A Governance Framework for Building Secure IT Systems *
|
|
|
- Griselda Chapman
- 10 years ago
- Views:
Transcription
1 A Governance Framework for Building Secure IT Systems * Abdelwahab Hamou-Lhadj 1 and AbdelKrim Hamou-Lhadj 2 1 Department of Electrical and Computer Engineering Concordia University 1455 de Maisonneuve West Montréal, Québec, Canada [email protected] 2 Cognos Inc Riverside Drive Ottawa, Ontario, Canada [email protected] Abstract In this paper, we present a framework that aims to align software development with sound business practices for building software systems with security in mind. The framework comprises four main components: Governance, People, Process, and Technology. Governance ensures that security is part of the strategic decisions of an organization. The people component focuses on selecting, training, and retaining, qualified personnel in the area of software security. The process component ensures that the company has the right processes in place to handle security requirements. The technology component consists of a set of tools and techniques that are needed to design and implement secure software. 1. Introduction Security of information has become one of the major concerns in today s digitized world since critical decisions are made based on information stored and analyzed by software systems. As a consequence, the need for effective techniques to protect software systems from malicious attacks has increased the level of significance of the software security field to meet industry needs. Attacks can range from viruses and worms, Internet browser exploits, identity theft to more sever threats such as cyber-attacks and cyber-terrorism. For major software companies, building secure software products has perhaps become one of their most urgent priorities. Failure to meet security requirements can have a significant impact on the company such as loss of business and damage to the reputation. In 2002, Chief Executive Officers ranked software security as 7.5 out of 10 in importance [1]. The average firm s budget spent on security was about US$1.1 million in 2002 representing a total of US$196 spent on security per employee per year [2]. According to Schneier [3], budget allotted to building secure software system increases at the rate of 20% every year. Recently, there has been a significant increase in the number of techniques and tools to design, develop, and test software products that aim to detect malicious attacks and recover if these attacks occur [4, 5, 6, 7]. However, these techniques and tools address security only from the technological aspects, focusing less on the organizational context needed to leverage proper development of a secure system. The issue is that even the most advanced * This paper is based on the paper: A. Hamou-Lhadj, A-K. Hamou-Lhadj, "An Organizational Framework for Building Secure Software", In Proceedings of the 2nd IEEE International Conference on Information Security and Assurance, IEEE CS, Busan, Korea,
2 technological solutions may deem to be ineffective if there is no consistent support of security from the business standpoint, including commitment from senior management to security, skilled employees, and efficient and effective business processes. In this paper, we propose a framework that aims to align software security with sound business practices. The objective is to work towards a holistic approach to security that combines technology and management in an effective and efficient manner. Our framework extends the People-Process-Technology framework proposed in project management studies [10] by adding a Governance component. The remaining parts of this paper are as follows. In the next section, we present the security governance framework and describe its components in more detail. In Section 3, we conclude this paper and present future work. 2. The proposed framework Figure 1 illustrates the components of the proposed framework for building secure systems. We describe in more detail each component of the framework in the following subsections. Figure 1. Components of a Framework for Security 2.1. Governance component Governance, or more precisely enterprise governance, is defined as the system by which entities [in an organization] are directed and controlled [8]. The objective of the governance component of the security framework is to ensure that security activities are aligned with software development practices at the strategic level. This can be achieved by involving the board of directors in security-related decisions. The key outcome of the governance component is a set of mechanisms that support effective planning, execution and monitoring of software engineering projects with security in mind. More specifically, organizations need to introduce policies and guidelines that help software developers determine the way security needs to be handled through the software lifecycle. Examples of such policies include proper quality assurance practices, designing for security, and inclusion of security testing. Another important aspect of the governance component is to determine a set of key performance indicators to assess the performance of the security support framework against measurable goals that the organization would target in order to fully integrate security support 16
