to integrate PAM with identity management, service ticketing and monitoring - Avoiding availability and performance issues
Privileged Access Management (PAM) from danb02
]]>
11090 8 https://cdn.slidesharecdn.com/ss_thumbnails/privilegedaccessmanagement-151029203220-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Regaining the Defensive Advantage in Cybersecurity /slideshow/regaining-the-defensive-advantage-in-cybersecurity/48845520 regainingthedefensiveadvantage-150601144913-lva1-app6891
In military doctrine from Sun Tzu to Clausewitz, defenders had the advantage over attackers. But in the cyberspace realm, weve lost our edge. What can we do? As security breaches proliferate, this question become critical. This webinar covers how organizations can prevent large-scale breaches to core IT environments, delay or confuse cyberattackers, and improve situational awareness and rapid response capabilities.]]>

In military doctrine from Sun Tzu to Clausewitz, defenders had the advantage over attackers. But in the cyberspace realm, weve lost our edge. What can we do? As security breaches proliferate, this question become critical. This webinar covers how organizations can prevent large-scale breaches to core IT environments, delay or confuse cyberattackers, and improve situational awareness and rapid response capabilities.]]>
Mon, 01 Jun 2015 14:49:13 GMT /slideshow/regaining-the-defensive-advantage-in-cybersecurity/48845520 danb02@slideshare.net(danb02) Regaining the Defensive Advantage in Cybersecurity danb02 In military doctrine from Sun Tzu to Clausewitz, defenders had the advantage over attackers. But in the cyberspace realm, weve lost our edge. What can we do? As security breaches proliferate, this question become critical. This webinar covers how organizations can prevent large-scale breaches to core IT environments, delay or confuse cyberattackers, and improve situational awareness and rapid response capabilities. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/regainingthedefensiveadvantage-150601144913-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In military doctrine from Sun Tzu to Clausewitz, defenders had the advantage over attackers. But in the cyberspace realm, weve lost our edge. What can we do? As security breaches proliferate, this question become critical. This webinar covers how organizations can prevent large-scale breaches to core IT environments, delay or confuse cyberattackers, and improve situational awareness and rapid response capabilities.
Regaining the Defensive Advantage in Cybersecurity from danb02
]]>
642 3 https://cdn.slidesharecdn.com/ss_thumbnails/regainingthedefensiveadvantage-150601144913-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Future of Security Architecture Certification /slideshow/sa-certification-webinar/46033506 sacertificationwebinar-150319071938-conversion-gate01
Would you drive over a Bay Bridge built from an amateur building architect's blueprints? What if the architect passed a multiple choice test first - is that good enough? Society's answer to these questions is obviously NO. But unlike building architects, security architects are not always required to have Certificates or Degrees and standards for such are lacking. As information gains value, and we move from "information security" to also securing the Internet of Things, security architecture becomes increasingly consequence-laden and the question of required training and accreditation more pressing. The slides are from a webinar in which Linked In Security Architecture group participants collaboratively explored the Future of Security Architecture Certification.]]>

Would you drive over a Bay Bridge built from an amateur building architect's blueprints? What if the architect passed a multiple choice test first - is that good enough? Society's answer to these questions is obviously NO. But unlike building architects, security architects are not always required to have Certificates or Degrees and standards for such are lacking. As information gains value, and we move from "information security" to also securing the Internet of Things, security architecture becomes increasingly consequence-laden and the question of required training and accreditation more pressing. The slides are from a webinar in which Linked In Security Architecture group participants collaboratively explored the Future of Security Architecture Certification.]]>
Thu, 19 Mar 2015 07:19:37 GMT /slideshow/sa-certification-webinar/46033506 danb02@slideshare.net(danb02) The Future of Security Architecture Certification danb02 Would you drive over a Bay Bridge built from an amateur building architect's blueprints? What if the architect passed a multiple choice test first - is that good enough? Society's answer to these questions is obviously NO. But unlike building architects, security architects are not always required to have Certificates or Degrees and standards for such are lacking. As information gains value, and we move from "information security" to also securing the Internet of Things, security architecture becomes increasingly consequence-laden and the question of required training and accreditation more pressing. The slides are from a webinar in which Linked In Security Architecture group participants collaboratively explored the Future of Security Architecture Certification. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sacertificationwebinar-150319071938-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Would you drive over a Bay Bridge built from an amateur building architect&#39;s blueprints? What if the architect passed a multiple choice test first - is that good enough? Society&#39;s answer to these questions is obviously NO. But unlike building architects, security architects are not always required to have Certificates or Degrees and standards for such are lacking. As information gains value, and we move from &quot;information security&quot; to also securing the Internet of Things, security architecture becomes increasingly consequence-laden and the question of required training and accreditation more pressing. The slides are from a webinar in which Linked In Security Architecture group participants collaboratively explored the Future of Security Architecture Certification.
The Future of Security Architecture Certification from danb02
]]>
10241 5 https://cdn.slidesharecdn.com/ss_thumbnails/sacertificationwebinar-150319071938-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Dynamic federation /slideshow/dynamic-federation/25277278 dynamicfederation-130815103621-phpapp02
]]>

]]>
Thu, 15 Aug 2013 10:36:21 GMT /slideshow/dynamic-federation/25277278 danb02@slideshare.net(danb02) Dynamic federation danb02 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dynamicfederation-130815103621-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Dynamic federation from danb02
]]>
1653 3 https://cdn.slidesharecdn.com/ss_thumbnails/dynamicfederation-130815103621-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/howtobuildsecurityintoagileenvironments2-171018201736-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/how-to-build-security-and-risk-management-into-agile-environments/80957007 How to Build Security ... https://cdn.slidesharecdn.com/ss_thumbnails/privilegedaccessmanagement-151029203220-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/privileged-access-management-pam/54542290 Privileged Access Mana... https://cdn.slidesharecdn.com/ss_thumbnails/regainingthedefensiveadvantage-150601144913-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/regaining-the-defensive-advantage-in-cybersecurity/48845520 Regaining the Defensiv...