際際滷shows by User: stijnvdc / http://www.slideshare.net/images/logo.gif 際際滷shows by User: stijnvdc / Sun, 26 Sep 2010 14:51:01 GMT 際際滷Share feed for 際際滷shows by User: stijnvdc Information Security for startups /slideshow/stijn-vdc-barcampantwerp11092010/5291725 stijnvdcbarcampantwerp11092010-100926145111-phpapp01
Information Security for startups was presented on 11 September 2010 at the Barcamp meeting in Antwerp, Belgium. It presents issues, tips and interesting information security pointers for startup businesses in the world of e-commerce.]]>

Information Security for startups was presented on 11 September 2010 at the Barcamp meeting in Antwerp, Belgium. It presents issues, tips and interesting information security pointers for startup businesses in the world of e-commerce.]]>
Sun, 26 Sep 2010 14:51:01 GMT /slideshow/stijn-vdc-barcampantwerp11092010/5291725 stijnvdc@slideshare.net(stijnvdc) Information Security for startups stijnvdc Information Security for startups was presented on 11 September 2010 at the Barcamp meeting in Antwerp, Belgium. It presents issues, tips and interesting information security pointers for startup businesses in the world of e-commerce. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stijnvdcbarcampantwerp11092010-100926145111-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Information Security for startups was presented on 11 September 2010 at the Barcamp meeting in Antwerp, Belgium. It presents issues, tips and interesting information security pointers for startup businesses in the world of e-commerce.
Information Security for startups from Stijn Vande Casteele
]]>
496 1 https://cdn.slidesharecdn.com/ss_thumbnails/stijnvdcbarcampantwerp11092010-100926145111-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Threat Modeling For Web Applications Using The Stride Model /stijnvdc/threat-modeling-for-web-applications-using-the-stride-model-2794119 threatmodelingforwebapplicationsusingthestridemodel-091229135259-phpapp02
A thesis presenting the new wave of modeling threats for web applications focusing on the important security problems they face. Locating them on the Microsoft We Rock 24/7 architecture by using the STRIDE threat model, I will elaborate on the exercise by discussing the OWASP Top 10 Web application security vulnerabilities.]]>

A thesis presenting the new wave of modeling threats for web applications focusing on the important security problems they face. Locating them on the Microsoft We Rock 24/7 architecture by using the STRIDE threat model, I will elaborate on the exercise by discussing the OWASP Top 10 Web application security vulnerabilities.]]>
Tue, 29 Dec 2009 13:52:54 GMT /stijnvdc/threat-modeling-for-web-applications-using-the-stride-model-2794119 stijnvdc@slideshare.net(stijnvdc) Threat Modeling For Web Applications Using The Stride Model stijnvdc A thesis presenting the new wave of modeling threats for web applications focusing on the important security problems they face. Locating them on the Microsoft We Rock 24/7 architecture by using the STRIDE threat model, I will elaborate on the exercise by discussing the OWASP Top 10 Web application security vulnerabilities. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/threatmodelingforwebapplicationsusingthestridemodel-091229135259-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A thesis presenting the new wave of modeling threats for web applications focusing on the important security problems they face. Locating them on the Microsoft We Rock 24/7 architecture by using the STRIDE threat model, I will elaborate on the exercise by discussing the OWASP Top 10 Web application security vulnerabilities.
Threat Modeling For Web Applications Using The Stride Model from Stijn Vande Casteele
]]>
1466 3 https://cdn.slidesharecdn.com/ss_thumbnails/threatmodelingforwebapplicationsusingthestridemodel-091229135259-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SIEM evolution /slideshow/siem-evolution-a-day-in-the-life-of-a-security-architect/2784372 csn22vandecasteele-091228092705-phpapp02
Back in 2003, Telindus developed a business case for delivering SIEM managed security services to the enterprise market. This session sheds light on the different tooling migrations and explains in depth the different evolutions we achieved from an architecture, security operations, services and content evolution standpoint. It is geared towards application developers, architects, SOC employees, business consultants and program managers.]]>

Back in 2003, Telindus developed a business case for delivering SIEM managed security services to the enterprise market. This session sheds light on the different tooling migrations and explains in depth the different evolutions we achieved from an architecture, security operations, services and content evolution standpoint. It is geared towards application developers, architects, SOC employees, business consultants and program managers.]]>
Mon, 28 Dec 2009 09:26:57 GMT /slideshow/siem-evolution-a-day-in-the-life-of-a-security-architect/2784372 stijnvdc@slideshare.net(stijnvdc) SIEM evolution stijnvdc Back in 2003, Telindus developed a business case for delivering SIEM managed security services to the enterprise market. This session sheds light on the different tooling migrations and explains in depth the different evolutions we achieved from an architecture, security operations, services and content evolution standpoint. It is geared towards application developers, architects, SOC employees, business consultants and program managers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/csn22vandecasteele-091228092705-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Back in 2003, Telindus developed a business case for delivering SIEM managed security services to the enterprise market. This session sheds light on the different tooling migrations and explains in depth the different evolutions we achieved from an architecture, security operations, services and content evolution standpoint. It is geared towards application developers, architects, SOC employees, business consultants and program managers.
SIEM evolution from Stijn Vande Casteele
]]>
3644 6 https://cdn.slidesharecdn.com/ss_thumbnails/csn22vandecasteele-091228092705-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-stijnvdc-48x48.jpg?cb=1525725632 Stijn has spent the last 10 years helping organizations solve information security puzzles. Stijn received his MSc in Information Security from Royal Hollow, University of London and holds CISSP and GCFA certifications. www.insec.be https://cdn.slidesharecdn.com/ss_thumbnails/stijnvdcbarcampantwerp11092010-100926145111-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/stijn-vdc-barcampantwerp11092010/5291725 Information Security f... https://cdn.slidesharecdn.com/ss_thumbnails/threatmodelingforwebapplicationsusingthestridemodel-091229135259-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds stijnvdc/threat-modeling-for-web-applications-using-the-stride-model-2794119 Threat Modeling For We... https://cdn.slidesharecdn.com/ss_thumbnails/csn22vandecasteele-091228092705-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/siem-evolution-a-day-in-the-life-of-a-security-architect/2784372 SIEM evolution