3 activities with software development practices. These performance indicators can be collected using management controls and audit procedures People component The goal of the people component focuses on the hiring and retention of qualified personnel that can operate the security support framework and deliver on its objectives. For this purpose, organizations must invest in training and educational activities that provide practitioners with the knowledge and expertise needed to design and implement security requirements for large systems. There exist today many programs offered in most major universities that focus on various aspects of software security including secure wireless and wired data networks, computer system security, cryptography, secure database systems, secure software engineering, secure e-commerce, enterprise security, secure operating systems and networks, etc. In addition, knowledge of regulations, laws, and standards in the area of privacy and security is also important since most of these authoritative rules have a direct impact on the way software is built, tested, and maintained. For example, the ISO/IEC series of standards defines a set of recommendations that describe how information security management systems should be implemented, operated, monitored, reviewed, and maintained. Another example would be the Payment Card Industry Data Security Standards, developed by major credit companies such as Visa, Master Card, American Express and that contain guidelines on how to store and process credit card information. Furthermore, there is a need to work towards defining a body of knowledge in the area of software security that can be used by training institutions to design their security programs and professional certifications Process component The process component focuses on the needed business processes for the framework to be operational. A business process can be defined as a set of activities that deliver directly or indirectly value to customers [9]. The key processes that need to be considered can be grouped into two categories: Development processes, and assessment/improvement processes. From the development perspective, business processes need to be defined on how software development should be carried out to ensure that the resulting products satisfy security requirements. Examples of such processes need to address questions such as how to define security-related requirements, how to design for secure software, how to test for security, etc. From the assessment and improvement viewpoint, processes need to be put in place to identify areas of improvements based on assessment measures, which in turn need to be determined. Examples of these processes include identifying the impact of potential security issues earlier in the project lifecycle, developing a more efficient model for regression testing, etc Technology component The technology component of the security framework embodies a set of techniques and tools that can be used by software engineers to design secure software systems
4 Software security has progressed over the years to becoming a well established discipline. There exist various algorithms applied depending to what needs to be secured and the degree of security needed [4, 5, 6, 7]. There is also an increasing interest in techniques that address security throughout the entire software development life cycle [11, 12, 13]. The objective is to deal with security requirements early in the software life cycle and not only during implementation. Examples of such techniques include the concepts of abuse cases [11] and threat modeling [12]. Abuse cases are based on UML [14] use cases and consist of designing scenarios that simulate attacks to the system, and design techniques that prevent these attacks. Threat modeling is another security-analysis methodology used to assess and document the security risks associated with a software system during the design phases [12]. This popular technique aims at helping system designers reason about security threats using models. Threats are ranked based on their severity and mitigation techniques are designed to respond to such threats. 3. Conclusion and future work In this paper, we proposed a framework that aims to align software security with effective business practices. The framework consists of four main components: Governance, People, Process, and Technology. The government component ensures that the board of directors is involved in setting long term strategic decisions on how security should be handled. The people component is concerned with hiring, retaining, and motivating, qualified security architects and designers. The process component puts the emphasis on the needed business processes for the framework to be effective. Finally, the technology component consists of a set of techniques for designing and implementing secure software. Our immediate future step is to expand this framework and experiment with it in an organization setting to assess its effectiveness. References [1] M. Gerencser and D. Aguirre, Security Concerns Prominent on CEO Agenda, Strategy + Business Press, URL: [2] A. Carey, Worldwide Information Security Services Forecast, , IDC Report No , 2002 [3] A. Schneier, Secrets & Lies, John Wiley & Sons, [4] J. Viega, G. McGraw, Building Secure Software: How to Avoid Security Problems the Right Way, Addison- Wesley, [5] N. Davis, Developing Secure Software, Software Tech News: Secure Software Engineering, 8(2), [6] M. Bishop, Computer Security: Art and Science, Addison-Wesley, [7] G. McGraw, Software Security: Building Security In, Addison-Wesley, [8] Wim Van Grembergen, "Strategies for Information Technology Governance", Idea Group Publishing, [9] U. J. Gelinas, S. G. Sutton, J. Fedorowicz, "Business Processes and Information Technology", South- Western College Publisher, [10] S. Berkun, The art of project management, O'Reilly Media, [11] G. Sindre & A. L. Opdahl, Eliciting Security Requirement by Misuse Cases, Journal of Requirements Engineering, Springer London, 10(1), 2005, pp [12] F. Swiderski, W. Snyder, Threat Modeling, Microsoft Press, [13] K. Sultan, A. Ennouary, A. Hamou-Lhadj, "Catalog of Metrics for Assessing Security Risks of Software throughout the Software Development Life Cycle", In Proc. of the 2nd IEEE International Conference on Information Security and Assurance, IEEE CS, Busan, Korea, [14] Al. Cockburn, Writing Effective Use Cases, Addison-Wesley,
