how to effectively secure your assets

Post on 17-Jul-2015

45 Views

Category:

Business

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

a globaledit bite-sized webinar

Matt GlueckertProduct Manager

Enterprise Application Security

@globaledit

Ted HarringtonIndependent Security Evaluators

ISE Proprietary

About ISE

- Perspective - White Box

- Analysts - Hackers; Cryptographers; RE

- Exploits - iPhone; Android; Ford; Exxon; Diebold

- Research - Routers; NAS; Healthcare

- Customers - Companies w/valuable assets to protect

ISE Proprietary

Secure Design Principles

ISE Proprietary

Least Privilege

ISE Proprietary

Least Privilege

ISE Proprietary

Least Privilege

ISE Proprietary

Defense in Depth

ISE Proprietary

Defense in Depth

Traditional DefensesTraditional Attacks

ISE Proprietary

Defense in Depth

ISE Proprietary

Psychological Acceptability

ISE Proprietary

Psychological Acceptability

CONFLICT IS GOOD!

ISE Proprietary

Psychological Acceptability

ISE Proprietary

Psychological Acceptability

ISE Proprietary

Psychological Acceptability

ISE Proprietary

Mitigating Risk

ISE Proprietary

Threat Model

Assets

Adversaries

Architecture

ISE Proprietary

Threat Model

Asset Value: Asset Value:

ISE Proprietary

Adversary Motivation

ISE Proprietary

Assessment Methodology

ISE Proprietary

Assessment Methodology

contact@globaledit.com

facebook.com/globaledit

@globaleditRetouching Workflow February 10th

2pm ET

Next Snackinar

top related