5 Authors Abdelwahab Hamou-Lhadj is an Assistant Professor in the Department of Electrical and Computer Engineering (ECE) at Concordia University, Montreal, Canada. He holds a PhD degree in Computer Science from the University of Ottawa, Canada. His research interests include software engineering, software compliance, and information technology. He has published numerous articles in renowned conference and journal proceedings. He has also been involved in the organization and the program committees of several international conferences. Dr. Hamou-Lhadjis a certified Expert in Business Process Management from the Object Management Group (OMG). He is a member of IEEE Computer Society and ACM. AbdelKrim Hamou-Lhadj ( Abdel ) has over twenty years of work experience in the software industry. He specializes in compliance and quality management, business process management, and software engineering regulations and standards. He currently leads the Regulatory Compliance and Quality Management function at Cognos (an IBM company). Abdel holds an MBA degree from the University of Ottawa, Canada, and other graduate degrees including one in software engineering. In addition, Abdel is a certified Professional Engineer from the Professional Engineers Ontario (PEO) association, a certified Manager of Quality and Organizational Excellence from the American Society for Quality (ASQ), and a certified Expert in Business Process Management from the Object Management Group (OMG). 19
6 20
Secure By Design: Security in the Software Development Lifecycle
Secure By Design: Security in the Software Development Lifecycle Twin Cities Rational User s Group Security Briefing by Arctec Group (www.arctecgroup.net) Integrating Security into Software Development
Regulatory Compliance and its Impact on Software Development
Regulatory Compliance and its Impact on Software Development Abdelwahab Hamou-Lhadj Software Compliance Research Group Department of Electrical and Computer Engineering Concordia University 1455 de Maisonneuve
Developing Secure Software, assignment 1
Developing Secure Software, assignment 1 During development of software, faults and flaws are introduced either from the implementation or from the design of the software. During runtime these faults and
Executive Management of Information Security
WHITE PAPER Executive Management of Information Security _experience the commitment Entire contents 2004, 2010 by CGI Group Inc. All rights reserved. Reproduction of this publication in any form without
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
Developing Secure Software in a Agile environment
Developing Secure Software in a Agile environment Dejan Baca Email: [email protected] Blekinge school of Technology Ericsson AB Research planning Abstract Software developers can use agile software
Threat scenario based security risk analysis using use case modeling in information systems
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2012; 5:293 300 Published online 7 April 2011 in Wiley Online Library (wileyonlinelibrary.com)..321 SPECIAL ISSUE PAPER Threat scenario based
Comparing Agile Software Processes Based on the Software Development Project Requirements
CIMCA 2008, IAWTIC 2008, and ISE 2008 Comparing Agile Software Processes Based on the Software Development Project Requirements Malik Qasaimeh, Hossein Mehrfard, Abdelwahab Hamou-Lhadj Department of Electrical
Educational Requirement Analysis for Information Security Professionals in Korea
Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea [email protected]
Towards Security Risk-oriented Misuse Cases
Towards Security Risk-oriented Misuse Cases Inam Soomro and Naved Ahmed Institute of Computer Science, University of Tartu J. Liivi 2, 50409 Tartu, Estonia {inam, naved}@ut.ee Abstract. Security has turn
Software Security Engineering: A Key Discipline for Project Managers
Software Security Engineering: A Key Discipline for Project Managers Julia H. Allen Software Engineering Institute (SEI) Email: [email protected] Sean Barnum Cigital Robert J. Ellison SEI Gary McGraw Cigital
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
A Methodology for Capturing Software Systems Security Requirements
A Methodology for Capturing Software Systems Security Requirements Hassan EL-Hadary Supervised by: Prof. Sherif EL-Kassas Outline Introduction to security Software Security Security Definitions Security
Privacy and Security Framework, February 2010
Privacy and Security Framework, February 2010 Updated April 2014 Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and
Information, Network & Cyber Security
School COMSC Information, Network & Cyber Security Information security officers are faced with strategic decisions on a daily basis, and are required to make informed decisions on the security options
Beyond disaster recovery: becoming a resilient business.
IBM Global Services October 2005 Beyond disaster recovery: becoming a resilient business. An object-oriented framework and methodology by Richard Cocchiara Chief technology officer for business resilience
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
IT Security Governance for e-business
Vol. 2, No. 3, July, 2008 IT Security Governance for e-business Rosslin John Robles, Na-Yun Kim, Tai-hoon Kim School of Multimedia, Hannam University, Daejeon, Korea [email protected], [email protected],
Module 1: Introduction to Designing Security
Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case
Certified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
Security of Web Applications and Browsers: Challenges and Solutions
Security of Web Applications and Browsers: Challenges and Solutions A Tutorial Proposal for ACM SAC 2015 By Dr. Hossain Shahriar Department of Computer Science Kennesaw State University Kennesaw, GA 30144,
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Building Security into the Software Life Cycle
Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about
ISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
Misuse Cases: earlier and smarter information security
Misuse Cases: earlier and smarter information security By defining the scenarios in which computer systems could be misused, security professionals can test more thoroughly and close down risk more quickly.
Security Software Engineering: Do it the right way
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 19 Security Software Engineering: Do it the right way Ahmad
A Proposed Case for the Cloud Software Engineering in Security
A Proposed Case for the Cloud Software Engineering in Security Victor Chang and Muthu Ramachandran School of Computing, Creative Technologies and Engineering, Leeds Metropolitan University, Headinley,
PRIORITIZING CYBERSECURITY
April 2016 PRIORITIZING CYBERSECURITY Five Investor Questions for Portfolio Company Boards Foreword As the frequency and severity of cyber attacks against global businesses continue to escalate, both companies
Networked Systems Security
Unit 32: Networked Systems Security Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose J/601/7332 BTEC National The aim of this unit is to ensure learners know about the
Comparison of Secure Development Frameworks for Korean e- Government Systems
, pp.355-362 http://dx.doi.org/10.14257/ijsia.2014.8.1.33 Comparison of Secure Development Frameworks for Korean e- Government Systems Dongsu Seo School of Information Technology Sungshin University [email protected]
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security A World of Constant Threat We live in a world on constant threat. Every hour of every day in every country around the globe hackers
MODEL FOR IT GOVERNANCE ASSESSMENT IN BANKS BASED ON INTEGRATION OF CONTROL FUNCTIONS
MODEL FOR IT GOVERNANCE ASSESSMENT IN BANKS BASED ON INTEGRATION OF CONTROL FUNCTIONS Ivana Dvorski Lacković PBZ stambena štedionica d.d., Croatia [email protected] Abstract: Nowadays banks
Measuring Software Security
Measuring Software Security Defining Security Metrics Dr. Bill Young Department of Computer Science University of Texas at Austin Last updated: July 1, 2014 at 14:53 Dr. Bill Young: 1 Why Is CyberSecurity
ITAG RESEARCH INSTITUTE
ITAG RESEARCH INSTITUTE Cobit s management guidelines revisited: the s / s cascade 1 Wim Van Grembergen, University of Antwerp (UA) Steven De Haes University Antwerp Management School (UAMS) IT Alignment
case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:
The Computerworld Honors Program Summary developed the first comprehensive penetration testing product for accurately identifying and exploiting specific network vulnerabilities. Until recently, organizations
Software Security Touchpoint: Architectural Risk Analysis
Software Security Touchpoint: Architectural Risk Analysis Gary McGraw, Ph.D. Chief Technology Officer, Cigital Founded in 1992 to provide software security and software quality professional services Recognized
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
ARMA: Information Governance: A Revenue Source Potential
ARMA: Information Governance: A Revenue Source Potential Presenter: Martin Tuip Executive Director for IG Products ARMA International Agenda About ARMA International What is Information Governance? Generally
An Information Assurance and Security Curriculum Implementation
Issues in Informing Science and Information Technology Volume 3, 2006 An Information Assurance and Security Curriculum Implementation Samuel P. Liles and Reza Kamali Purdue University Calumet, Hammond,
IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5
ESKISP6055.01 Manage security testing
Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting
Internet Reputation Management Guide. Building a Roadmap for Continued Success
Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company
Microsoft STRIDE (six) threat categories
Risk-based Security Testing: Prioritizing Security Testing with Threat Modeling This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007
HP Security Solutions for Microsoft
HP Security Solutions for the Microsoft Environment Achieving a secure adaptive enterprise How secure is your Microsoft environment? Enterprise boundaries are expanding, creating the need for faster, easier
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES
REQUIREMENT 6.1 TO 6.2 SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES 6.1 TO 6.2 OVERVIEW In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company
Academic Course Description. SE2003 Software Project Management Second Semester, 2014-15 (Even semester)
Course (catalog) description: Academic Course Description SRM University Faculty of Engineering and Technology Department of Software Engineering SE2003 Software Project Management Second Semester, 2014-15
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Security and Privacy in Cloud Computing
Security and Privacy in Cloud Computing Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/2010 Threats, vulnerabilities, and enemies Goal Learn the cloud computing threat model
An Evaluation of Privacy and Security Issues at a Small University
An Evaluation of Privacy and Security Issues at a Small University Abstract by Michael North Carolina Agricultural and Technical State University [email protected] Colleges and universities process large
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
SECURITY MANAGEMENT PRACTICES
FAULKNER SECURITY MANAGEMENT PRACTICES Insightful, real-world reports for meeting today s complex security and business continuity challenges FREE PREVIEW AVAILABLE See inside for details guest authors
TALENT DEVELOPMENT THE ROI OF MENTORING, COACHING, AND OTHER EMPLOYEE DEVELOPMENT PROGRAMS
THE ROI OF MENTORING, COACHING, AND OTHER EMPLOYEE PROGRAMS it s no secret that organizations who invest in employees are top performers. Programs like mentoring and coaching are increasingly popular methods
BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can
BBM 461: SECURE PROGRAMMING INTRODUCTION 1 Ahmet Burak Can COURSE MATERIAL Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston, Prentice Hall
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis Cristine Martins Gomes de Gusmão Federal University of Pernambuco / Informatics Center Hermano Perrelli de Moura Federal University of Pernambuco
ISO 27000 Information Security Management Systems Foundation
ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality
The IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
Cyber Security Competency Center
Cyber Security Competency Center Overview February 2014 1 Overview As data and information have become intertwined with our daily life; they can be fairly regarded as the top asset of companies around
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
Bilgi Teknolojileri Risk Yönetimi Uygulamaları
Bilgi Teknolojileri Risk Yönetimi Uygulamaları Kurumsal Risk Yönetimi Derneği 8 Mart 2011 Ajanda BT risk yönetimi kavramı BT risk yönetimi uygulamaları Risk IT çerçevesi Uygulama örnekleri Sorular ve tartışma
IBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure
IBM Global Small and Medium Business Keep Your IT Infrastructure and Assets Secure Contents 2 Executive overview 4 Monitor IT infrastructure to prevent malicious threats 5 Protect IT assets and information
